Skip to main content

Showing 1–40 of 40 results for author: Joshi, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.11409  [pdf, other

    cs.CL cs.AI

    CodeGemma: Open Code Models Based on Gemma

    Authors: CodeGemma Team, Heri Zhao, Jeffrey Hui, Joshua Howland, Nam Nguyen, Siqi Zuo, Andrea Hu, Christopher A. Choquette-Choo, **gyue Shen, Joe Kelley, Kshitij Bansal, Luke Vilnis, Mateo Wirth, Paul Michel, Peter Choy, Pratik Joshi, Ravin Kumar, Sarmad Hashmi, Shubham Agrawal, Zhitao Gong, Jane Fine, Tris Warkentin, Ale Jakse Hartman, Bin Ni, Kathy Korevec , et al. (2 additional authors not shown)

    Abstract: This paper introduces CodeGemma, a collection of specialized open code models built on top of Gemma, capable of a variety of code and natural language generation tasks. We release three model variants. CodeGemma 7B pretrained (PT) and instruction-tuned (IT) variants have remarkably resilient natural language understanding, excel in mathematical reasoning, and match code capabilities of other open… ▽ More

    Submitted 18 June, 2024; v1 submitted 17 June, 2024; originally announced June 2024.

    Comments: v1: 11 pages, 4 figures, 5 tables. v2: Update metadata

  2. arXiv:2404.04692  [pdf, other

    eess.SY cs.CR cs.LG cs.NI

    Securing the Skies: An IRS-Assisted AoI-Aware Secure Multi-UAV System with Efficient Task Offloading

    Authors: Poorvi Joshi, Alakesh Kalita, Mohan Gurusamy

    Abstract: Unmanned Aerial Vehicles (UAVs) are integral in various sectors like agriculture, surveillance, and logistics, driven by advancements in 5G. However, existing research lacks a comprehensive approach addressing both data freshness and security concerns. In this paper, we address the intricate challenges of data freshness, and security, especially in the context of eavesdrop** and jamming in moder… ▽ More

    Submitted 6 April, 2024; originally announced April 2024.

    Comments: 7 pages, 5 figures, to be published in IEEE 99th Vehicular Technology Conference (VTC2024-Spring)

  3. arXiv:2403.05530  [pdf, other

    cs.CL cs.AI

    Gemini 1.5: Unlocking multimodal understanding across millions of tokens of context

    Authors: Gemini Team, Petko Georgiev, Ving Ian Lei, Ryan Burnell, Libin Bai, Anmol Gulati, Garrett Tanzer, Damien Vincent, Zhufeng Pan, Shibo Wang, Soroosh Mariooryad, Yifan Ding, Xinyang Geng, Fred Alcober, Roy Frostig, Mark Omernick, Lexi Walker, Cosmin Paduraru, Christina Sorokin, Andrea Tacchetti, Colin Gaffney, Samira Daruki, Olcan Sercinoglu, Zach Gleicher, Juliette Love , et al. (1092 additional authors not shown)

    Abstract: In this report, we introduce the Gemini 1.5 family of models, representing the next generation of highly compute-efficient multimodal models capable of recalling and reasoning over fine-grained information from millions of tokens of context, including multiple long documents and hours of video and audio. The family includes two new models: (1) an updated Gemini 1.5 Pro, which exceeds the February… ▽ More

    Submitted 14 June, 2024; v1 submitted 8 March, 2024; originally announced March 2024.

