Skip to main content

Showing 1–10 of 10 results for author: Raja, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.00332  [pdf, other

    cs.CL cs.AI cs.LG

    A Careful Examination of Large Language Model Performance on Grade School Arithmetic

    Authors: Hugh Zhang, Jeff Da, Dean Lee, Vaughn Robinson, Catherine Wu, Will Song, Tiffany Zhao, Pranav Raja, Dylan Slack, Qin Lyu, Sean Hendryx, Russell Kaplan, Michele Lunati, Summer Yue

    Abstract: Large language models (LLMs) have achieved impressive success on many benchmarks for mathematical reasoning. However, there is growing concern that some of this performance actually reflects dataset contamination, where data closely resembling benchmark questions leaks into the training data, instead of true reasoning ability. To investigate this claim rigorously, we commission Grade School Math 1… ▽ More

    Submitted 3 May, 2024; v1 submitted 1 May, 2024; originally announced May 2024.

  2. arXiv:2303.12748  [pdf, other

    cs.CV cs.LG

    Enabling Calibration In The Zero-Shot Inference of Large Vision-Language Models

    Authors: Will LeVine, Benjamin Pikus, Pranav Raja, Fernando Amat Gil

    Abstract: Calibration of deep learning models is crucial to their trustworthiness and safe usage, and as such, has been extensively studied in supervised classification models, with methods crafted to decrease miscalibration. However, there has yet to be a comprehensive study of the calibration of vision-language models that are used for zero-shot inference, like CLIP. We measure calibration across relevant… ▽ More

    Submitted 18 April, 2023; v1 submitted 11 March, 2023; originally announced March 2023.

  3. End-to-end deep learning for directly estimating grape yield from ground-based imagery

    Authors: Alexander G. Olenskyj, Brent S. Sams, Zhenghao Fei, Vishal Singh, Pranav V. Raja, Gail M. Bornhorst, J. Mason Earles

    Abstract: Yield estimation is a powerful tool in vineyard management, as it allows growers to fine-tune practices to optimize yield and quality. However, yield estimation is currently performed using manual sampling, which is time-consuming and imprecise. This study demonstrates the application of proximal imaging combined with deep learning for yield estimation in vineyards. Continuous data collection usin… ▽ More

    Submitted 3 August, 2022; originally announced August 2022.

    Journal ref: Comput. Electron. Agric. 198 (2022)

  4. arXiv:2203.09674  [pdf

    eess.IV cs.CV physics.data-an

    A workflow for segmenting soil and plant X-ray CT images with deep learning in Googles Colaboratory

    Authors: Devin A. Rippner, Pranav Raja, J. Mason Earles, Alexander Buchko, Mina Momayyezi, Fiona Duong, Dilworth Parkinson, Elizabeth Forrestel, Ken Shackel, Jeffrey Neyhart, Andrew J. McElrone

    Abstract: X-ray micro-computed tomography (X-ray microCT) has enabled the characterization of the properties and processes that take place in plants and soils at the micron scale. Despite the widespread use of this advanced technique, major limitations in both hardware and software limit the speed and accuracy of image processing and data analysis. Recent advances in machine learning, specifically the appli… ▽ More

    Submitted 21 July, 2022; v1 submitted 17 March, 2022; originally announced March 2022.

    Comments: 58 pages, 9 figures, 2 Tables

  5. arXiv:2112.03205  [pdf, other

    cs.CV

    Simultaneously Predicting Multiple Plant Traits from Multiple Sensors via Deformable CNN Regression

    Authors: Pranav Raja, Alex Olenskyj, Hamid Kamangir, Mason Earles

    Abstract: Trait measurement is critical for the plant breeding and agricultural production pipeline. Typically, a suite of plant traits is measured using laborious manual measurements and then used to train and/or validate higher throughput trait estimation techniques. Here, we introduce a relatively simple convolutional neural network (CNN) model that accepts multiple sensor inputs and predicts multiple co… ▽ More

    Submitted 6 December, 2021; originally announced December 2021.

  6. arXiv:1112.2265  [pdf

    cs.CR cs.NE

    A Novel Approach for Password Authentication Using Bidirectional Associative Memory

    Authors: A. S. N. Chakravarthy, Penmetsa V. Krishna Raja, Prof. P. S. Avadhani

    Abstract: Password authentication is a very important system security procedure to gain access to user resources. In the Traditional password authentication methods a server has check the authenticity of the users. In our proposed method users can freely select their passwords from a predefined character set. They can also use a graphical image as password. The password may be a character or an image it wil… ▽ More

    Submitted 10 December, 2011; originally announced December 2011.

    Comments: 13 pages

    Journal ref: Advanced Computing: An International Journal ( ACIJ ), Vol.2, No.6, November 2011

  7. arXiv:1110.1502  [pdf

    cs.CR

    Hilbert Matrix Based Cryptosystem using a Session Key

    Authors: Penmetsa V. Krishna Raja, A. S. N. Chakravarthy, P. S. Avadhani

    Abstract: Cryptography protects users by providing functionality for the encryption of data and authentication of other users. This technology lets the receiver of an electronic message verify the sender, ensures that a message can be read only by the intended person, and assures the recipient that a message has not be altered in transit. Classical cryptanalysis involves an interesting combination of analyt… ▽ More

    Submitted 7 October, 2011; originally announced October 2011.

    Comments: five pages

    Journal ref: International Journal of Engineering Research and Applications (IJERA) Vol. 1, Issue 3, 2011, pp.711-715

  8. arXiv:1110.1498  [pdf

    cs.CR cs.NI

    A Cryptosystem Based on Hilbert Matrix using Cipher Block Chaining Mode

    Authors: Penmetsa V. Krishna Raja, A. S. N. Chakravarthy, P. S. Avadhani

    Abstract: Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient. While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. Classical cryptanalysis involv… ▽ More

    Submitted 7 October, 2011; originally announced October 2011.

    Comments: six pages; International Journal of Mathematics Trends and Technology- July to Aug Issue 2011

  9. arXiv:1110.1490  [pdf

    cs.CR cs.NE

    A Novel Approach for Pass Word Authentication using Brain -State -In -A Box (BSB) Model

    Authors: A. S. N. Chakravarthy, Penmetsa V. Krishna Raja, P. S Avadhani

    Abstract: Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it's packaging and labelling claims to be, or assuring that a computer program is a trusted one. The authentication of information can pose special problems (especially man-in-the-middle a… ▽ More

    Submitted 7 October, 2011; originally announced October 2011.

    Comments: five pages

    Journal ref: International Journal of Computer Science and Information Technologies (IJCSIT), Volume 2 Issue 5 2011,2127-2131

  10. arXiv:1110.1488  [pdf

    cs.CR

    Handwritten Text Image Authentication using Back Propagation

    Authors: A. S. N. Chakravarthy, Penmetsa V. Krishna Raja, P. S. Avadhani

    Abstract: Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it's packaging and labelling claims to be, or assuring that a computer program is a trusted one. The authentication of information can pose special problems (especially man-in-the-middle a… ▽ More

    Submitted 7 October, 2011; originally announced October 2011.

    Comments: 10 pages pdf file

    Journal ref: International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011