Skip to main content

Showing 1–8 of 8 results for author: Maurya, C K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.01053  [pdf, other

    cs.CL cs.SD eess.AS

    End-to-End Speech-to-Text Translation: A Survey

    Authors: Nivedita Sethiya, Chandresh Kumar Maurya

    Abstract: Speech-to-text translation pertains to the task of converting speech signals in a language to text in another language. It finds its application in various domains, such as hands-free communication, dictation, video lecture transcription, and translation, to name a few. Automatic Speech Recognition (ASR), as well as Machine Translation(MT) models, play crucial roles in traditional ST translation,… ▽ More

    Submitted 8 June, 2024; v1 submitted 2 December, 2023; originally announced December 2023.

    Comments: 75 pages

  2. arXiv:2206.08232  [pdf, ps, other

    cs.CL cs.AI

    Deep Learning Architecture for Automatic Essay Scoring

    Authors: Tsegaye Misikir Tashu, Chandresh Kumar Maurya, Tomas Horvath

    Abstract: Automatic evaluation of essay (AES) and also called automatic essay scoring has become a severe problem due to the rise of online learning and evaluation platforms such as Coursera, Udemy, Khan academy, and so on. Researchers have recently proposed many techniques for automatic evaluation. However, many of these techniques use hand-crafted features and thus are limited from the feature representat… ▽ More

    Submitted 16 June, 2022; originally announced June 2022.

  3. arXiv:2203.01684  [pdf, other

    cs.LG

    Anomaly Detection in Big Data

    Authors: Chandresh Kumar Maurya

    Abstract: Anomaly is defined as a state of the system that do not conform to the normal behavior. For example, the emission of neutrons in a nuclear reactor channel above the specified threshold is an anomaly. Big data refers to the data set that is \emph{high volume, streaming, heterogeneous, distributed} and often \emph{sparse}. Big data is not uncommon these days. For example, as per Internet live stats,… ▽ More

    Submitted 3 March, 2022; originally announced March 2022.

    Comments: 148 pages. PhD Thesis. Work done in collaboration with Durga Toshnwial, IIT Roorkee, and Dr. Vijendra, Robert Bosch

  4. arXiv:2202.02702  [pdf, other

    cs.CL cs.LG

    How Effective is Incongruity? Implications for Code-mix Sarcasm Detection

    Authors: Aditya Shah, Chandresh Kumar Maurya

    Abstract: The presence of sarcasm in conversational systems and social media like chatbots, Facebook, Twitter, etc. poses several challenges for downstream NLP tasks. This is attributed to the fact that the intended meaning of a sarcastic text is contrary to what is expressed. Further, the use of code-mix language to express sarcasm is increasing day by day. Current NLP techniques for code-mix data have lim… ▽ More

    Submitted 5 February, 2022; originally announced February 2022.

    Comments: Published in ICON - ACL 2021

  5. arXiv:2108.06206  [pdf, other

    cs.IR cs.LG

    An Intelligent Recommendation-cum-Reminder System

    Authors: Rohan Saxena, Maheep Chaudhary, Chandresh Kumar Maurya, Shitala Prasad

    Abstract: Intelligent recommendation and reminder systems are the need of the fast-pacing life. Current intelligent systems such as Siri, Google Assistant, Microsoft Cortona, etc., have limited capability. For example, if you want to wake up at 6 am because you have an upcoming trip, you have to set the alarm manually. Besides, these systems do not recommend or remind what else to carry, such as carrying an… ▽ More

    Submitted 9 August, 2021; originally announced August 2021.

    Comments: 9

  6. arXiv:2105.15030  [pdf, other

    cs.HC cs.CY cs.DS

    Digital Contact Tracing for Covid 19

    Authors: Chandresh Kumar Maurya, Seemandhar Jain, Vishal Thakre

    Abstract: The COVID19 pandemic created a worldwide emergency as it is estimated that such a large number of infections are due to human-to-human transmission of the COVID19. As a necessity, there is a need to track users who came in contact with users having travel history, asymptomatic and not yet symptomatic, but they can be in the future. To solve this problem, the present work proposes a solution for co… ▽ More

    Submitted 22 May, 2021; originally announced May 2021.

    Comments: 10 pages

  7. arXiv:2001.00288  [pdf, other

    cs.LG stat.ML

    Online Similarity Learning with Feedback for Invoice Line Item Matching

    Authors: Chandresh Kumar Maurya, Neelamadhav Gantayat, Sampath Dechu, Tomas Horvath

    Abstract: The procure to pay process (P2P) in large enterprises is a back-end business process which deals with the procurement of products and services for enterprise operations. Procurement is done by issuing purchase orders to impaneled vendors and invoices submitted by vendors are paid after they go through a rigorous validation process. Agents orchestrating P2P process often encounter the problem of ma… ▽ More

    Submitted 14 February, 2020; v1 submitted 1 January, 2020; originally announced January 2020.

    Journal ref: published as workshop paper in AAAI workshop on intelligent processing automation, 2020

  8. arXiv:1508.06717  [pdf, other

    cs.LG

    Online Anomaly Detection via Class-Imbalance Learning

    Authors: Chandresh Kumar Maurya, Durga Toshniwal, Gopalan Vijendran Venkoparao

    Abstract: Anomaly detection is an important task in many real world applications such as fraud detection, suspicious activity detection, health care monitoring etc. In this paper, we tackle this problem from supervised learning perspective in online learning setting. We maximize well known \emph{Gmean} metric for class-imbalance learning in online learning framework. Specifically, we show that maximizing \e… ▽ More

    Submitted 26 August, 2015; originally announced August 2015.

    Comments: This paper is accepted for publication in IC3 2015, Jaypee Noida