Skip to main content

Showing 1–50 of 53 results for author: Pal, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.04023  [pdf, other

    eess.IV cs.CV

    Lumbar Spine Tumor Segmentation and Localization in T2 MRI Images Using AI

    Authors: Rikathi Pal, Sudeshna Mondal, Aditi Gupta, Priya Saha, Somoballi Ghoshal, Amlan Chakrabarti, Susmita Sur-Kolay

    Abstract: In medical imaging, segmentation and localization of spinal tumors in three-dimensional (3D) space pose significant computational challenges, primarily stemming from limited data availability. In response, this study introduces a novel data augmentation technique, aimed at automating spine tumor segmentation and localization through AI approaches. Leveraging a fusion of fuzzy c-means clustering an… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: 9 pages, 12 figures

  2. arXiv:2404.18291  [pdf, other

    cs.CV cs.AI

    Panoptic Segmentation and Labelling of Lumbar Spine Vertebrae using Modified Attention Unet

    Authors: Rikathi Pal, Priya Saha, Somoballi Ghoshal, Amlan Chakrabarti, Susmita Sur-Kolay

    Abstract: Segmentation and labeling of vertebrae in MRI images of the spine are critical for the diagnosis of illnesses and abnormalities. These steps are indispensable as MRI technology provides detailed information about the tissue structure of the spine. Both supervised and unsupervised segmentation methods exist, yet acquiring sufficient data remains challenging for achieving high accuracy. In this stud… ▽ More

    Submitted 28 April, 2024; originally announced April 2024.

    Comments: 9 pages, 10 figures

  3. arXiv:2402.14080  [pdf, other

    cs.LG cs.AI stat.ML

    Efficient Normalized Conformal Prediction and Uncertainty Quantification for Anti-Cancer Drug Sensitivity Prediction with Deep Regression Forests

    Authors: Daniel Nolte, Souparno Ghosh, Ranadip Pal

    Abstract: Deep learning models are being adopted and applied on various critical decision-making tasks, yet they are trained to provide point predictions without providing degrees of confidence. The trustworthiness of deep learning models can be increased if paired with uncertainty estimations. Conformal Prediction has emerged as a promising method to pair machine learning models with prediction intervals,… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  4. arXiv:2311.08314  [pdf, other

    cs.CV

    Convolutional Neural Networks Exploiting Attributes of Biological Neurons

    Authors: Neeraj Kumar Singh, Nikhil R. Pal

    Abstract: In this era of artificial intelligence, deep neural networks like Convolutional Neural Networks (CNNs) have emerged as front-runners, often surpassing human capabilities. These deep networks are often perceived as the panacea for all challenges. Unfortunately, a common downside of these networks is their ''black-box'' character, which does not necessarily mirror the operation of biological neural… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

    Comments: 20 pages, 6 figures

  5. arXiv:2310.20524  [pdf, other

    cs.LG

    Group-Feature (Sensor) Selection With Controlled Redundancy Using Neural Networks

    Authors: Aytijhya Saha, Nikhil R. Pal

    Abstract: In this paper, we present a novel embedded feature selection method based on a Multi-layer Perceptron (MLP) network and generalize it for group-feature or sensor selection problems, which can control the level of redundancy among the selected features or groups. Additionally, we have generalized the group lasso penalty for feature selection to encompass a mechanism for selecting valuable group fea… ▽ More

    Submitted 31 October, 2023; originally announced October 2023.

  6. arXiv:2309.05070  [pdf, other

    cs.RO cs.AI eess.SY

    Chasing the Intruder: A Reinforcement Learning Approach for Tracking Intruder Drones

    Authors: Shivam Kainth, Subham Sahoo, Rajtilak Pal, Shashi Shekhar Jha

    Abstract: Drones are becoming versatile in a myriad of applications. This has led to the use of drones for spying and intruding into the restricted or private air spaces. Such foul use of drone technology is dangerous for the safety and security of many critical infrastructures. In addition, due to the varied low-cost design and agility of the drones, it is a challenging task to identify and track them usin… ▽ More

    Submitted 10 September, 2023; originally announced September 2023.

