-
A Finite State Transducer Based Morphological Analyzer of Maithili Language
Authors:
Raza Rahi,
Sumant Pushp,
Arif Khan,
Smriti Kumar Sinha
Abstract:
Morphological analyzers are the essential milestones for many linguistic applications like; machine translation, word sense disambiguation, spells checkers, and search engines etc. Therefore, development of an effective morphological analyzer has a greater impact on the computational recognition of a language. In this paper, we present a finite state transducer based inflectional morphological ana…
▽ More
Morphological analyzers are the essential milestones for many linguistic applications like; machine translation, word sense disambiguation, spells checkers, and search engines etc. Therefore, development of an effective morphological analyzer has a greater impact on the computational recognition of a language. In this paper, we present a finite state transducer based inflectional morphological analyzer for a resource poor language of India, known as Maithili. Maithili is an eastern Indo-Aryan language spoken in the eastern and northern regions of Bihar in India and the southeastern plains, known as tarai of Nepal. This work can be recognized as the first work towards the computational development of Maithili which may attract researchers around the country to up-rise the language to establish in computational world.
△ Less
Submitted 29 February, 2020;
originally announced March 2020.
-
Declarative Memory-based Structure for the Representation of Text Data
Authors:
Sumant Pushp,
Pragya Kashmira,
Shyamanta M Hazarika
Abstract:
In the era of intelligent computing, computational progress in text processing is an essential consideration. Many systems have been developed to process text over different languages. Though, there is considerable development, they still lack in understanding of the text, i.e., instead of kee** text as knowledge, many treat text as a data. In this work we introduce a text representation scheme…
▽ More
In the era of intelligent computing, computational progress in text processing is an essential consideration. Many systems have been developed to process text over different languages. Though, there is considerable development, they still lack in understanding of the text, i.e., instead of kee** text as knowledge, many treat text as a data. In this work we introduce a text representation scheme which is influenced by human memory infrastructure. Since texts are declarative in nature, a structural organization would foster efficient computation over text. We exploit long term episodic memory to keep text information observed over time. This not only keep fragments of text in an organized fashion but also reduces redundancy and stores the temporal relation among them. Wordnet has been used to imitate semantic memory, which works at word level to facilitate the understanding about individual words within text. Experimental results of various operation performed over episodic memory and growth of knowledge infrastructure over time is reported.
△ Less
Submitted 24 February, 2020;
originally announced February 2020.
-
Computation of Jacobi sums of order l^2 and 2l^2 with prime l
Authors:
Md. Helal Ahmed,
Dr. Jagmohan Tanti,
Sumant Pushp
Abstract:
In this paper, we present the fast computational algorithms for the Jacobi sums of orders $l^2$ and $2l^{2}$ with odd prime $l$ by formulating them in terms of the minimum number of cyclotomic numbers of the corresponding orders. We also implement two additional algorithms to validate these formulae, which are also useful for the demonstration of the minimality of cyclotomic numbers required.
In this paper, we present the fast computational algorithms for the Jacobi sums of orders $l^2$ and $2l^{2}$ with odd prime $l$ by formulating them in terms of the minimum number of cyclotomic numbers of the corresponding orders. We also implement two additional algorithms to validate these formulae, which are also useful for the demonstration of the minimality of cyclotomic numbers required.
△ Less
Submitted 25 November, 2019; v1 submitted 8 August, 2019;
originally announced August 2019.
-
A Public-Key Cryptosystem Using Cyclotomic Matrices
Authors:
Md. Helal Ahmed,
Jagmohan Tanti,
Sumant Pushp
Abstract:
Confidentiality and Integrity are two paramount objectives in the evaluation of information and communication technology. In this paper, we propose an arithmetic approach for designing asymmetric key cryptography. Our method is based on the formulation of cyclotomic matrices correspond to the diophantine system. The proposed cyclotomic asymmetric cryptosystem (CAC) utilizes the cyclotomic matrices…
▽ More
Confidentiality and Integrity are two paramount objectives in the evaluation of information and communication technology. In this paper, we propose an arithmetic approach for designing asymmetric key cryptography. Our method is based on the formulation of cyclotomic matrices correspond to the diophantine system. The proposed cyclotomic asymmetric cryptosystem (CAC) utilizes the cyclotomic matrices, whose entries are cyclotomic numbers of order $2l^{2}$, $l$ be prime over a finite field $\mathbb{F}_{p}$ of $p$ elements. The method utilize cyclotomic matrices to design a one-way function. The outcome of a one-way function that is efficient to compute however difficult to compute its inverse unless if secret data about the trapdoor is known. We demonstrate that the encryption and decryption can be efficiently performed with asymptotic complexity of $\mathcal{O}(e^{2.373})$. Besides, we study the computational complexity of the CAC.