  4. arXiv:2312.11805  [pdf, other

    cs.CL cs.AI cs.CV

    Gemini: A Family of Highly Capable Multimodal Models

    Authors: Gemini Team, Rohan Anil, Sebastian Borgeaud, Jean-Baptiste Alayrac, Jiahui Yu, Radu Soricut, Johan Schalkwyk, Andrew M. Dai, Anja Hauth, Katie Millican, David Silver, Melvin Johnson, Ioannis Antonoglou, Julian Schrittwieser, Amelia Glaese, Jilin Chen, Emily Pitler, Timothy Lillicrap, Angeliki Lazaridou, Orhan Firat, James Molloy, Michael Isard, Paul R. Barham, Tom Hennigan, Benjamin Lee , et al. (1325 additional authors not shown)

    Abstract: This report introduces a new family of multimodal models, Gemini, that exhibit remarkable capabilities across image, audio, video, and text understanding. The Gemini family consists of Ultra, Pro, and Nano sizes, suitable for applications ranging from complex reasoning tasks to on-device memory-constrained use-cases. Evaluation on a broad range of benchmarks shows that our most-capable Gemini Ultr… ▽ More

    Submitted 17 June, 2024; v1 submitted 18 December, 2023; originally announced December 2023.

  5. arXiv:2311.05303  [pdf, other

    cs.NI cs.LG eess.SY

    Reliable and Efficient Data Collection in UAV-based IoT Networks

    Authors: Poorvi Joshi, Alakesh Kalita, Mohan Gurusamy

    Abstract: Internet of Things (IoT) involves sensors for monitoring and wireless networks for efficient communication. However, resource-constrained IoT devices and limitations in existing wireless technologies hinder its full potential. Integrating Unmanned Aerial Vehicles (UAVs) into IoT networks can address some challenges by expanding its' coverage, providing security, and bringing computing closer to Io… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

    Comments: 32 pages, 7 figures, 7 tables

  6. arXiv:2310.08743  [pdf

    cs.CV cs.AI cs.LG

    Development and Validation of a Deep Learning-Based Microsatellite Instability Predictor from Prostate Cancer Whole-Slide Images

    Authors: Qiyuan Hu, Abbas A. Rizvi, Geoffery Schau, Kshitij Ingale, Yoni Muller, Rachel Baits, Sebastian Pretzer, Aïcha BenTaieb, Abigail Gordhamer, Roberto Nussenzveig, Adam Cole, Matthew O. Leavitt, Rohan P. Joshi, Nike Beaubier, Martin C. Stumpe, Kunal Nagpal

    Abstract: Microsatellite instability-high (MSI-H) is a tumor agnostic biomarker for immune checkpoint inhibitor therapy. However, MSI status is not routinely tested in prostate cancer, in part due to low prevalence and assay cost. As such, prediction of MSI status from hematoxylin and eosin (H&E) stained whole-slide images (WSIs) could identify prostate cancer patients most likely to benefit from confirmato… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

  7. arXiv:2310.07682  [pdf

    cs.CV

    Prediction of MET Overexpression in Non-Small Cell Lung Adenocarcinomas from Hematoxylin and Eosin Images

    Authors: Kshitij Ingale, Sun Hae Hong, Josh S. K. Bell, Abbas Rizvi, Amy Welch, Lingdao Sha, Irvin Ho, Kunal Nagpal, Aicha BenTaieb, Rohan P Joshi, Martin C Stumpe

    Abstract: MET protein overexpression is a targetable event in non-small cell lung cancer (NSCLC) and is the subject of active drug development. Challenges in identifying patients for these therapies include lack of access to validated testing, such as standardized immunohistochemistry (IHC) assessment, and consumption of valuable tissue for a single gene/protein assay. Development of pre-screening algorithm… ▽ More

    Submitted 12 October, 2023; v1 submitted 11 October, 2023; originally announced October 2023.

  8. arXiv:2310.06881  [pdf

    q-bio.QM cs.PF

    CAFA-evaluator: A Python Tool for Benchmarking Ontological Classification Methods

    Authors: Damiano Piovesan, Davide Zago, Parnal Joshi, M. Clara De Paolis Kaluza, Mahta Mehdiabadi, Rashika Ramola, Alexander Miguel Monzon, Walter Reade, Iddo Friedberg, Predrag Radivojac, Silvio C. E. Tosatto

    Abstract: We present CAFA-evaluator, a powerful Python program designed to evaluate the performance of prediction methods on targets with hierarchical concept dependencies. It generalizes multi-label evaluation to modern ontologies where the prediction targets are drawn from a directed acyclic graph and achieves high efficiency by leveraging matrix computation and topological sorting. The program requiremen… ▽ More

    Submitted 12 March, 2024; v1 submitted 10 October, 2023; originally announced October 2023.