  7. arXiv:2308.16149  [pdf, other

    cs.CL cs.AI cs.LG

    Jais and Jais-chat: Arabic-Centric Foundation and Instruction-Tuned Open Generative Large Language Models

    Authors: Neha Sengupta, Sunil Kumar Sahu, Bokang Jia, Satheesh Katipomu, Haonan Li, Fajri Koto, William Marshall, Gurpreet Gosal, Cynthia Liu, Zhiming Chen, Osama Mohammed Afzal, Samta Kamboj, Onkar Pandit, Rahul Pal, Lalit Pradhan, Zain Muhammad Mujahid, Massa Baali, Xudong Han, Sondos Mahmoud Bsharat, Alham Fikri Aji, Zhiqiang Shen, Zhengzhong Liu, Natalia Vassilieva, Joel Hestness, Andy Hock , et al. (7 additional authors not shown)

    Abstract: We introduce Jais and Jais-chat, new state-of-the-art Arabic-centric foundation and instruction-tuned open generative large language models (LLMs). The models are based on the GPT-3 decoder-only architecture and are pretrained on a mixture of Arabic and English texts, including source code in various programming languages. With 13 billion parameters, they demonstrate better knowledge and reasoning… ▽ More

    Submitted 29 September, 2023; v1 submitted 30 August, 2023; originally announced August 2023.

    Comments: Arabic-centric, foundation model, large-language model, LLM, generative model, instruction-tuned, Jais, Jais-chat

    MSC Class: 68T50 ACM Class: F.2.2; I.2.7

  8. arXiv:2307.03902  [pdf, other

    cs.LG

    Feature selection simultaneously preserving both class and cluster structures

    Authors: Suchismita Das, Nikhil R. Pal

    Abstract: When a data set has significant differences in its class and cluster structure, selecting features aiming only at the discrimination of classes would lead to poor clustering performance, and similarly, feature selection aiming only at preserving cluster structures would lead to poor classification performance. To the best of our knowledge, a feature selection method that simultaneously considers c… ▽ More

    Submitted 8 July, 2023; originally announced July 2023.

  9. arXiv:2306.17427  [pdf

    cs.RO

    Modeling and parametric optimization of 3D tendon-sheath actuator system for upper limb soft exosuit

    Authors: Amit Yadav, Nitesh Kumar, Shaurya Surana, Aravind Ramasamy, Abhishek Rudra Pal, Sushma Santapuri, Lalan Kumar, Suriya Prakash Muthukrishnan, Shubhendu Bhasin, Sitikantha Roy

    Abstract: This paper presents an analysis of parametric characterization of a motor driven tendon-sheath actuator system for use in upper limb augmentation for applications such as rehabilitation, therapy, and industrial automation. The double tendon sheath system, which uses two sets of cables (agonist and antagonist side) guided through a sheath, is considered to produce smooth and natural-looking movemen… ▽ More

    Submitted 10 September, 2023; v1 submitted 30 June, 2023; originally announced June 2023.

  10. arXiv:2306.13954  [pdf

    cs.CL cs.CY

    Characterizing the Emotion Carriers of COVID-19 Misinformation and Their Impact on Vaccination Outcomes in India and the United States

    Authors: Ridam Pal, Sanjana S, Deepak Mahto, Kriti Agrawal, Gopal Mengi, Sargun Nagpal, Akshaya Devadiga, Tavpritesh Sethi

    Abstract: The COVID-19 Infodemic had an unprecedented impact on health behaviors and outcomes at a global scale. While many studies have focused on a qualitative and quantitative understanding of misinformation, including sentiment analysis, there is a gap in understanding the emotion-carriers of misinformation and their differences across geographies. In this study, we characterized emotion carriers and th… ▽ More

    Submitted 24 June, 2023; originally announced June 2023.

  11. arXiv:2302.09074  [pdf, ps, other

    q-bio.NC cs.NE

    An anatomy-based V1 model: Extraction of Low-level Features, Reduction of distortion and a V1-inspired SOM

    Authors: Suvam Roy, Nikhil Ranjan Pal

    Abstract: We present a model of the primary visual cortex V1, guided by anatomical experiments. Unlike most machine learning systems our goal is not to maximize accuracy but to realize a system more aligned to biological systems. Our model consists of the V1 layers 4, 2/3, and 5, with inter-layer connections between them in accordance with the anatomy. We further include the orientation selectivity of the V… ▽ More

    Submitted 18 February, 2023; originally announced February 2023.

  12. arXiv:2211.06295  [pdf

    cs.CY physics.flu-dyn q-bio.PE q-bio.QM

    A novel approach to preventing SARS-CoV-2 transmission in classrooms: An OpenFOAM based CFD Study

    Authors: Anish Pal, Riddhideep Biswas, Ritam Pal, Sourav Sarkar, Achintya Mukhopadhyay

    Abstract: The education sector has suffered a catastrophic setback due to ongoing COVID-pandemic, with classrooms being closed indefinitely. The current study aims to solve the existing dilemma by examining COVID transmission inside a classroom and providing long-term sustainable solutions. In this work, a standard 5m x 3m x 5m classroom is considered where 24 students are seated, accompanied by a teacher.… ▽ More

    Submitted 12 October, 2022; originally announced November 2022.

