-
CountCLIP -- [Re] Teaching CLIP to Count to Ten
Authors:
Harshvardhan Mestha,
Tejas Agrawal,
Karan Bania,
Shreyas V,
Yash Bhisikar
Abstract:
Large vision-language models (VLMs) are shown to learn rich joint image-text representations enabling high performances in relevant downstream tasks. However, they fail to showcase their quantitative understanding of objects, and they lack good counting-aware representation. This paper conducts a reproducibility study of 'Teaching CLIP to Count to Ten' (Paiss et al., 2023), which presents a method…
▽ More
Large vision-language models (VLMs) are shown to learn rich joint image-text representations enabling high performances in relevant downstream tasks. However, they fail to showcase their quantitative understanding of objects, and they lack good counting-aware representation. This paper conducts a reproducibility study of 'Teaching CLIP to Count to Ten' (Paiss et al., 2023), which presents a method to finetune a CLIP model (Radford et al., 2021) to improve zero-shot counting accuracy in an image while maintaining the performance for zero-shot classification by introducing a counting-contrastive loss term. We improve the model's performance on a smaller subset of their training data with lower computational resources. We verify these claims by reproducing their study with our own code. The implementation can be found at https://github.com/SforAiDl/CountCLIP.
△ Less
Submitted 10 June, 2024; v1 submitted 5 June, 2024;
originally announced June 2024.
-
Gemini 1.5: Unlocking multimodal understanding across millions of tokens of context
Authors:
Gemini Team,
Petko Georgiev,
Ving Ian Lei,
Ryan Burnell,
Libin Bai,
Anmol Gulati,
Garrett Tanzer,
Damien Vincent,
Zhufeng Pan,
Shibo Wang,
Soroosh Mariooryad,
Yifan Ding,
Xinyang Geng,
Fred Alcober,
Roy Frostig,
Mark Omernick,
Lexi Walker,
Cosmin Paduraru,
Christina Sorokin,
Andrea Tacchetti,
Colin Gaffney,
Samira Daruki,
Olcan Sercinoglu,
Zach Gleicher,
Juliette Love
, et al. (1092 additional authors not shown)
Abstract:
In this report, we introduce the Gemini 1.5 family of models, representing the next generation of highly compute-efficient multimodal models capable of recalling and reasoning over fine-grained information from millions of tokens of context, including multiple long documents and hours of video and audio. The family includes two new models: (1) an updated Gemini 1.5 Pro, which exceeds the February…
▽ More
In this report, we introduce the Gemini 1.5 family of models, representing the next generation of highly compute-efficient multimodal models capable of recalling and reasoning over fine-grained information from millions of tokens of context, including multiple long documents and hours of video and audio. The family includes two new models: (1) an updated Gemini 1.5 Pro, which exceeds the February version on the great majority of capabilities and benchmarks; (2) Gemini 1.5 Flash, a more lightweight variant designed for efficiency with minimal regression in quality. Gemini 1.5 models achieve near-perfect recall on long-context retrieval tasks across modalities, improve the state-of-the-art in long-document QA, long-video QA and long-context ASR, and match or surpass Gemini 1.0 Ultra's state-of-the-art performance across a broad set of benchmarks. Studying the limits of Gemini 1.5's long-context ability, we find continued improvement in next-token prediction and near-perfect retrieval (>99%) up to at least 10M tokens, a generational leap over existing models such as Claude 3.0 (200k) and GPT-4 Turbo (128k). Finally, we highlight real-world use cases, such as Gemini 1.5 collaborating with professionals on completing their tasks achieving 26 to 75% time savings across 10 different job categories, as well as surprising new capabilities of large language models at the frontier; when given a grammar manual for Kalamang, a language with fewer than 200 speakers worldwide, the model learns to translate English to Kalamang at a similar level to a person who learned from the same content.
△ Less
Submitted 14 June, 2024; v1 submitted 8 March, 2024;
originally announced March 2024.
-
Predicting ATP binding sites in protein sequences using Deep Learning and Natural Language Processing
Authors:
Shreyas V,
Swati Agarwal
Abstract:
Predicting ATP-Protein Binding sites in genes is of great significance in the field of Biology and Medicine. The majority of research in this field has been conducted through time- and resource-intensive 'wet experiments' in laboratories. Over the years, researchers have been investigating computational methods computational methods to accomplish the same goals, utilising the strength of advanced…
▽ More
Predicting ATP-Protein Binding sites in genes is of great significance in the field of Biology and Medicine. The majority of research in this field has been conducted through time- and resource-intensive 'wet experiments' in laboratories. Over the years, researchers have been investigating computational methods computational methods to accomplish the same goals, utilising the strength of advanced Deep Learning and NLP algorithms. In this paper, we propose to develop methods to classify ATP-Protein binding sites. We conducted various experiments mainly using PSSMs and several word embeddings as features. We used 2D CNNs and LightGBM classifiers as our chief Deep Learning Algorithms. The MP3Vec and BERT models have also been subjected to testing in our study. The outcomes of our experiments demonstrated improvement over the state-of-the-art benchmarks.
△ Less
Submitted 2 February, 2024;
originally announced February 2024.
-
Unleashing the Power of Dynamic Mode Decomposition and Deep Learning for Rainfall Prediction in North-East India
Authors:
Paleti Nikhil Chowdary,
Sathvika P,
Pranav U,
Rohan S,
Sowmya V,
Gopalakrishnan E A,
Dhanya M
Abstract:
Accurate rainfall forecasting is crucial for effective disaster preparedness and mitigation in the North-East region of India, which is prone to extreme weather events such as floods and landslides. In this study, we investigated the use of two data-driven methods, Dynamic Mode Decomposition (DMD) and Long Short-Term Memory (LSTM), for rainfall forecasting using daily rainfall data collected from…
▽ More
Accurate rainfall forecasting is crucial for effective disaster preparedness and mitigation in the North-East region of India, which is prone to extreme weather events such as floods and landslides. In this study, we investigated the use of two data-driven methods, Dynamic Mode Decomposition (DMD) and Long Short-Term Memory (LSTM), for rainfall forecasting using daily rainfall data collected from India Meteorological Department in northeast region over a period of 118 years. We conducted a comparative analysis of these methods to determine their relative effectiveness in predicting rainfall patterns. Using historical rainfall data from multiple weather stations, we trained and validated our models to forecast future rainfall patterns. Our results indicate that both DMD and LSTM are effective in forecasting rainfall, with LSTM outperforming DMD in terms of accuracy, revealing that LSTM has the ability to capture complex nonlinear relationships in the data, making it a powerful tool for rainfall forecasting. Our findings suggest that data-driven methods such as DMD and deep learning approaches like LSTM can significantly improve rainfall forecasting accuracy in the North-East region of India, hel** to mitigate the impact of extreme weather events and enhance the region's resilience to climate change.
△ Less
Submitted 17 September, 2023;
originally announced September 2023.
-
Learning (With) Distributed Optimization
Authors:
Aadharsh Aadhithya A,
Abinesh S,
Akshaya J,
Jayanth M,
Vishnu Radhakrishnan,
Sowmya V,
Soman K. P
Abstract:
This paper provides an overview of the historical progression of distributed optimization techniques, tracing their development from early duality-based methods pioneered by Dantzig, Wolfe, and Benders in the 1960s to the emergence of the Augmented Lagrangian Alternating Direction Inexact Newton (ALADIN) algorithm. The initial focus on Lagrangian relaxation for convex problems and decomposition st…
▽ More
This paper provides an overview of the historical progression of distributed optimization techniques, tracing their development from early duality-based methods pioneered by Dantzig, Wolfe, and Benders in the 1960s to the emergence of the Augmented Lagrangian Alternating Direction Inexact Newton (ALADIN) algorithm. The initial focus on Lagrangian relaxation for convex problems and decomposition strategies led to the refinement of methods like the Alternating Direction Method of Multipliers (ADMM). The resurgence of interest in distributed optimization in the late 2000s, particularly in machine learning and imaging, demonstrated ADMM's practical efficacy and its unifying potential. This overview also highlights the emergence of the proximal center method and its applications in diverse domains. Furthermore, the paper underscores the distinctive features of ALADIN, which offers convergence guarantees for non-convex scenarios without introducing auxiliary variables, differentiating it from traditional augmentation techniques. In essence, this work encapsulates the historical trajectory of distributed optimization and underscores the promising prospects of ALADIN in addressing non-convex optimization challenges.
△ Less
Submitted 10 August, 2023;
originally announced August 2023.
-
Cooperating Graph Neural Networks with Deep Reinforcement Learning for Vaccine Prioritization
Authors:
Lu Ling,
Washim Uddin Mondal,
Satish V,
Ukkusuri
Abstract:
This study explores the vaccine prioritization strategy to reduce the overall burden of the pandemic when the supply is limited. Existing methods conduct macro-level or simplified micro-level vaccine distribution by assuming the homogeneous behavior within subgroup populations and lacking mobility dynamics integration. Directly applying these models for micro-level vaccine allocation leads to sub-…
▽ More
This study explores the vaccine prioritization strategy to reduce the overall burden of the pandemic when the supply is limited. Existing methods conduct macro-level or simplified micro-level vaccine distribution by assuming the homogeneous behavior within subgroup populations and lacking mobility dynamics integration. Directly applying these models for micro-level vaccine allocation leads to sub-optimal solutions due to the lack of behavioral-related details. To address the issue, we first incorporate the mobility heterogeneity in disease dynamics modeling and mimic the disease evolution process using a Trans-vaccine-SEIR model. Then we develop a novel deep reinforcement learning to seek the optimal vaccine allocation strategy for the high-degree spatial-temporal disease evolution system. The graph neural network is used to effectively capture the structural properties of the mobility contact network and extract the dynamic disease features. In our evaluation, the proposed framework reduces 7% - 10% of infections and deaths than the baseline strategies. Extensive evaluation shows that the proposed framework is robust to seek the optimal vaccine allocation with diverse mobility patterns in the micro-level disease evolution system. In particular, we find the optimal vaccine allocation strategy in the transit usage restriction scenario is significantly more effective than restricting cross-zone mobility for the top 10% age-based and income-based zones. These results provide valuable insights for areas with limited vaccines and low logistic efficacy.
△ Less
Submitted 9 May, 2023;
originally announced May 2023.
-
EEG aided boosting of single-lead ECG based sleep staging with Deep Knowledge Distillation
Authors:
Vaibhav Joshi,
Sricharan V,
Preejith SP,
Mohanasankar Sivaprakasam
Abstract:
An electroencephalogram (EEG) signal is currently accepted as a standard for automatic sleep staging. Lately, Near-human accuracy in automated sleep staging has been achievable by Deep Learning (DL) based approaches, enabling multi-fold progress in this area. However, An extensive and expensive clinical setup is required for EEG based sleep staging. Additionally, the EEG setup being obtrusive in n…
▽ More
An electroencephalogram (EEG) signal is currently accepted as a standard for automatic sleep staging. Lately, Near-human accuracy in automated sleep staging has been achievable by Deep Learning (DL) based approaches, enabling multi-fold progress in this area. However, An extensive and expensive clinical setup is required for EEG based sleep staging. Additionally, the EEG setup being obtrusive in nature and requiring an expert for setup adds to the inconvenience of the subject under study, making it adverse in the point of care setting. An unobtrusive and more suitable alternative to EEG is Electrocardiogram (ECG). Unsurprisingly, compared to EEG in sleep staging, its performance remains sub-par. In order to take advantage of both the modalities, transferring knowledge from EEG to ECG is a reasonable approach, ultimately boosting the performance of ECG based sleep staging. Knowledge Distillation (KD) is a promising notion in DL that shares knowledge from a superior performing but usually more complex teacher model to an inferior but compact student model. Building upon this concept, a cross-modality KD framework assisting features learned through models trained on EEG to improve ECG-based sleep staging performance is proposed. Additionally, to better understand the distillation approach, extensive experimentation on the independent modules of the proposed model was conducted. Montreal Archive of Sleep Studies (MASS) dataset consisting of 200 subjects was utilized for this study. The results from the proposed model for weighted-F1-score in 3-class and 4-class sleep staging showed a 13.40 \% and 14.30 \% improvement, respectively. This study demonstrates the feasibility of KD for single-channel ECG based sleep staging's performance enhancement in 3-class (W-R-N) and 4-class (W-R-L-D) classification.
△ Less
Submitted 18 November, 2022;
originally announced November 2022.
-
On the monophonic convexity in complementary prisms
Authors:
Neethu P. K.,
Ullas Chandran S. V.,
Julliano R. Nascimento
Abstract:
A set $S$ of vertices of a graph $G$ is \emph{monophonic convex} if $S$ contains all the vertices belonging to any induced path connecting two vertices of $S$. The cardinality of a maximum proper monophonic convex set of $G$ is called the \emph{monophonic convexity number} of $G$. The \emph{monophonic interval} of a set $S$ of vertices of $G$ is the set $S$ together with every vertex belonging to…
▽ More
A set $S$ of vertices of a graph $G$ is \emph{monophonic convex} if $S$ contains all the vertices belonging to any induced path connecting two vertices of $S$. The cardinality of a maximum proper monophonic convex set of $G$ is called the \emph{monophonic convexity number} of $G$. The \emph{monophonic interval} of a set $S$ of vertices of $G$ is the set $S$ together with every vertex belonging to any induced path connecting two vertices of $S$. The cardinality of a minimum set $S \subseteq V(G)$ whose monophonic interval is $V(G)$ is called the \emph{monophonic number} of $G$. The \emph{monophonic convex hull} of a set $S$ of vertices of $G$ is the smallest monophonic convex set containing $S$ in $G$. The cardinality of a minimum set $S \subseteq V(G)$ whose monophonic convex hull is $V(G)$ is called the \emph{monophonic hull number} of $G$. The \emph{complementary prism} $\GG$ of $G$ is obtained from the disjoint union of $G$ and its complement $\overline{G}$ by adding the edges of a perfect matching between them. In this work, we determine the monophonic convexity number, the monophonic number, and the monophonic hull number of the complementary prisms of all graphs.
△ Less
Submitted 12 June, 2023; v1 submitted 22 August, 2022;
originally announced August 2022.
-
Scalable Computational Algorithms for Geo-spatial Covid-19 Spread in High Performance Computing
Authors:
Sudhi P. V.,
Victorita Dolean,
Pierre Jolivet,
Brandon Robinson,
Jodi D. Edwards,
Tetyana Kendzerska,
Abhijit Sarkar
Abstract:
A nonlinear partial differential equation (PDE) based compartmental model of COVID-19 provides a continuous trace of infection over space and time. Finer resolutions in the spatial discretization, the inclusion of additional model compartments and model stratifications based on clinically relevant categories contribute to an increase in the number of unknowns to the order of millions. We adopt a p…
▽ More
A nonlinear partial differential equation (PDE) based compartmental model of COVID-19 provides a continuous trace of infection over space and time. Finer resolutions in the spatial discretization, the inclusion of additional model compartments and model stratifications based on clinically relevant categories contribute to an increase in the number of unknowns to the order of millions. We adopt a parallel scalable solver allowing faster solutions for these high fidelity models. The solver combines domain decomposition and algebraic multigrid preconditioners at multiple levels to achieve the desired strong and weak scalability. As a numerical illustration of this general methodology, a five-compartment susceptible-exposed-infected-recovered-deceased (SEIRD) model of COVID-19 is used to demonstrate the scalability and effectiveness of the proposed solver for a large geographical domain (Southern Ontario). It is possible to predict the infections up to three months for a system size of 92 million (using 1780 processes) within 7 hours saving months of computational effort needed for the conventional solvers.
△ Less
Submitted 3 August, 2022;
originally announced August 2022.
-
Flow Synthesis Based Visual Servoing Frameworks for Monocular Obstacle Avoidance Amidst High-Rises
Authors:
Harshit K. Sankhla,
M. Nomaan Qureshi,
Shankara Narayanan V.,
Vedansh Mittal,
Gunjan Gupta,
Harit Pandya,
K. Madhava Krishna
Abstract:
We propose a novel flow synthesis based visual servoing framework enabling long-range obstacle avoidance for Micro Air Vehicles (MAV) flying amongst tall skyscrapers. Recent deep learning based frameworks use optical flow to do high-precision visual servoing. In this paper, we explore the question: can we design a surrogate flow for these high-precision visual-servoing methods, which leads to obst…
▽ More
We propose a novel flow synthesis based visual servoing framework enabling long-range obstacle avoidance for Micro Air Vehicles (MAV) flying amongst tall skyscrapers. Recent deep learning based frameworks use optical flow to do high-precision visual servoing. In this paper, we explore the question: can we design a surrogate flow for these high-precision visual-servoing methods, which leads to obstacle avoidance? We revisit the concept of saliency for identifying high-rise structures in/close to the line of attack amongst other competing skyscrapers and buildings as a collision obstacle. A synthesised flow is used to displace the salient object segmentation mask. This flow is so computed that the visual servoing controller maneuvers the MAV safely around the obstacle. In this approach, we use a multi-step Cross-Entropy Method (CEM) based servo control to achieve flow convergence, resulting in obstacle avoidance. We use this novel pipeline to successfully and persistently maneuver high-rises and reach the goal in simulated and photo-realistic real-world scenes. We conduct extensive experimentation and compare our approach with optical flow and short-range depth-based obstacle avoidance methods to demonstrate the proposed framework's merit. Additional Visualisation can be found at https://sites.google.com/view/monocular-obstacle/home
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
The general position avoidance game and hardness of general position games
Authors:
Ullas Chandran S. V.,
Sandi Klavzar,
Neethu P. K.,
Rudini Sampaio
Abstract:
Given a graph $G$, a set $S$ of vertices in $G$ is a general position set if no triple of vertices from $S$ lie on a common shortest path in $G$. The general position achievement/avoidance game is played on a graph $G$ by players A and B who alternately select vertices of $G$. A selection of a vertex by a player is a legal move if it has not been selected before and the set of selected vertices so…
▽ More
Given a graph $G$, a set $S$ of vertices in $G$ is a general position set if no triple of vertices from $S$ lie on a common shortest path in $G$. The general position achievement/avoidance game is played on a graph $G$ by players A and B who alternately select vertices of $G$. A selection of a vertex by a player is a legal move if it has not been selected before and the set of selected vertices so far forms a general position set of $G$. The player who picks the last vertex is the winner in the general position achievement game and is the loser in the avoidance game. In this paper, we prove that the general position achievement/avoidance games are PSPACE-complete even on graphs with diameter at most 4. For this, we prove that the \textit{misère} play of the classical Node Kayles game is also PSPACE-complete. As positive results, we obtain linear time algorithms to decide the winning player of the general position avoidance game in rook's graphs, grids, cylinders, and lexicographic products with complete second factors.
△ Less
Submitted 13 September, 2023; v1 submitted 6 May, 2022;
originally announced May 2022.
-
Explainable AI Framework for COVID-19 Prediction in Different Provinces of India
Authors:
Mredulraj S. Pandianchery,
Gopalakrishnan E. A,
Sowmya V,
Vinayakumar Ravi,
Soman K. P
Abstract:
In 2020, covid-19 virus had reached more than 200 countries. Till December 20th 2021, 221 nations in the world had collectively reported 275M confirmed cases of covid-19 & total death toll of 5.37M. Many countries which include United States, India, Brazil, United Kingdom, Russia etc were badly affected by covid-19 pandemic due to the large population. The total confirmed cases reported in this co…
▽ More
In 2020, covid-19 virus had reached more than 200 countries. Till December 20th 2021, 221 nations in the world had collectively reported 275M confirmed cases of covid-19 & total death toll of 5.37M. Many countries which include United States, India, Brazil, United Kingdom, Russia etc were badly affected by covid-19 pandemic due to the large population. The total confirmed cases reported in this country are 51.7M, 34.7M, 22.2M, 11.3M, 10.2M respectively till December 20, 2021. This pandemic can be controlled with the help of precautionary steps by government & civilians of the country. The early prediction of covid-19 cases helps to track the transmission dynamics & alert the government to take the necessary precautions. Recurrent Deep learning algorithms is a data driven model which plays a key role to capture the patterns present in time series data. In many literatures, the Recurrent Neural Network (RNN) based model are proposed for the efficient prediction of COVID-19 cases for different provinces. The study in the literature doesnt involve the interpretation of the model behavior & robustness. In this study, The LSTM model is proposed for the efficient prediction of active cases in each provinces of India. The active cases dataset for each province in India is taken from John Hopkins publicly available dataset for the duration from 10th June, 2020 to 4th August, 2021. The proposed LSTM model is trained on one state i.e., Maharashtra and tested for rest of the provinces in India. The concept of Explainable AI is involved in this study for the better interpretation & understanding of the model behavior. The proposed model is used to forecast the active cases in India from 16th December, 2021 to 5th March, 2022. It is notated that there will be a emergence of third wave on January, 2022 in India.
△ Less
Submitted 30 July, 2022; v1 submitted 12 January, 2022;
originally announced January 2022.
