Skip to main content

Showing 1–9 of 9 results for author: Nanda, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.10781  [pdf

    cs.CL

    BanglaNLP at BLP-2023 Task 1: Benchmarking different Transformer Models for Violence Inciting Text Detection in Bengali

    Authors: Saumajit Saha, Albert Nanda

    Abstract: This paper presents the system that we have developed while solving this shared task on violence inciting text detection in Bangla. We explain both the traditional and the recent approaches that we have used to make our models learn. Our proposed system helps to classify if the given text contains any threat. We studied the impact of data augmentation when there is a limited dataset available. Our… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

    Comments: 5 pages, 2 figures, workshop

  2. arXiv:2310.09238  [pdf

    cs.CL

    BanglaNLP at BLP-2023 Task 2: Benchmarking different Transformer Models for Sentiment Analysis of Bangla Social Media Posts

    Authors: Saumajit Saha, Albert Nanda

    Abstract: Bangla is the 7th most widely spoken language globally, with a staggering 234 million native speakers primarily hailing from India and Bangladesh. This morphologically rich language boasts a rich literary tradition, encompassing diverse dialects and language-specific challenges. Despite its linguistic richness and history, Bangla remains categorized as a low-resource language within the natural la… ▽ More

    Submitted 17 October, 2023; v1 submitted 13 October, 2023; originally announced October 2023.

    Comments: 7 pages, 2 figures, workshop

  3. arXiv:2208.03500  [pdf

    cs.ET cs.AI cs.AR

    NeuCASL: From Logic Design to System Simulation of Neuromorphic Engines

    Authors: Dharanidhar Dang, Amitash Nanda, Bill Lin, Debashis Sahoo

    Abstract: With Moore's law saturating and Dennard scaling hitting its wall, traditional Von Neuman systems cannot offer the GFlops/watt for compute-intensive algorithms such as CNN. Recent trends in unconventional computing approaches give us hope to design highly energy-efficient computing systems for such algorithms. Neuromorphic computing is a promising such approach with its brain-inspired circuitry, us… ▽ More

    Submitted 6 August, 2022; originally announced August 2022.

    Comments: 2 pages, 2 figures, Presented at FMCAD 2021

  4. arXiv:2206.09885  [pdf, other

    cs.CV

    KOLOMVERSE: KRISO open large-scale image dataset for object detection in the maritime universe

    Authors: Abhilasha Nanda, Sung Won Cho, Hyeopwoo Lee, ** Hyoung Park

    Abstract: Over the years, datasets have been developed for various object detection tasks. Object detection in the maritime domain is essential for the safety and navigation of ships. However, there is still a lack of publicly available large-scale datasets in the maritime domain. To overcome this challenge, we present KOLOMVERSE, an open large-scale image dataset for object detection in the maritime domain… ▽ More

    Submitted 20 June, 2022; originally announced June 2022.

    Comments: 13 Pages, 12 figures, submitted to NeurIPS 2022 Datasets and Benchmarks Track (Under Review)

  5. Reputation, Risk, and Trust on User Adoption of Internet Search Engines: The Case of DuckDuckGo

    Authors: Antonios Saravanos, Stavros Zervoudakis, Dongnanzi Zheng, Amarpreet Nanda, Georgios Shaheen, Charles Hornat, Jeremiah Konde Chaettle, Alassane Yoda, Hyeree Park, Will Ang

    Abstract: This paper investigates the determinants of end-user adoption of the DuckDuckGo search engine coupling the standard UTAUT model with factors to reflect reputation, risk, and trust. An experimental approach was taken to validate our model, where participants were exposed to the DuckDuckGo product using a vignette. Subsequently, answering questions on their perception of the technology. The data was… ▽ More

    Submitted 24 November, 2022; v1 submitted 19 June, 2022; originally announced June 2022.

  6. arXiv:2204.13885  [pdf, other

    cs.CR

    Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism

    Authors: Mohammad Reza Nosouhi, Syed W. Shah, Lei Pan, Yevhen Zolotavkin, Ashish Nanda, Praveen Gauravaram, Robin Doss

    Abstract: The evolution of quantum computers poses a serious threat to contemporary public-key encryption (PKE) schemes. To address this impending issue, the National Institute of Standards and Technology (NIST) is currently undertaking the Post-Quantum Cryptography (PQC) standardization project intending to evaluate and subsequently standardize the suitable PQC scheme(s). One such attractive approach, call… ▽ More

    Submitted 13 July, 2022; v1 submitted 29 April, 2022; originally announced April 2022.

  7. arXiv:2110.11542  [pdf, other

    cs.IR cs.LG

    Adverse Media Mining for KYC and ESG Compliance

    Authors: Rupinder Paul Khandpur, Albert Aristotle Nanda, Mathew Davis, Chen Li, Daulet Nurmanbetov, Sankalp Gaur, Ashit Talukder

    Abstract: In recent years, institutions operating in the global market economy face growing risks stemming from non-financial risk factors such as cyber, third-party, and reputational outweighing traditional risks of credit and liquidity. Adverse media or negative news screening is crucial for the identification of such non-financial risks. Typical tools for screening are not real-time, involve manual searc… ▽ More

    Submitted 21 October, 2021; originally announced October 2021.

    Comments: accepted at: Workshop on Machine Learning in Finance, KDD 2020, August 24, 2020, San Diego, CA, USA. https://sites.google.com/view/kdd-mlf-2020/schedule

  8. arXiv:2110.11489  [pdf, ps, other

    cs.AR cs.LG

    Supporting Massive DLRM Inference Through Software Defined Memory

    Authors: Ehsan K. Ardestani, Changkyu Kim, Seung Jae Lee, Luoshang Pan, Valmiki Rampersad, Jens Axboe, Banit Agrawal, Fuxun Yu, Ansha Yu, Trung Le, Hector Yuen, Shishir Juluri, Akshat Nanda, Manoj Wodekar, Dheevatsa Mudigere, Krishnakumar Nair, Maxim Naumov, Chris Peterson, Mikhail Smelyanskiy, Vijay Rao

    Abstract: Deep Learning Recommendation Models (DLRM) are widespread, account for a considerable data center footprint, and grow by more than 1.5x per year. With model size soon to be in terabytes range, leveraging Storage ClassMemory (SCM) for inference enables lower power consumption and cost. This paper evaluates the major challenges in extending the memory hierarchy to SCM for DLRM, and presents differen… ▽ More

    Submitted 8 November, 2021; v1 submitted 21 October, 2021; originally announced October 2021.

    Comments: 14 pages, 5 figures

  9. arXiv:1004.1678  [pdf

    cs.NI

    Node Sensing & Dynamic Discovering Routes for Wireless Sensor Networks

    Authors: Arabinda Nanda, Amiya Kumar Rath, Saroj Kumar Rout

    Abstract: The applications of Wireless Sensor Networks (WSN) contain a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. Howeve… ▽ More

    Submitted 9 April, 2010; originally announced April 2010.

    Comments: IEEE Publication format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 7 No. 3, March 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis/