-
Do the Benefits of Joint Models for Relation Extraction Extend to Document-level Tasks?
Authors:
Pratik Saini,
Tapas Nayak,
Indrajit Bhattacharya
Abstract:
Two distinct approaches have been proposed for relational triple extraction - pipeline and joint. Joint models, which capture interactions across triples, are the more recent development, and have been shown to outperform pipeline models for sentence-level extraction tasks. Document-level extraction is a more challenging setting where interactions across triples can be long-range, and individual t…
▽ More
Two distinct approaches have been proposed for relational triple extraction - pipeline and joint. Joint models, which capture interactions across triples, are the more recent development, and have been shown to outperform pipeline models for sentence-level extraction tasks. Document-level extraction is a more challenging setting where interactions across triples can be long-range, and individual triples can also span across sentences. Joint models have not been applied for document-level tasks so far. In this paper, we benchmark state-of-the-art pipeline and joint extraction models on sentence-level as well as document-level datasets. Our experiments show that while joint models outperform pipeline models significantly for sentence-level extraction, their performance drops sharply below that of pipeline models for the document-level dataset.
△ Less
Submitted 1 October, 2023;
originally announced October 2023.
-
90% F1 Score in Relational Triple Extraction: Is it Real ?
Authors:
Pratik Saini,
Samiran Pal,
Tapas Nayak,
Indrajit Bhattacharya
Abstract:
Extracting relational triples from text is a crucial task for constructing knowledge bases. Recent advancements in joint entity and relation extraction models have demonstrated remarkable F1 scores ($\ge 90\%$) in accurately extracting relational triples from free text. However, these models have been evaluated under restrictive experimental settings and unrealistic datasets. They overlook sentenc…
▽ More
Extracting relational triples from text is a crucial task for constructing knowledge bases. Recent advancements in joint entity and relation extraction models have demonstrated remarkable F1 scores ($\ge 90\%$) in accurately extracting relational triples from free text. However, these models have been evaluated under restrictive experimental settings and unrealistic datasets. They overlook sentences with zero triples (zero-cardinality), thereby simplifying the task. In this paper, we present a benchmark study of state-of-the-art joint entity and relation extraction models under a more realistic setting. We include sentences that lack any triples in our experiments, providing a comprehensive evaluation. Our findings reveal a significant decline (approximately 10-15\% in one dataset and 6-14\% in another dataset) in the models' F1 scores within this realistic experimental setup. Furthermore, we propose a two-step modeling approach that utilizes a simple BERT-based classifier. This approach leads to overall performance improvement in these models within the realistic experimental setting.
△ Less
Submitted 27 October, 2023; v1 submitted 20 February, 2023;
originally announced February 2023.
-
Threat Detection In Self-Driving Vehicles Using Computer Vision
Authors:
Umang Goenka,
Aaryan Jagetia,
Param Patil,
Akshay Singh,
Taresh Sharma,
Poonam Saini
Abstract:
On-road obstacle detection is an important field of research that falls in the scope of intelligent transportation infrastructure systems. The use of vision-based approaches results in an accurate and cost-effective solution to such systems. In this research paper, we propose a threat detection mechanism for autonomous self-driving cars using dashcam videos to ensure the presence of any unwanted o…
▽ More
On-road obstacle detection is an important field of research that falls in the scope of intelligent transportation infrastructure systems. The use of vision-based approaches results in an accurate and cost-effective solution to such systems. In this research paper, we propose a threat detection mechanism for autonomous self-driving cars using dashcam videos to ensure the presence of any unwanted obstacle on the road that falls within its visual range. This information can assist the vehicle's program to en route safely. There are four major components, namely, YOLO to identify the objects, advanced lane detection algorithm, multi regression model to measure the distance of the object from the camera, the two-second rule for measuring the safety, and limiting speed. In addition, we have used the Car Crash Dataset(CCD) for calculating the accuracy of the model. The YOLO algorithm gives an accuracy of around 93%. The final accuracy of our proposed Threat Detection Model (TDM) is 82.65%.
△ Less
Submitted 6 September, 2022;
originally announced September 2022.