    Comments: 5 pages

  9. arXiv:2307.13266  [pdf, other

    cs.LG cs.AI

    Federated Split Learning with Only Positive Labels for resource-constrained IoT environment

    Authors: Praveen Joshi, Chandra Thapa, Mohammed Hasanuzzaman, Ted Scully, Haithem Afli

    Abstract: Distributed collaborative machine learning (DCML) is a promising method in the Internet of Things (IoT) domain for training deep learning models, as data is distributed across multiple devices. A key advantage of this approach is that it improves data privacy by removing the necessity for the centralized aggregation of raw data but also empowers IoT devices with low computational power. Among vari… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

    Comments: 11 pages, 3 figures

  10. arXiv:2305.07118  [pdf, other

    cs.IT cs.CR

    Commitment over Gaussian Unfair Noisy Channels

    Authors: Amitalok J. Budkuley, Pranav Joshi, Manideep Mamindlapally, Anuj Kumar Yadav

    Abstract: Commitment is a key primitive which resides at the heart of several cryptographic protocols. Noisy channels can help realize information-theoretically secure commitment schemes, however, their imprecise statistical characterization can severely impair such schemes, especially their security guarantees. Kee** our focus on channel unreliability in this work, we study commitment over unreliable con… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

    Comments: The paper follows alphabetical author order. AKY, MM, and PJ have equally contributed to this work

  11. arXiv:2211.07514  [pdf, other

    cs.CL

    CST5: Data Augmentation for Code-Switched Semantic Parsing

    Authors: Anmol Agarwal, Jigar Gupta, Rahul Goel, Shyam Upadhyay, Pankaj Joshi, Rengarajan Aravamudhan

    Abstract: Extending semantic parsers to code-switched input has been a challenging problem, primarily due to a lack of supervised training data. In this work, we introduce CST5, a new data augmentation technique that finetunes a T5 model using a small seed set ($\approx$100 utterances) to generate code-switched utterances from English utterances. We show that CST5 generates high quality code-switched data,… ▽ More

    Submitted 14 November, 2022; originally announced November 2022.

  12. Deep Learning for Size and Microscope Feature Extraction and Classification in Oral Cancer: Enhanced Convolution Neural Network

    Authors: Prakrit Joshi, Omar Hisham Alsadoon, Abeer Alsadoon, Nada AlSallami, Tarik A. Rashid, P. W. C. Prasad, Sami Haddad

    Abstract: Background and Aim: Over-fitting issue has been the reason behind deep learning technology not being successfully implemented in oral cancer images classification. The aims of this research were reducing overfitting for accurately producing the required dimension reduction feature map through Deep Learning algorithm using Convolutional Neural Network. Methodology: The proposed system consists of E… ▽ More

    Submitted 6 August, 2022; originally announced August 2022.

    Comments: 21 pages

    Journal ref: Multimed Tools Appl., 2022

  13. arXiv:2206.02794  [pdf, other

    cs.LG

    Machine learning models for determination of weldbead shape parameters for gas metal arc welded T-joints -- A comparative study

    Authors: R. Pradhan, A. P Joshi, M. R Sunny, A. Sarkar

    Abstract: The shape of a weld bead is critical in assessing the quality of the welded joint. In particular, this has a major impact in the accuracy of the results obtained from a numerical analysis. This study focuses on the statistical design techniques and the artificial neural networks, to predict the weld bead shape parameters of shielded Gas Metal Arc Welded (GMAW) fillet joints. Extensive testing was… ▽ More

    Submitted 6 June, 2022; originally announced June 2022.