-
Geometry Based Machining Feature Retrieval with Inductive Transfer Learning
Authors:
N S Kamal,
Barathi Ganesh HB,
Sajith Variyar VV,
Sowmya V,
Soman KP
Abstract:
Manufacturing industries have widely adopted the reuse of machine parts as a method to reduce costs and as a sustainable manufacturing practice. Identification of reusable features from the design of the parts and finding their similar features from the database is an important part of this process. In this project, with the help of fully convolutional geometric features, we are able to extract an…
▽ More
Manufacturing industries have widely adopted the reuse of machine parts as a method to reduce costs and as a sustainable manufacturing practice. Identification of reusable features from the design of the parts and finding their similar features from the database is an important part of this process. In this project, with the help of fully convolutional geometric features, we are able to extract and learn the high level semantic features from CAD models with inductive transfer learning. The extracted features are then compared with that of other CAD models from the database using Frobenius norm and identical features are retrieved. Later we passed the extracted features to a deep convolutional neural network with a spatial pyramid pooling layer and the performance of the feature retrieval increased significantly. It was evident from the results that the model could effectively capture the geometrical elements from machining features.
△ Less
Submitted 15 November, 2021; v1 submitted 26 August, 2021;
originally announced August 2021.
-
On Fairness and Interpretability
Authors:
Deepak P,
Sanil V,
Joemon M. Jose
Abstract:
Ethical AI spans a gamut of considerations. Among these, the most popular ones, fairness and interpretability, have remained largely distinct in technical pursuits. We discuss and elucidate the differences between fairness and interpretability across a variety of dimensions. Further, we develop two principles-based frameworks towards develo** ethical AI for the future that embrace aspects of bot…
▽ More
Ethical AI spans a gamut of considerations. Among these, the most popular ones, fairness and interpretability, have remained largely distinct in technical pursuits. We discuss and elucidate the differences between fairness and interpretability across a variety of dimensions. Further, we develop two principles-based frameworks towards develo** ethical AI for the future that embrace aspects of both fairness and interpretability. First, interpretability for fairness proposes instantiating interpretability within the realm of fairness to develop a new breed of ethical AI. Second, fairness and interpretability initiates deliberations on bringing the best aspects of both together. We hope that these two frameworks will contribute to intensifying scholarly discussions on new frontiers of ethical AI that brings together fairness and interpretability.
△ Less
Submitted 24 June, 2021;
originally announced June 2021.
-
COVID-19 Tests Gone Rogue: Privacy, Efficacy, Mismanagement and Misunderstandings
Authors:
Manuel Morales,
Rachel Barbar,
Darshan Gandhi,
Sanskruti Landage,
Joseph Bae,
Arpita Vats,
Jil Kothari,
Sheshank Shankar,
Rohan Sukumaran,
Himi Mathur,
Krutika Misra,
Aishwarya Saxena,
Parth Patwa,
Sethuraman T. V.,
Maurizio Arseni,
Shailesh Advani,
Kasia Jakimowicz,
Sunaina Anand,
Priyanshi Katiyar,
Ashley Mehra,
Rohan Iyer,
Srinidhi Murali,
Aryan Mahindra,
Mikhail Dmitrienko,
Saurish Srivastava
, et al. (5 additional authors not shown)
Abstract:
COVID-19 testing, the cornerstone for effective screening and identification of COVID-19 cases, remains paramount as an intervention tool to curb the spread of COVID-19 both at local and national levels. However, the speed at which the pandemic struck and the response was rolled out, the widespread impact on healthcare infrastructure, the lack of sufficient preparation within the public health sys…
▽ More
COVID-19 testing, the cornerstone for effective screening and identification of COVID-19 cases, remains paramount as an intervention tool to curb the spread of COVID-19 both at local and national levels. However, the speed at which the pandemic struck and the response was rolled out, the widespread impact on healthcare infrastructure, the lack of sufficient preparation within the public health system, and the complexity of the crisis led to utter confusion among test-takers. Invasion of privacy remains a crucial concern. The user experience of test takers remains low. User friction affects user behavior and discourages participation in testing programs. Test efficacy has been overstated. Test results are poorly understood resulting in inappropriate follow-up recommendations. Herein, we review the current landscape of COVID-19 testing, identify four key challenges, and discuss the consequences of the failure to address these challenges. The current infrastructure around testing and information propagation is highly privacy-invasive and does not leverage scalable digital components. In this work, we discuss challenges complicating the existing covid-19 testing ecosystem and highlight the need to improve the testing experience for the user and reduce privacy invasions. Digital tools will play a critical role in resolving these challenges.
△ Less
Submitted 7 May, 2021; v1 submitted 5 January, 2021;
originally announced January 2021.