  13. Understanding the classes better with class-specific and rule-specific feature selection, and redundancy control in a fuzzy rule based framework

    Authors: Suchismita Das, Nikhil R. Pal

    Abstract: Recently, several studies have claimed that using class-specific feature subsets provides certain advantages over using a single feature subset for representing the data for a classification problem. Unlike traditional feature selection methods, the class-specific feature selection methods select an optimal feature subset for each class. Typically class-specific feature selection (CSFS) methods us… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

    Journal ref: Lecture Notes in Computer Science, vol 13756. Springer, Cham, 2022

  14. arXiv:2206.08977  [pdf

    cs.CV cs.CL

    BN-HTRd: A Benchmark Dataset for Document Level Offline Bangla Handwritten Text Recognition (HTR) and Line Segmentation

    Authors: Md. Ataur Rahman, Nazifa Tabassum, Mitu Paul, Riya Pal, Mohammad Khairul Islam

    Abstract: We introduce a new dataset for offline Handwritten Text Recognition (HTR) from images of Bangla scripts comprising words, lines, and document-level annotations. The BN-HTRd dataset is based on the BBC Bangla News corpus, meant to act as ground truth texts. These texts were subsequently used to generate the annotations that were filled out by people with their handwriting. Our dataset includes 788… ▽ More

    Submitted 29 May, 2022; originally announced June 2022.

  15. arXiv:2201.03187  [pdf, other

    cs.LG cs.AI

    An Adaptive Neuro-Fuzzy System with Integrated Feature Selection and Rule Extraction for High-Dimensional Classification Problems

    Authors: Guangdong Xue, Qin Chang, Jian Wang, Kai Zhang, Nikhil R. Pal

    Abstract: A major limitation of fuzzy or neuro-fuzzy systems is their failure to deal with high-dimensional datasets. This happens primarily due to the use of T-norm, particularly, product or minimum (or a softer version of it). Thus, there are hardly any work dealing with datasets with dimensions more than hundred or so. Here, we propose a neuro-fuzzy framework that can handle datasets with dimensions even… ▽ More

    Submitted 10 January, 2022; originally announced January 2022.

  16. arXiv:2110.01660  [pdf, other

    cs.CV eess.IV

    HDR-cGAN: Single LDR to HDR Image Translation using Conditional GAN

    Authors: Prarabdh Raipurkar, Rohil Pal, Shanmuganathan Raman

    Abstract: The prime goal of digital imaging techniques is to reproduce the realistic appearance of a scene. Low Dynamic Range (LDR) cameras are incapable of representing the wide dynamic range of the real-world scene. The captured images turn out to be either too dark (underexposed) or too bright (overexposed). Specifically, saturation in overexposed regions makes the task of reconstructing a High Dynamic R… ▽ More

    Submitted 15 October, 2021; v1 submitted 4 October, 2021; originally announced October 2021.

    Comments: Accepted in ICVGIP 2021

  17. arXiv:2105.01792  [pdf, other

    cs.PF eess.SY q-fin.RM

    Aggregate Cyber-Risk Management in the IoT Age: Cautionary Statistics for (Re)Insurers and Likes

    Authors: Ranjan Pal, Ziyuan Huang, Xinlong Yin, Sergey Lototsky, Swades De, Sasu Tarkoma, Mingyan Liu, Jon Crowcroft, Nishanth Sastry

    Abstract: In this paper, we provide (i) a rigorous general theory to elicit conditions on (tail-dependent) heavy-tailed cyber-risk distributions under which a risk management firm might find it (non)sustainable to provide aggregate cyber-risk coverage services for smart societies, and (ii)a real-data driven numerical study to validate claims made in theory assuming boundedly rational cyber-risk managers, al… ▽ More

    Submitted 4 May, 2021; originally announced May 2021.

    Comments: incrementally updated version to version in IEEE Internet of Things Journal

  18. arXiv:2104.01131  [pdf

    cs.CL cs.SI

    Mining Trends of COVID-19 Vaccine Beliefs on Twitter with Lexical Embeddings

    Authors: Harshita Chopra, Aniket Vashishtha, Ridam Pal, Ashima, Ananya Tyagi, Tavpritesh Sethi

    Abstract: Social media plays a pivotal role in disseminating news globally and acts as a platform for people to express their opinions on various topics. A wide variety of views accompanies COVID-19 vaccination drives across the globe, often colored by emotions, which change along with rising cases, approval of vaccines, and multiple factors discussed online. This study aims at analyzing the temporal evolut… ▽ More

    Submitted 20 July, 2021; v1 submitted 2 April, 2021; originally announced April 2021.