  14. arXiv:2205.09402  [pdf

    cs.LG

    Predictive Maintenance using Machine Learning

    Authors: Archit P. Kane, Ashutosh S. Kore, Advait N. Khandale, Sarish S. Nigade, Pranjali P. Joshi

    Abstract: Predictive maintenance (PdM) is a concept, which is implemented to effectively manage maintenance plans of the assets by predicting their failures with data driven techniques. In these scenarios, data is collected over a certain period of time to monitor the state of equipment. The objective is to find some correlations and patterns that can help predict and ultimately prevent failures. Equipment… ▽ More

    Submitted 19 May, 2022; originally announced May 2022.

  15. arXiv:2205.07453  [pdf, other

    cs.SE

    Regression Test Suite for Payment Switch using jPOS

    Authors: Atharv Sardesai, Hatim Piplodwala, Sidhant Hargunani, Swarnim Sonawane, Prof. Pranjali Joshi, Vikram Mohite

    Abstract: The Payment Switch is an integral component of all modern payment and banking systems in India. The NPCI currently provides a simulator to test payment switches. However, this system has a few disadvantages viz. it lacks an API, it requires manual generation of each test case and during high server loads, the testing process may take a long time. Currently there aren't any open source alternatives… ▽ More

    Submitted 16 May, 2022; originally announced May 2022.

  16. arXiv:2205.03702  [pdf, other

    eess.IV cs.CV cs.CY

    Keratoconus Classifier for Smartphone-based Corneal Topographer

    Authors: Siddhartha Gairola, Pallavi Joshi, Anand Balasubramaniam, Kaushik Murali, Nipun Kwatra, Mohit Jain

    Abstract: Keratoconus is a severe eye disease that leads to deformation of the cornea. It impacts people aged 10-25 years and is the leading cause of blindness in that demography. Corneal topography is the gold standard for keratoconus diagnosis. It is a non-invasive process performed using expensive and bulky medical devices called corneal topographers. This makes it inaccessible to large populations, espe… ▽ More

    Submitted 7 May, 2022; originally announced May 2022.

    Comments: 4 pages

  17. arXiv:2204.03326  [pdf, other

    cs.LG cs.DC

    Enabling All In-Edge Deep Learning: A Literature Review

    Authors: Praveen Joshi, Mohammed Hasanuzzaman, Chandra Thapa, Haithem Afli, Ted Scully

    Abstract: In recent years, deep learning (DL) models have demonstrated remarkable achievements on non-trivial tasks such as speech recognition and natural language understanding. One of the significant contributors to its success is the proliferation of end devices that acted as a catalyst to provide data for data-hungry DL models. However, computing DL training and inference is the main challenge. Usually,… ▽ More

    Submitted 12 December, 2022; v1 submitted 7 April, 2022; originally announced April 2022.

    Comments: 21 pages

  18. arXiv:2204.00054  [pdf, ps, other

    cs.NI cs.RO

    Distributed Robust Geocast Multicast Routing for Inter-Vehicle Communication

    Authors: Harshvardhan P. Joshi, Mihail L. Sichitiu, Maria Kihl

    Abstract: Numerous protocols for geocast have been proposed in literature. It has been shown that explicit route setup approaches perform poorly with VANETs due to limited route lifetime and frequent network fragmentation. The broadcast based approaches have considerable redundancy and add significantly to the overhead of the protocol. A completely distributed and robust geocast approach is presented in thi… ▽ More

    Submitted 31 March, 2022; originally announced April 2022.

    Comments: 12 pages

    Journal ref: Proceedings of WEIRD workshop on WiMax, Wireless and Mobility, 2007

  19. arXiv:2203.13948  [pdf

    cs.CV

    AI-augmented histopathologic review using image analysis to optimize DNA yield and tumor purity from FFPE slides

    Authors: Bolesław L. Osinski, Aïcha BenTaieb, Irvin Ho, Ryan D. Jones, Rohan P. Joshi, Andrew Westley, Michael Carlson, Caleb Willis, Luke Schleicher, Brett M. Mahon, Martin C. Stumpe

    Abstract: To achieve minimum DNA input and tumor purity requirements for next-generation sequencing (NGS), pathologists visually estimate macrodissection and slide count decisions. Misestimation may cause tissue waste and increased laboratory costs. We developed an AI-augmented smart pathology review system (SmartPath) to empower pathologists with quantitative metrics for determining tissue extraction param… ▽ More

    Submitted 7 April, 2022; v1 submitted 25 March, 2022; originally announced March 2022.