-
Digital Landscape of COVID-19 Testing: Challenges and Opportunities
Authors:
Darshan Gandhi,
Rohan Sukumaran,
Priyanshi Katiyar,
Alex Radunsky,
Sunaina Anand,
Shailesh Advani,
Jil Kothari,
Kasia Jakimowicz,
Sheshank Shankar,
Sethuraman T. V.,
Krutika Misra,
Aishwarya Saxena,
Sanskruti Landage,
Richa Sonker,
Parth Patwa,
Aryan Mahindra,
Mikhail Dmitrienko,
Kanishka Vaish,
Ashley Mehra,
Srinidhi Murali,
Rohan Iyer,
Joseph Bae,
Vivek Sharma,
Abhishek Singh,
Rachel Barbar
, et al. (1 additional authors not shown)
Abstract:
The COVID-19 Pandemic has left a devastating trail all over the world, in terms of loss of lives, economic decline, travel restrictions, trade deficit, and collapsing economy including real-estate, job loss, loss of health benefits, the decline in quality of access to care and services and overall quality of life. Immunization from the anticipated vaccines will not be the stand-alone guideline tha…
▽ More
The COVID-19 Pandemic has left a devastating trail all over the world, in terms of loss of lives, economic decline, travel restrictions, trade deficit, and collapsing economy including real-estate, job loss, loss of health benefits, the decline in quality of access to care and services and overall quality of life. Immunization from the anticipated vaccines will not be the stand-alone guideline that will help surpass the pandemic and return to normalcy. Four pillars of effective public health intervention include diagnostic testing for both asymptomatic and symptomatic individuals, contact tracing, quarantine of individuals with symptoms or who are exposed to COVID-19, and maintaining strict hygiene standards at the individual and community level. Digital technology, currently being used for COVID-19 testing include certain mobile apps, web dashboards, and online self-assessment tools. Herein, we look into various digital solutions adapted by communities across universities, businesses, and other organizations. We summarize the challenges experienced using these tools in terms of quality of information, privacy, and user-centric issues. Despite numerous digital solutions available and being developed, many vary in terms of information being shared in terms of both quality and quantity, which can be overwhelming to the users. Understanding the testing landscape through a digital lens will give a clear insight into the multiple challenges that we face including data privacy, cost, and miscommunication. It is the destiny of digitalization to navigate testing for COVID-19. Block-chain based systems can be used for privacy preservation and ensuring ownership of the data to remain with the user. Another solution involves having digital health passports with relevant and correct information. In this early draft, we summarize the challenges and propose possible solutions to address the same.
△ Less
Submitted 3 December, 2020;
originally announced December 2020.
-
Prediction of number of cases expected and estimation of the final size of coronavirus epidemic in India using the logistic model and genetic algorithm
Authors:
Ganesh Kumar M,
Soman K. P,
Gopalakrishnan E. A,
Vijay Krishna Menon,
Sowmya V
Abstract:
In this paper, we have applied the logistic growth regression model and genetic algorithm to predict the number of coronavirus infected cases that can be expected in upcoming days in India and also estimated the final size and its peak time of the coronavirus epidemic in India.
In this paper, we have applied the logistic growth regression model and genetic algorithm to predict the number of coronavirus infected cases that can be expected in upcoming days in India and also estimated the final size and its peak time of the coronavirus epidemic in India.
△ Less
Submitted 26 March, 2020;
originally announced March 2020.
-
Enabling Hyper-Personalisation: Automated Ad Creative Generation and Ranking for Fashion e-Commerce
Authors:
Sreekanth Vempati,
Korah T Malayil,
Sruthi V,
Sandeep R
Abstract:
Homepage is the first touch point in the customer's journey and is one of the prominent channels of revenue for many e-commerce companies. A user's attention is mostly captured by homepage banner images (also called Ads/Creatives). The set of banners shown and their design, influence the customer's interest and plays a key role in optimizing the click through rates of the banners. Presently, massi…
▽ More
Homepage is the first touch point in the customer's journey and is one of the prominent channels of revenue for many e-commerce companies. A user's attention is mostly captured by homepage banner images (also called Ads/Creatives). The set of banners shown and their design, influence the customer's interest and plays a key role in optimizing the click through rates of the banners. Presently, massive and repetitive effort is put in, to manually create aesthetically pleasing banner images. Due to the large amount of time and effort involved in this process, only a small set of banners are made live at any point. This reduces the number of banners created as well as the degree of personalization that can be achieved. This paper thus presents a method to generate creatives automatically on a large scale in a short duration. The availability of diverse banners generated helps in improving personalization as they can cater to the taste of larger audience. The focus of our paper is on generating wide variety of homepage banners that can be made as an input for user level personalization engine. Following are the main contributions of this paper: 1) We introduce and explain the need for large scale banner generation for e-commerce 2) We present on how we utilize existing deep learning based detectors which can automatically annotate the required objects/tags from the image. 3) We also propose a Genetic Algorithm based method to generate an optimal banner layout for the given image content, input components and other design constraints. 4) Further, to aid the process of picking the right set of banners, we designed a ranking method and evaluated multiple models. All our experiments have been performed on data from Myntra (http://www.myntra.com), one of the top fashion e-commerce players in India.