-
Learning Latent Beliefs and Performing Epistemic Reasoning for Efficient and Meaningful Dialog Management
Authors:
Aishwarya Chhabra,
Pratik Saini,
Amit Sangroya,
C. Anantaram
Abstract:
Many dialogue management frameworks allow the system designer to directly define belief rules to implement an efficient dialog policy. Because these rules are directly defined, the components are said to be hand-crafted. As dialogues become more complex, the number of states, transitions, and policy decisions becomes very large. To facilitate the dialog policy design process, we propose an approac…
▽ More
Many dialogue management frameworks allow the system designer to directly define belief rules to implement an efficient dialog policy. Because these rules are directly defined, the components are said to be hand-crafted. As dialogues become more complex, the number of states, transitions, and policy decisions becomes very large. To facilitate the dialog policy design process, we propose an approach to automatically learn belief rules using a supervised machine learning approach. We validate our ideas in Student-Advisor conversation domain, where we extract latent beliefs like student is curious, confused and neutral, etc. Further, we also perform epistemic reasoning that helps to tailor the dialog according to student's emotional state and hence improve the overall effectiveness of the dialog system. Our latent belief identification approach shows an accuracy of 87% and this results in efficient and meaningful dialog management.
△ Less
Submitted 21 May, 2019; v1 submitted 26 November, 2018;
originally announced November 2018.
-
Time Critical Multitasking for Multicore Microcontroller using XMOS Kit
Authors:
Prerna Saini,
Ankit Bansal,
Abhishek Sharma
Abstract:
This paper presents the research work on multicore microcontrollers using parallel, and time critical programming for the embedded systems. Due to the high complexity and limitations, it is very hard to work on the application development phase on such architectures. The experimental results mentioned in the paper are based on xCORE multicore microcontroller form XMOS. The paper also imitates mult…
▽ More
This paper presents the research work on multicore microcontrollers using parallel, and time critical programming for the embedded systems. Due to the high complexity and limitations, it is very hard to work on the application development phase on such architectures. The experimental results mentioned in the paper are based on xCORE multicore microcontroller form XMOS. The paper also imitates multi-tasking and parallel programming for the same platform. The tasks assigned to multiple cores are executed simultaneously, which saves the time and energy. The relative study for multicore processor and multicore controller concludes that micro architecture based controller having multiple cores illustrates better performance in time critical multi-tasking environment. The research work mentioned here not only illustrates the functionality of multicore microcontroller, but also express the novel technique of programming, profiling and optimization on such platforms in real time environments.
△ Less
Submitted 10 April, 2015;
originally announced April 2015.
-
A Framework for Textbook Enhancement and Learning using Crowdsourced Annotations
Authors:
Anamika Chhabra,
S. R. S. Iyengar,
Poonam Saini,
Rajesh Shreedhar Bhat
Abstract:
Despite a significant improvement in the educational aids in terms of effective teaching-learning process, most of the educational content available to the students is less than optimal in the context of being up-to-date, exhaustive and easy-to-understand. There is a need to iteratively improve the educational material based on the feedback collected from the students' learning experience. This ca…
▽ More
Despite a significant improvement in the educational aids in terms of effective teaching-learning process, most of the educational content available to the students is less than optimal in the context of being up-to-date, exhaustive and easy-to-understand. There is a need to iteratively improve the educational material based on the feedback collected from the students' learning experience. This can be achieved by observing the students' interactions with the content, and then having the authors modify it based on this feedback. Hence, we aim to facilitate and promote communication between the communities of authors, instructors and students in order to gradually improve the educational material. Such a system will also help in students' learning process by encouraging student-to-student teaching. Underpinning these objectives, we provide the framework of a platform named Crowdsourced Annotation System (CAS) where the people from these communities can collaborate and benefit from each other. We use the concept of in-context annotations, through which, the students can add their comments about the given text while learning it. An experiment was conducted on 60 students who try to learn an article of a textbook by annotating it for four days. According to the result of the experiment, most of the students were highly satisfied with the use of CAS. They stated that the system is extremely useful for learning and they would like to use it for learning other concepts in future.
△ Less
Submitted 11 August, 2015; v1 submitted 20 March, 2015;
originally announced March 2015.