△ Less
Submitted 15 May, 2020; v1 submitted 17 June, 2019;
originally announced June 2019.
-
DeepWear: Adaptive Local Offloading for On-Wearable Deep Learning
Authors:
Mengwei Xu,
Feng Qian,
Mengze Zhu,
Feifan Huang,
Saumay Pushp,
Xuanzhe Liu
Abstract:
Due to their on-body and ubiquitous nature, wearables can generate a wide range of unique sensor data creating countless opportunities for deep learning tasks. We propose DeepWear, a deep learning (DL) framework for wearable devices to improve the performance and reduce the energy footprint. DeepWear strategically offloads DL tasks from a wearable device to its paired handheld device through local…
▽ More
Due to their on-body and ubiquitous nature, wearables can generate a wide range of unique sensor data creating countless opportunities for deep learning tasks. We propose DeepWear, a deep learning (DL) framework for wearable devices to improve the performance and reduce the energy footprint. DeepWear strategically offloads DL tasks from a wearable device to its paired handheld device through local network. Compared to the remote-cloud-based offloading, DeepWear requires no Internet connectivity, consumes less energy, and is robust to privacy breach. DeepWear provides various novel techniques such as context-aware offloading, strategic model partition, and pipelining support to efficiently utilize the processing capacity from nearby paired handhelds. Deployed as a user-space library, DeepWear offers developer-friendly APIs that are as simple as those in traditional DL libraries such as TensorFlow. We have implemented DeepWear on the Android OS and evaluated it on COTS smartphones and smartwatches with real DL models. DeepWear brings up to 5.08X and 23.0X execution speedup, as well as 53.5% and 85.5% energy saving compared to wearable-only and handheld-only strategies, respectively.
△ Less
Submitted 12 January, 2021; v1 submitted 1 December, 2017;
originally announced December 2017.
-
Merging Two Arima Models for Energy Optimization in WSN
Authors:
Saumay Pushp
Abstract:
Use of ARIMA model in Sensor network The basic idea of our energy efficient information collection scheme is to suppress data transmission if the data sampled by sensor nodes are predictable by the sink node. This is done in two phases
1) Preliminary Data Collection- During this phase sink node collects enough data so that it can build up ARIMA model for each node. Then sink node selects a model…
▽ More
Use of ARIMA model in Sensor network The basic idea of our energy efficient information collection scheme is to suppress data transmission if the data sampled by sensor nodes are predictable by the sink node. This is done in two phases
1) Preliminary Data Collection- During this phase sink node collects enough data so that it can build up ARIMA model for each node. Then sink node selects a model for the particular node and sends back the corresponding model parameters to the node and also keeps them with it. Selecting the model for a node there is a tradeoff between energy consumption and accuracy of prediction. So we choose the model according to C = α xMAE + (1 - α) x rtran 0=< α =<1 where the model should minimize C. Here MAE is Mean Absolute Error which is normalized by some predefined error tolerance and rtran is the ratio of number of samples transmitted over total number of samples.
2) Adaptive Data Collection- After the sensor node has received the model parameters it checks each actual data value with the data value calculated from the parameters received. If there is deviation beyond some predefined error tolerance then only it sends the original data value to the sink node.
△ Less
Submitted 28 June, 2010;
originally announced June 2010.
-
Hybrid CDN structure with a P2P based streaming protocol
Authors:
Saumay Pushp,
Priya Ranjan
Abstract:
Over the last decade, internet has seen an exponential increase in its growth.With more and more people using it, efficient data delivery over the internet has become a key issue. Peer-to-peer (P2P)/seed sharing based networks have several desirable features for content distribution, such as low costs, scalability, and fault tolerance. While the invention of each of such specialized systems has im…
▽ More
Over the last decade, internet has seen an exponential increase in its growth.With more and more people using it, efficient data delivery over the internet has become a key issue. Peer-to-peer (P2P)/seed sharing based networks have several desirable features for content distribution, such as low costs, scalability, and fault tolerance. While the invention of each of such specialized systems has improved the user experience, some fundamental shortcomings of these systems have often been neglected. These shortcomings of content distribution systems have become severe bottlenecks in scalability of the internet.In order to combine the desired features of classical Content Distribution Networks (CDNs) and P2P/seed sharing based networks, we propose a hybrid CDN structure with a P2P/seed sharing based streaming protocol in the access network . In this work, we focus on the problem of data redundancy (at each node) and show how severely it impacts the network economics and the experience of end-user and hence leads to low traffic load and redundancy
△ Less
Submitted 17 April, 2010;
originally announced April 2010.