  20. A Reinforcement Approach for Detecting P2P Botnet Communities in Dynamic Communication Graphs

    Authors: Harshvardhan P. Joshi, Rudra Dutta

    Abstract: Peer-to-peer (P2P) botnets use decentralized command and control networks that make them resilient to disruptions. The P2P botnet overlay networks manifest structures in mutual-contact graphs, also called communication graphs, formed using network traffic information. It has been shown that these structures can be detected using community detection techniques from graph theory. These previous work… ▽ More

    Submitted 23 March, 2022; originally announced March 2022.

  21. arXiv:2203.10062  [pdf

    cs.CV

    Imaging-based histological features are predictive of MET alterations in Non-Small Cell Lung Cancer

    Authors: Rohan P. Joshi, Bolesław L. Osinski, Niha Beig, Lingdao Sha, Kshitij Ingale, Martin C. Stumpe

    Abstract: MET is a proto-oncogene whose somatic activation in non-small cell lung cancer leads to increased cell growth and tumor progression. The two major classes of MET alterations are gene amplification and exon 14 deletion, both of which are therapeutic targets and detectable using existing molecular assays. However, existing tests are limited by their consumption of valuable tissue, cost and complexit… ▽ More

    Submitted 29 March, 2022; v1 submitted 18 March, 2022; originally announced March 2022.

    Comments: 30 pages, 4 figures

  22. arXiv:2111.08477  [pdf, other

    cs.IT cs.CR

    On Reverse Elastic Channels and the Asymmetry of Commitment Capacity under Channel Elasticity

    Authors: Amitalok J. Budkuley, Pranav Joshi, Manideep Mamindlapally, Anuj Kumar Yadav

    Abstract: Commitment is an important cryptographic primitive. It is well known that noisy channels are a promising resource to realize commitment in an information-theoretically secure manner. However, oftentimes, channel behaviour may be poorly characterized thereby limiting the commitment throughput and/or degrading the security guarantees; particularly problematic is when a dishonest party, unbeknown to… ▽ More

    Submitted 16 November, 2021; originally announced November 2021.

    Comments: 16 pages, 3 figures

  23. arXiv:2111.01354  [pdf, other

    cs.HC

    SmartKC: Smartphone-based Corneal Topographer for Keratoconus Detection

    Authors: Siddhartha Gairola, Murtuza Bohra, Nadeem Shaheer, Navya Jayaprakash, Pallavi Joshi, Anand Balasubramaniam, Kaushik Murali, Nipun Kwatra, Mohit Jain

    Abstract: Keratoconus is a severe eye disease affecting the cornea (the clear, dome-shaped outer surface of the eye), causing it to become thin and develop a conical bulge. The diagnosis of keratoconus requires sophisticated ophthalmic devices which are non-portable and very expensive. This makes early detection of keratoconus inaccessible to large populations in low- and middle-income countries, making it… ▽ More

    Submitted 21 January, 2022; v1 submitted 1 November, 2021; originally announced November 2021.

    Comments: Change Log: + Fixed sim-K computation (updated Section 5.5.3); re-ran our pipeline with the updated sim-K values (updated Figure 7); + Conducted the comparative evaluation with doctors again (total 4 doctors), and got improved results (updated Section 7.2 and Table 2); [Note: This is an updated version of the paper that was accepted for publication in IMWUT 2021.]

  24. arXiv:2109.09246  [pdf, other

    cs.LG cs.AI

    Splitfed learning without client-side synchronization: Analyzing client-side split network portion size to overall performance

    Authors: Praveen Joshi, Chandra Thapa, Seyit Camtepe, Mohammed Hasanuzzamana, Ted Scully, Haithem Afli

    Abstract: Federated Learning (FL), Split Learning (SL), and SplitFed Learning (SFL) are three recent developments in distributed machine learning that are gaining attention due to their ability to preserve the privacy of raw data. Thus, they are widely applicable in various domains where data is sensitive, such as large-scale medical image classification, internet-of-medical-things, and cross-organization p… ▽ More

    Submitted 19 September, 2021; originally announced September 2021.