  19. arXiv:2104.00137  [pdf, ps, other

    cs.LG

    Achieving Transparency Report Privacy in Linear Time

    Authors: Chien-Lun Chen, Leana Golubchik, Ranjan Pal

    Abstract: An accountable algorithmic transparency report (ATR) should ideally investigate the (a) transparency of the underlying algorithm, and (b) fairness of the algorithmic decisions, and at the same time preserve data subjects' privacy. However, a provably formal study of the impact to data subjects' privacy caused by the utility of releasing an ATR (that investigates transparency and fairness), is yet… ▽ More

    Submitted 15 April, 2021; v1 submitted 31 March, 2021; originally announced April 2021.

    Comments: 56 pages, 5 figures, accepted in ACM Journal of Data and Information Quality (JDIQ), Special Issue on Data Transparency

  20. arXiv:2103.16216  [pdf, other

    cs.GT cs.CR

    A Regulatory System for Optimal Legal Transaction Throughput in Cryptocurrency Blockchains

    Authors: Aditya Ahuja, Vinay J. Ribeiro, Ranjan Pal

    Abstract: Permissionless blockchain consensus protocols have been designed primarily for defining decentralized economies for the commercial trade of assets, both virtual and physical, using cryptocurrencies. In most instances, the assets being traded are regulated, which mandates that the legal right to their trade and their trade value are determined by the governmental regulator of the jurisdiction in wh… ▽ More

    Submitted 30 March, 2021; originally announced March 2021.

  21. arXiv:2012.10422  [pdf

    cs.HC

    Smart Refrigerator using Internet of Things and Android

    Authors: Abhishek Das, Vivek Dhuri, Ranjushree Pal

    Abstract: The kitchen is regarded as the central unit of the traditional as well as modern homes. It is where people cook meals and where our families sit together to eat food. The refrigerator is the pivotal of all that, and hence it plays an important part in our regular lives. The idea of this project is to improvise the normal refrigerator into a smart one by making it to place order for food items and… ▽ More

    Submitted 18 December, 2020; originally announced December 2020.

  22. arXiv:2012.08729  [pdf, ps, other

    cs.SI

    Data Trading with a Monopoly Social Network: Outcomes are Mostly Privacy Welfare Damaging

    Authors: Ranjan Pal, Junhui Li, Yixuan Wang, Mingyan Liu, Swades De, Jon Crowcroft

    Abstract: This paper argues that data of strategic individuals with heterogeneous privacy valuations in a distributed online social network (e.g., Facebook) will be under-priced, if traded in a monopoly buyer setting, and will lead to diminishing utilitarian welfare. This result, for a certain family of online community data trading problems, is in stark contrast to a popular information economics intuition… ▽ More

    Submitted 24 November, 2021; v1 submitted 15 December, 2020; originally announced December 2020.

    Comments: incrementally updated version to version in IEEE Networking Letters; This work is based upon results in NBER w26296

  23. arXiv:2012.05484  [pdf, other

    cs.CY

    Preference-Based Privacy Trading

    Authors: Ranjan Pal, Yixuan Wang, Swades De, Bodhibrata Nag, Pan Hui

    Abstract: The question we raise through this paper is: Is it economically feasible to trade consumer personal information with their formal consent (permission) and in return provide them incentives (monetary or otherwise)?. In view of (a) the behavioral assumption that humans are `compromising' beings and have privacy preferences, (b) privacy as a good not having strict boundaries, and (c) the practical in… ▽ More

    Submitted 10 December, 2020; originally announced December 2020.

    Comments: an extended and modified version of this report appears in IEEE Access, 2020

  24. arXiv:2010.16357  [pdf, other

    cs.CL cs.AI cs.LG

    A Cross-lingual Natural Language Processing Framework for Infodemic Management

    Authors: Ridam Pal, Rohan Pandey, Vaibhav Gautam, Kanav Bhagat, Tavpritesh Sethi

    Abstract: The COVID-19 pandemic has put immense pressure on health systems which are further strained due to the misinformation surrounding it. Under such a situation, providing the right information at the right time is crucial. There is a growing demand for the management of information spread using Artificial Intelligence. Hence, we have exploited the potential of Natural Language Processing for identify… ▽ More

    Submitted 30 October, 2020; originally announced October 2020.