-
Ecosystem: A Characteristic Of Crowdsourced Environments
Authors:
Anamika Chhabra,
S. R. S. Iyengar,
Poonam Saini,
Rajesh Shreedhar Bhat,
Vijay Kumar
Abstract:
The phenomenal success of certain crowdsourced online platforms, such as Wikipedia, is accredited to their ability to tap the crowd's potential to collaboratively build knowledge. While it is well known that the crowd's collective wisdom surpasses the cumulative individual expertise, little is understood on the dynamics of knowledge building in a crowdsourced environment. A proper understanding of…
▽ More
The phenomenal success of certain crowdsourced online platforms, such as Wikipedia, is accredited to their ability to tap the crowd's potential to collaboratively build knowledge. While it is well known that the crowd's collective wisdom surpasses the cumulative individual expertise, little is understood on the dynamics of knowledge building in a crowdsourced environment. A proper understanding of the dynamics of knowledge building in a crowdsourced environment would enable one in the better designing of such environments to solicit knowledge from the crowd. Our experiment on crowdsourced systems based on annotations shows that an important reason for the rapid knowledge building in such environments is due to variance in expertise. First, we used as our test bed, a customized Crowdsourced Annotation System (CAS) which provides a group of users the facility to annotate a given document while trying to understand it. Our results showed the presence of different genres of proficiency amongst the users of an annotation system. We observed that the ecosystem in crowdsourced annotation system comprised of mainly four categories of contributors, namely: Probers, Solvers, Articulators and Explorers. We inferred from our experiment that the knowledge garnering mainly happens due to the synergetic interaction across these categories. Further, we conducted an analysis on the dataset of Wikipedia and Stack Overflow and noticed the ecosystem presence in these portals as well. From this study, we claim that the ecosystem is a universal characteristic of all crowdsourced portals.
△ Less
Submitted 27 August, 2015; v1 submitted 24 February, 2015;
originally announced February 2015.
-
Building a Classification Model for Enrollment In Higher Educational Courses using Data Mining Techniques
Authors:
Priyanka Saini
Abstract:
Data Mining is the process of extracting useful patterns from the huge amount of database and many data mining techniques are used for mining these patterns. Recently, one of the remarkable facts in higher educational institute is the rapid growth data and this educational data is expanding quickly without any advantage to the educational management. The main aim of the management is to refine the…
▽ More
Data Mining is the process of extracting useful patterns from the huge amount of database and many data mining techniques are used for mining these patterns. Recently, one of the remarkable facts in higher educational institute is the rapid growth data and this educational data is expanding quickly without any advantage to the educational management. The main aim of the management is to refine the education standard; therefore by applying the various data mining techniques on this data one can get valuable information. This research study proposed the "classification model for the student's enrollment process in higher educational courses using data mining techniques". Additionally, this study contributes to finding some patterns that are meaningful to management.
△ Less
Submitted 14 May, 2014;
originally announced May 2014.
-
Impact Of Mobility and Transmission Range On The Performance of Backoff Algorithms For IEEE 802.11-Based Multi-hop Mobile Ad hoc Networks
Authors:
Pooja Saini
Abstract:
In IEEE 802.11 Wireless Local Area Networks (WLANs), network nodes experiencing collisions on the shared channel need to backoff for a random period of time, which is uniformly selected from the Contention Window (CW). This contention window is dynamically controlled by the Backoff algorithm. First step to design a an efficient backoff algorithm for multi-hop ad hoc network is to analysis of the e…
▽ More
In IEEE 802.11 Wireless Local Area Networks (WLANs), network nodes experiencing collisions on the shared channel need to backoff for a random period of time, which is uniformly selected from the Contention Window (CW). This contention window is dynamically controlled by the Backoff algorithm. First step to design a an efficient backoff algorithm for multi-hop ad hoc network is to analysis of the existing backoff algorithms in multi-hop ad hoc networks. Thus, in this paper, we considered two important multi-hop adhoc network scenarios: (a) Node Mobility Scenario and (b) Transmission Range Scenario and analyze and evaluate both the impact of mobility (i.e. node speed) and the impact of transmission range of nodes on the performance of various backoff algorithms
△ Less
Submitted 1 July, 2010;
originally announced July 2010.
-
Node inspection and analysis thereof in the light of area estimation and curve fitting
Authors:
A. Kumar,
P. Chakrabarti,
P. Saini
Abstract:
In this paper, we have given an idea of area specification and its corresponding sensing of nodes in a dynamic network. We have applied the concept of Monte Carlo methods in this respect. We have cited certain statistical as well as artificial intelligence based techniques for realizing the position of a node. We have also applied curve fitting concept for node detection and relative verification.
In this paper, we have given an idea of area specification and its corresponding sensing of nodes in a dynamic network. We have applied the concept of Monte Carlo methods in this respect. We have cited certain statistical as well as artificial intelligence based techniques for realizing the position of a node. We have also applied curve fitting concept for node detection and relative verification.
△ Less
Submitted 10 April, 2010;
originally announced April 2010.