    Comments: CERC 2021

  25. arXiv:2106.09536  [pdf, ps, other

    cs.CR cs.AR

    Single Event Transient Fault Analysis of ELEPHANT cipher

    Authors: Priyanka Joshi, Bodhistwa Mazumdar

    Abstract: In this paper, we propose a novel fault attack termed as Single Event Transient Fault Analysis (SETFA) attack, which is well suited for hardware implementations. The proposed approach pinpoints hotspots in the cypher's Sbox combinational logic circuit that significantly reduce the key entropy when subjected to faults. ELEPHANT is a parallel authenticated encryption and associated data (AEAD) schem… ▽ More

    Submitted 13 June, 2021; originally announced June 2021.

    Comments: 5 pages, 2 figures

  26. arXiv:2102.09866  [pdf

    cs.CL cs.LG

    KBCNMUJAL@HASOC-Dravidian-CodeMix-FIRE2020: Using Machine Learning for Detection of Hate Speech and Offensive Code-Mixed Social Media text

    Authors: Varsha Pathak, Manish Joshi, Prasad Joshi, Monica Mundada, Tanmay Joshi

    Abstract: This paper describes the system submitted by our team, KBCNMUJAL, for Task 2 of the shared task Hate Speech and Offensive Content Identification in Indo-European Languages (HASOC), at Forum for Information Retrieval Evaluation, December 16-20, 2020, Hyderabad, India. The datasets of two Dravidian languages Viz. Malayalam and Tamil of size 4000 observations, each were shared by the HASOC organizers… ▽ More

    Submitted 19 February, 2021; originally announced February 2021.

  27. arXiv:2102.06045  [pdf, other

    cs.LG cs.AI q-bio.QM

    Artificial Intelligence based Autonomous Molecular Design for Medical Therapeutic: A Perspective

    Authors: Rajendra P. Joshi, Neeraj Kumar

    Abstract: Domain-aware machine learning (ML) models have been increasingly adopted for accelerating small molecule therapeutic design in the recent years. These models have been enabled by significant advancement in state-of-the-art artificial intelligence (AI) and computing infrastructures. Several ML architectures are pre-dominantly and independently used either for predicting the properties of small mole… ▽ More

    Submitted 9 February, 2021; originally announced February 2021.

  28. arXiv:2009.14505  [pdf, other

    cs.AI cs.CL

    TaxiNLI: Taking a Ride up the NLU Hill

    Authors: Pratik Joshi, Somak Aditya, Aalok Sathe, Monojit Choudhury

    Abstract: Pre-trained Transformer-based neural architectures have consistently achieved state-of-the-art performance in the Natural Language Inference (NLI) task. Since NLI examples encompass a variety of linguistic, logical, and reasoning phenomena, it remains unclear as to which specific concepts are learnt by the trained systems and where they can achieve strong generalization. To investigate this questi… ▽ More

    Submitted 9 October, 2020; v1 submitted 30 September, 2020; originally announced September 2020.

    Comments: 15 pages, 9 figures, 4 tables. Accepted at CoNLL 2020

  29. arXiv:2006.05787  [pdf, other

    cs.CV eess.IV eess.SP

    Image Enhancement and Object Recognition for Night Vision Surveillance

    Authors: Aashish Bhandari, Aayush Kafle, Pranjal Dhakal, Prateek Raj Joshi, Dinesh Baniya Kshatri

    Abstract: Object recognition is a critical part of any surveillance system. It is the matter of utmost concern to identify intruders and foreign objects in the area where surveillance is done. The performance of surveillance system using the traditional camera in daylight is vastly superior as compared to night. The main problem for surveillance during the night is the objects captured by traditional camera… ▽ More

    Submitted 10 June, 2020; originally announced June 2020.