    Comments: 8 Pages, 2 Figures, 3 Tables

  25. Investigation of REFINED CNN ensemble learning for anti-cancer drug sensitivity prediction

    Authors: Omid Bazgir, Souparno Ghosh, Ranadip Pal

    Abstract: Anti-cancer drug sensitivity prediction using deep learning models for individual cell line is a significant challenge in personalized medicine. REFINED (REpresentation of Features as Images with NEighborhood Dependencies) CNN (Convolutional Neural Network) based models have shown promising results in drug sensitivity prediction. The primary idea behind REFINED CNN is representing high dimensional… ▽ More

    Submitted 24 April, 2021; v1 submitted 8 September, 2020; originally announced September 2020.

  26. arXiv:2007.05637  [pdf, ps, other

    cs.DS cs.SI

    Multilevel Digital Contact Tracing

    Authors: Gautam Mahapatra, Priodyuti Pradhan, Abhinandan Khan, Sanjit Kumar Setua, Rajat Kumar Pal, Ayush Rathor

    Abstract: Digital contact tracing plays a crucial role in alleviating an outbreak, and designing multilevel digital contact tracing for a country is an open problem due to the analysis of large volumes of temporal contact data. We develop a multilevel digital contact tracing framework that constructs dynamic contact graphs from the proximity contact data. Prominently, we introduce the edge label of the cont… ▽ More

    Submitted 18 May, 2024; v1 submitted 10 July, 2020; originally announced July 2020.

    Comments: 21 Pages, 14 Figures with Appendix

  27. arXiv:2004.03922  [pdf, other

    cs.LG cs.HC stat.ML

    Nonlinear Dimensionality Reduction for Data Visualization: An Unsupervised Fuzzy Rule-based Approach

    Authors: Suchismita Das, Nikhil R. Pal

    Abstract: Here, we propose an unsupervised fuzzy rule-based dimensionality reduction method primarily for data visualization. It considers the following important issues relevant to dimensionality reduction-based data visualization: (i) preservation of neighborhood relationships, (ii) handling data on a non-linear manifold, (iii) the capability of predicting projections for new test data points, (iv) interp… ▽ More

    Submitted 8 April, 2020; originally announced April 2020.

    Journal ref: IEEE Transactions on Fuzzy Systems ( Volume: 30, Issue: 7, July 2022)

  28. arXiv:2004.01964   

    cs.IT

    Uplink and Downlink Performance Bounds for Full Duplex Cellular Networks

    Authors: Askar Mandali Kundu, Rudrashish Pal, Mayank Kumar, Sreejith T V

    Abstract: With Full Duplex (FD), wireless terminal is capable of transmitting and receiving data simultaneously in the same frequency resources, however, it introduces self interference and co-channel interference. Even though various signal processing techniques are emerged to cancel the self interference, the bottleneck for FD performance in cellular systems is the co-channel interference from the other u… ▽ More

    Submitted 31 January, 2023; v1 submitted 4 April, 2020; originally announced April 2020.

    Comments: no longer valid

  29. arXiv:2004.00959  [pdf, other

    q-bio.PE cs.LG

    Neural network based country wise risk prediction of COVID-19

    Authors: Ratnabali Pal, Arif Ahmed Sekh, Samarjit Kar, Dilip K. Prasad

    Abstract: The recent worldwide outbreak of the novel coronavirus (COVID-19) has opened up new challenges to the research community. Artificial intelligence (AI) driven methods can be useful to predict the parameters, risks, and effects of such an epidemic. Such predictions can be helpful to control and prevent the spread of such diseases. The main challenges of applying AI is the small volume of data and th… ▽ More

    Submitted 16 September, 2020; v1 submitted 31 March, 2020; originally announced April 2020.

    Journal ref: Applied Sciences, 2020

  30. arXiv:2003.07074  [pdf

    cs.CY cs.CL cs.LG

    A Machine Learning Application for Raising WASH Awareness in the Times of COVID-19 Pandemic

    Authors: Rohan Pandey, Vaibhav Gautam, Ridam Pal, Harsh Bandhey, Lovedeep Singh Dhingra, Himanshu Sharma, Chirag Jain, Kanav Bhagat, Arushi, Lajjaben Patel, Mudit Agarwal, Samprati Agrawal, Rishabh Jalan, Akshat Wadhwa, Ayush Garg, Vihaan Misra, Yashwin Agrawal, Bhavika Rana, Ponnurangam Kumaraguru, Tavpritesh Sethi

    Abstract: Background: The COVID-19 pandemic has uncovered the potential of digital misinformation in sha** the health of nations. The deluge of unverified information that spreads faster than the epidemic itself is an unprecedented phenomenon that has put millions of lives in danger. Mitigating this Infodemic requires strong health messaging systems that are engaging, vernacular, scalable, effective and c… ▽ More

    Submitted 30 October, 2020; v1 submitted 16 March, 2020; originally announced March 2020.

    Comments: 14 pages, 7 figures

  31. arXiv:1912.05687  [pdf, other

    cs.LG cs.CV stat.ML

    REFINED (REpresentation of Features as Images with NEighborhood Dependencies): A novel feature representation for Convolutional Neural Networks

    Authors: Omid Bazgir, Ruibo Zhang, Saugato Rahman Dhruba, Raziur Rahman, Souparno Ghosh, Ranadip Pal

    Abstract: Deep learning with Convolutional Neural Networks has shown great promise in various areas of image-based classification and enhancement but is often unsuitable for predictive modeling involving non-image based features or features without spatial correlations. We present a novel approach for representation of high dimensional feature vector in a compact image form, termed REFINED (REpresentation o… ▽ More

    Submitted 15 May, 2020; v1 submitted 11 December, 2019; originally announced December 2019.

  32. arXiv:1910.10758  [pdf

    cs.IR cs.CY cs.HC

    A Novel Approach for Automatic Bengali Question Answering System using Semantic Similarity Analysis

    Authors: Arijit Das, Jaydeep Mandal, Zargham Danial, Alok Ranjan Pal, Diganta Saha

    Abstract: Finding the semantically accurate answer is one of the key challenges in advanced searching. In contrast to keyword-based searching, the meaning of a question or query is important here and answers are ranked according to relevance. It is very natural that there is almost no common word between the question sentence and the answer sentence. In this paper, an approach is described to find out the s… ▽ More

    Submitted 23 October, 2019; originally announced October 2019.

    Comments: 14 pages, 5 figures

  33. arXiv:1906.02772  [pdf

    eess.SP cs.LG

    Adaptive Subspace Sampling for Class Imbalance Processing-Some clarifications, algorithm, and further investigation including applications to Brain Computer Interface

    Authors: Chin-Teng Lin, Kuan-Chih Huang, Yu-Ting Liu, Yang-Yin Lin, Tsung-Yu Hsieh, Nikhil R. Pal, Shang-Lin Wu, Chieh-Ning Fang, Zehong Cao

    Abstract: Kohonen's Adaptive Subspace Self-Organizing Map (ASSOM) learns several subspaces of the data where each subspace represents some invariant characteristics of the data. To deal with the imbalance classification problem, earlier we have proposed a method for oversampling the minority class using Kohonen's ASSOM. This investigation extends that study, clarifies some issues related to our earlier work… ▽ More

    Submitted 7 October, 2020; v1 submitted 26 May, 2019; originally announced June 2019.

    Comments: The current version is accepted by iFuzzy 2020

  34. arXiv:1809.06675  [pdf

    cs.HC

    Dynamically Weighted Ensemble-based Prediction System for Adaptively Modeling Driver Reaction Time

    Authors: Chun-Hsiang Chuang, Zehong Cao, Po-Tsang Chen, Chih-Sheng Huang, Nikhil R. Pal, Chin-Teng Lin

    Abstract: Predicting a driver's cognitive state, or more specifically, modeling a driver's reaction time (RT) in response to the appearance of a potential hazard warrants urgent research. In the last two decades, the electric field that is generated by the activities in the brain, monitored by an electroencephalogram (EEG), has been proven to be a robust physiological indicator of human behavior. However, m… ▽ More

    Submitted 26 May, 2019; v1 submitted 18 September, 2018; originally announced September 2018.

    Comments: Revision submitted to IEEE Transactions on Biomedical Engineering

  35. arXiv:1704.00845  [pdf, other

    cs.DC cs.GT

    The Cloudlet Bazaar Dynamic Markets for the Small Cloud

    Authors: Ranjan Pal, Sung-Han Lin, Aditya Ahujay, Leana Golubchik

    Abstract: The recent emergence of the small cloud (SC), both in concept and in practice, has been driven mainly by issues related to service cost and complexity of commercial cloud providers (e.g., Amazon) employing massive data centers. However, the resource inelasticity problem faced by the SCs due to their relatively scarce resources (e.g., virtual machines) might lead to a potential degradation of custo… ▽ More

    Submitted 13 February, 2018; v1 submitted 3 April, 2017; originally announced April 2017.