    Comments: International Conference on Recent Trends in Computational Engineering and Technologies, 2018

  30. arXiv:2004.09095  [pdf, other

    cs.CL

    The State and Fate of Linguistic Diversity and Inclusion in the NLP World

    Authors: Pratik Joshi, Sebastin Santy, Amar Budhiraja, Kalika Bali, Monojit Choudhury

    Abstract: Language technologies contribute to promoting multilingualism and linguistic diversity around the world. However, only a very small number of the over 7000 languages of the world are represented in the rapidly evolving language technologies and applications. In this paper we look at the relation between the types of languages, resources, and their representation in NLP conferences to understand th… ▽ More

    Submitted 26 January, 2021; v1 submitted 20 April, 2020; originally announced April 2020.

    Comments: Accepted at ACL 2020 (10 pages + 2 pages Appendix). P.J., S.S. and A.B. contributed equally

  31. arXiv:1912.03457  [pdf, other

    cs.CL cs.CY

    Unsung Challenges of Building and Deploying Language Technologies for Low Resource Language Communities

    Authors: Pratik Joshi, Christain Barnes, Sebastin Santy, Simran Khanuja, Sanket Shah, Anirudh Srinivasan, Satwik Bhattamishra, Sunayana Sitaram, Monojit Choudhury, Kalika Bali

    Abstract: In this paper, we examine and analyze the challenges associated with develo** and introducing language technologies to low-resource language communities. While doing so, we bring to light the successes and failures of past work in this area, challenges being faced in doing so, and what they have achieved. Throughout this paper, we take a problem-facing approach and describe essential factors whi… ▽ More

    Submitted 7 December, 2019; originally announced December 2019.

    Comments: Accepted at ICON 2019; 9 pages

  32. arXiv:1910.06859  [pdf

    cs.IR cs.LG

    Computational Psychology to Embed Emotions into News or Advertisements to Increase Reader Affinity

    Authors: Hrishikesh Kulkarni, P Joshi, P Chande

    Abstract: Readers take decisions about going through the complete news based on many factors. The emotional impact of the news title on reader is one of the most important factors. Cognitive ergonomics tries to strike the balance between work, product and environment with human needs and capabilities. The utmost need to integrate emotions in the news as well as advertisements cannot be denied. The idea is t… ▽ More

    Submitted 14 October, 2019; originally announced October 2019.

  33. arXiv:1908.04332  [pdf

    cs.CL cs.LG

    LSTM vs. GRU vs. Bidirectional RNN for script generation

    Authors: Sanidhya Mangal, Poorva Joshi, Rahul Modak

    Abstract: Scripts are an important part of any TV series. They narrate movements, actions and expressions of characters. In this paper, a case study is presented on how different sequence to sequence deep learning models perform in the task of generating new conversations between characters as well as new scenarios on the basis of a script (previous conversations). A comprehensive comparison between these m… ▽ More

    Submitted 12 August, 2019; originally announced August 2019.

    Comments: 7 pages, 7 figures

  34. arXiv:1908.01080  [pdf

    cs.SD cs.LG eess.AS stat.ML

    LSTM Based Music Generation System

    Authors: Sanidhya Mangal, Rahul Modak, Poorva Joshi

    Abstract: Traditionally, music was treated as an analogue signal and was generated manually. In recent years, music is conspicuous to technology which can generate a suite of music automatically without any human intervention. To accomplish this task, we need to overcome some technical challenges which are discussed descriptively in this paper. A brief introduction about music and its components is provided… ▽ More

    Submitted 2 August, 2019; originally announced August 2019.

    Comments: 6 pages, 11 figures

    Journal ref: IARJSET: Vol. 6, Issue 5 (2019) 47-54

  35. arXiv:1902.05390  [pdf

    cs.CV cs.LG stat.ML

    DeepIrisNet2: Learning Deep-IrisCodes from Scratch for Segmentation-Robust Visible Wavelength and Near Infrared Iris Recognition

    Authors: Abhishek Gangwar, Akanksha Joshi, Padmaja Joshi, R. Raghavendra

    Abstract: We first, introduce a deep learning based framework named as DeepIrisNet2 for visible spectrum and NIR Iris representation. The framework can work without classical iris normalization step or very accurate iris segmentation; allowing to work under non-ideal situation. The framework contains spatial transformer layers to handle deformation and supervision branches after certain intermediate layers… ▽ More

    Submitted 6 February, 2019; originally announced February 2019.

    Comments: 10 pages, 4 Figures

  36. arXiv:1804.06438  [pdf, other

    cs.CV

    Vision Based Dynamic Offside Line Marker for Soccer Games

    Authors: Karthik Muthuraman, Pranav Joshi, Suraj Kiran Raman

    Abstract: Offside detection in soccer has emerged as one of the most important decisions with an average of 50 offside decisions every game. False detections and rash calls adversely affect game conditions and in many cases drastically change the outcome of the game. The human eye has finite precision and can only discern a limited amount of detail in a given instance. Current offside decisions are made man… ▽ More

    Submitted 17 April, 2018; originally announced April 2018.

  37. arXiv:1710.05363  [pdf

    cs.CR

    Link Before You Share: Managing Privacy Policies through Blockchain

    Authors: Agniva Banerjee, Karuna Pande Joshi

    Abstract: With the advent of numerous online content providers, utilities and applications, each with their own specific version of privacy policies and its associated overhead, it is becoming increasingly difficult for concerned users to manage and track the confidential information that they share with the providers. Users consent to providers to gather and share their Personally Identifiable Information… ▽ More

    Submitted 15 October, 2017; originally announced October 2017.

    Comments: 10 pages, 6 figures, Published in: 4th International Workshop on Privacy and Security of Big Data (PSBD 2017) in conjunction with 2017 IEEE International Conference on Big Data (IEEE BigData 2017) December 14, 2017, Boston, MA, USA

  38. arXiv:1609.05296  [pdf

    cs.CV

    Development of a Fuzzy Expert System based Liveliness Detection Scheme for Biometric Authentication

    Authors: Avinash Kumar Singh, Piyush Joshi, G C Nandi

    Abstract: Liveliness detection acts as a safe guard against spoofing attacks. Most of the researchers used vision based techniques to detect liveliness of the user, but they are highly sensitive to illumination effects. Therefore it is very hard to design a system, which will work robustly under all circumstances. Literature shows that most of the research utilize eye blink or mouth movement to detect the l… ▽ More

    Submitted 17 September, 2016; originally announced September 2016.

  39. Hybrid Approach for Inductive Semi Supervised Learning using Label Propagation and Support Vector Machine

    Authors: Aruna Govada, Pravin Joshi, Sahil Mittal, Sanjay K Sahay

    Abstract: Semi supervised learning methods have gained importance in today's world because of large expenses and time involved in labeling the unlabeled data by human experts. The proposed hybrid approach uses SVM and Label Propagation to label the unlabeled data. In the process, at each step SVM is trained to minimize the error and thus improve the prediction quality. Experiments are conducted by using SVM… ▽ More

    Submitted 2 December, 2015; originally announced December 2015.

    Comments: Presented in the 11th International Conference, MLDM, Germany, July 20 - 21, 2015. Springer, Machine Learning and Data Mining in Pattern Recognition, LNAI Vol. 9166, p. 199-213, 2015

  40. arXiv:1508.04131  [pdf

    cs.HC

    Contextually proximate approach to develop smart user interface

    Authors: Pushkar Joshi

    Abstract: Researchers and experts are taking efforts in delivering an optimal user experience from a long time. Computer interfaces are being developed to keep user 'in the flow' as well as for making users more connected to the real world wile using virtual environment. Develo** ubiquitous user interfaces for novices and experts at the same time is crucial work for interaction designers. This paper molds… ▽ More

    Submitted 17 August, 2015; originally announced August 2015.

    Comments: 4 pages 2 figures