  36. arXiv:1703.10318  [pdf, other

    cs.DC

    SC-Share: Performance Driven Resource Sharing Markets for the Small Cloud

    Authors: Sung-Han Lin, Ranjan Pal, Marco Paolieri, Leana Golubchik

    Abstract: Small-scale clouds (SCs) often suffer from resource under-provisioning during peak demand, leading to inability to satisfy service level agreements (SLAs) and consequent loss of customers. One approach to address this problem is for a set of autonomous SCs to share resources among themselves in a cost-induced cooperative fashion, thereby increasing their individual capacities (when needed) without… ▽ More

    Submitted 6 August, 2017; v1 submitted 30 March, 2017; originally announced March 2017.

    Comments: To be published in ICDCS 2017

  37. Detection of Slang Words in e-Data using semi-Supervised Learning

    Authors: Alok Ranjan Pal, Diganta Saha

    Abstract: The proposed algorithmic approach deals with finding the sense of a word in an electronic data. Now a day,in different communication mediums like internet, mobile services etc. people use few words, which are slang in nature. This approach detects those abusive words using supervised learning procedure. But in the real life scenario, the slang words are not used in complete word forms always. Most… ▽ More

    Submitted 19 November, 2015; originally announced February 2017.

    Comments: 13 pages in International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 4, No. 5, September 2013

  38. A Hybrid Approach to Word Sense Disambiguation Combining Supervised and Unsupervised Learning

    Authors: Alok Ranjan Pal, Anirban Kundu, Abhay Singh, Raj Shekhar, Kunal Sinha

    Abstract: In this paper, we are going to find meaning of words based on distinct situations. Word Sense Disambiguation is used to find meaning of words based on live contexts using supervised and unsupervised approaches. Unsupervised approaches use online dictionary for learning, and supervised approaches use manual learning sets. Hand tagged data are populated which might not be effective and sufficient fo… ▽ More

    Submitted 19 November, 2015; originally announced November 2016.

    Comments: 13 pages in International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 4, No. 4, July 2013

  39. An Approach to Speed-up the Word Sense Disambiguation Procedure through Sense Filtering

    Authors: Alok Ranjan Pal, Anupam Munshi, Diganta Saha

    Abstract: In this paper, we are going to focus on speed up of the Word Sense Disambiguation procedure by filtering the relevant senses of an ambiguous word through Part-of-Speech Tagging. First, this proposed approach performs the Part-of-Speech Tagging operation before the disambiguation procedure using Bigram approximation. As a result, the exact Part-of-Speech of the ambiguous word at a particular text i… ▽ More

    Submitted 19 November, 2015; originally announced October 2016.

    Comments: 13 pages in International Journal of Instrumentation and Control Systems (IJICS) Vol.3, No.4, October 2013

  40. arXiv:1607.07848  [pdf, ps, other

    cs.RO eess.SY

    Towards Controllability of Wireless Network Quality using Mobile Robotic Routers

    Authors: Pradipta Ghosh, Raktim Pal, Bhaskar Krishnamachari

    Abstract: We consider a problem of robotic router placement and mobility control with the objective of formation and maintenance of an optimal communication network between a set of transmitter-receiver pairs. In this scenario, the communication path between any transmitter-receiver pair contains a predetermined set of mobile robotic routers nodes. The goal of this work is to design an algorithm to optimize… ▽ More

    Submitted 26 July, 2016; originally announced July 2016.

  41. arXiv:1607.02598  [pdf, other

    cs.GT

    Security Pricing as an Enabler of Cyber-Insurance: A First Look at Differentiated Pricing Markets

    Authors: Ranjan Pal, Leana Golubchik, Konstantinos Psounis, Pan Hui

    Abstract: Despite the promising potential of network risk management services (e.g., cyber-insurance) to improve information security, their deployment is relatively scarce, primarily due to such service companies being unable to guarantee profitability. As a novel approach to making cyber-insurance services more viable, we explore a symbiotic relationship between security vendors (e.g., Symantec) capable o… ▽ More

    Submitted 9 July, 2016; originally announced July 2016.

    Comments: arXiv admin note: text overlap with arXiv:1101.5617 by other authors without attribution

  42. arXiv:1509.03221  [pdf

    cs.AI cs.NE

    Recurrent Neural Network Based Modeling of Gene Regulatory Network Using Bat Algorithm

    Authors: Sudip Mandal, Goutam Saha, Rajat K. Pal

    Abstract: Correct inference of genetic regulations inside a cell is one of the greatest challenges in post genomic era for the biologist and researchers. Several intelligent techniques and models were already proposed to identify the regulatory relations among genes from the biological database like time series microarray data. Recurrent Neural Network (RNN) is one of the most popular and simple approach to… ▽ More

    Submitted 2 August, 2017; v1 submitted 21 August, 2015; originally announced September 2015.

    Comments: 14 pages, 4 figure. arXiv admin note: text overlap with arXiv:1004.4170 by other authors

  43. Automatic classification of bengali sentences based on sense definitions present in bengali wordnet

    Authors: Alok Ranjan Pal, Diganta Saha, Niladri Sekhar Dash

    Abstract: Based on the sense definition of words available in the Bengali WordNet, an attempt is made to classify the Bengali sentences automatically into different groups in accordance with their underlying senses. The input sentences are collected from 50 different categories of the Bengali text corpus developed in the TDIL project of the Govt. of India, while information about the different senses of par… ▽ More

    Submitted 6 August, 2015; originally announced August 2015.

    Comments: International Journal of Control Theory and Computer Modeling (IJCTCM) Vol.5, No.1, January 2015

  44. Word sense disambiguation: a survey

    Authors: Alok Ranjan Pal, Diganta Saha

    Abstract: In this paper, we made a survey on Word Sense Disambiguation (WSD). Near about in all major languages around the world, research in WSD has been conducted upto different extents. In this paper, we have gone through a survey regarding the different approaches adopted in different research works, the State of the Art in the performance in this domain, recent works in different Indian languages and f… ▽ More

    Submitted 6 August, 2015; originally announced August 2015.

    Comments: International Journal of Control Theory and Computer Modeling (IJCTCM) Vol.5, No.3, July 2015

  45. arXiv:1202.0885  [pdf, ps, other

    cs.CR

    The Impact of Secure OSs on Internet Security: What Cyber-Insurers Need to Know

    Authors: Ranjan Pal, Pan Hui

    Abstract: In recent years, researchers have proposed \emph{cyber-insurance} as a suitable risk-management technique for enhancing security in Internet-like distributed systems. However, amongst other factors, information asymmetry between the insurer and the insured, and the inter-dependent and correlated nature of cyber risks have contributed in a big way to the failure of cyber-insurance markets. Security… ▽ More

    Submitted 4 February, 2012; originally announced February 2012.

  46. arXiv:1202.0884  [pdf, ps, other

    cs.CR

    Cyber-Insurance in Internet Security: A Dig into the Information Asymmetry Problem

    Authors: Ranjan Pal

    Abstract: Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as \emph{self-defense} mechanisms. However, according to security experts, such software… ▽ More

    Submitted 4 February, 2012; originally announced February 2012.

    Comments: arXiv admin note: substantial text overlap with arXiv:1103.1552

  47. arXiv:1107.4785  [pdf, ps, other

    cs.CR

    A Novel Cyber-Insurance for Internet Security

    Authors: Ranjan Pal, Leana Golubchik, Konstantinos Psounis

    Abstract: Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk eliminati… ▽ More

    Submitted 24 July, 2011; originally announced July 2011.

  48. arXiv:1104.0594  [pdf, ps, other

    cs.CR

    Modeling Internet Security Investments: The Case of Dealing with Information Uncertainty

    Authors: Ranjan Pal, Pan Hui

    Abstract: Modern distributed communication networks like the Internet and censorship-resistant networks (also a part of the Internet) are characterized by nodes (users) interconnected with one another via communication links. In this regard, the security of individual nodes depend not only on their own efforts, but also on the efforts and underlying connectivity structure of neighboring network nodes. By th… ▽ More

    Submitted 4 April, 2011; originally announced April 2011.

  49. arXiv:1103.1552  [pdf, ps, other

    cs.CR

    Pricing and Investments in Internet Security: A Cyber-Insurance Perspective

    Authors: Ranjan Pal, Leana Golubchik

    Abstract: Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as self-defense mechanisms. However, such software does not completely eliminate risk. R… ▽ More

    Submitted 8 March, 2011; originally announced March 2011.

  50. arXiv:1103.1544  [pdf, ps, other

    cs.NI cs.SI

    Cost Sharing in Social Community Networks

    Authors: Ranjan Pal, Aravind Kailas

    Abstract: Wireless social community networks (WSCNs) is an emerging technology that operate in the unlicensed spectrum and have been created as an alternative to cellular wireless networks for providing low-cost, high speed wireless data access in urban areas. WSCNs is an upcoming idea that is starting to gain attention amongst the civilian Internet users. By using \emph{special} WiFi routers that are provi… ▽ More

    Submitted 8 March, 2011; originally announced March 2011.