△ Less
Submitted 27 August, 2019;
originally announced August 2019.
-
A Light weight and Hybrid Deep Learning Model based Online Signature Verification
Authors:
Chandra Sekhar V.,
Anoushka Doctor,
Prerana Mukherjee,
Viswanath Pulabaigiri
Abstract:
The augmented usage of deep learning-based models for various AI related problems are as a result of modern architectures of deeper length and the availability of voluminous interpreted datasets. The models based on these architectures require huge training and storage cost, which makes them inefficient to use in critical applications like online signature verification (OSV) and to deploy in resou…
▽ More
The augmented usage of deep learning-based models for various AI related problems are as a result of modern architectures of deeper length and the availability of voluminous interpreted datasets. The models based on these architectures require huge training and storage cost, which makes them inefficient to use in critical applications like online signature verification (OSV) and to deploy in resource constraint devices. As a solution, in this work, our contribution is two-fold. 1) An efficient dimensionality reduction technique, to reduce the number of features to be considered and 2) a state-of-the-art model CNN-LSTM based hybrid architecture for online signature verification. Thorough experiments on the publicly available datasets MCYT, SUSIG, SVC confirms that the proposed model achieves better accuracy even with as low as one training sample. The proposed models yield state-of-the-art performance in various categories of all the three datasets.
△ Less
Submitted 9 July, 2019;
originally announced July 2019.
-
The Unconstrained Ear Recognition Challenge 2019 - ArXiv Version With Appendix
Authors:
Žiga Emeršič,
Aruna Kumar S. V.,
B. S. Harish,
Weronika Gutfeter,
Jalil Nourmohammadi Khiarak,
Andrzej Pacut,
Earnest Hansley,
Mauricio Pamplona Segundo,
Sudeep Sarkar,
Hyeonjung Park,
Gi Pyo Nam,
Ig-Jae Kim,
Sagar G. Sangodkar,
Ümit Kaçar,
Murvet Kirci,
Li Yuan,
Jishou Yuan,
Haonan Zhao,
Fei Lu,
Junying Mao,
Xiaoshuang Zhang,
Dogucan Yaman,
Fevziye Irem Eyiokur,
Kadir Bulut Özler,
Hazım Kemal Ekenel
, et al. (6 additional authors not shown)
Abstract:
This paper presents a summary of the 2019 Unconstrained Ear Recognition Challenge (UERC), the second in a series of group benchmarking efforts centered around the problem of person recognition from ear images captured in uncontrolled settings. The goal of the challenge is to assess the performance of existing ear recognition techniques on a challenging large-scale ear dataset and to analyze perfor…
▽ More
This paper presents a summary of the 2019 Unconstrained Ear Recognition Challenge (UERC), the second in a series of group benchmarking efforts centered around the problem of person recognition from ear images captured in uncontrolled settings. The goal of the challenge is to assess the performance of existing ear recognition techniques on a challenging large-scale ear dataset and to analyze performance of the technology from various viewpoints, such as generalization abilities to unseen data characteristics, sensitivity to rotations, occlusions and image resolution and performance bias on sub-groups of subjects, selected based on demographic criteria, i.e. gender and ethnicity. Research groups from 12 institutions entered the competition and submitted a total of 13 recognition approaches ranging from descriptor-based methods to deep-learning models. The majority of submissions focused on ensemble based methods combining either representations from multiple deep models or hand-crafted with learned image descriptors. Our analysis shows that methods incorporating deep learning models clearly outperform techniques relying solely on hand-crafted descriptors, even though both groups of techniques exhibit similar behaviour when it comes to robustness to various covariates, such presence of occlusions, changes in (head) pose, or variability in image resolution. The results of the challenge also show that there has been considerable progress since the first UERC in 2017, but that there is still ample room for further research in this area.
△ Less
Submitted 14 March, 2019; v1 submitted 11 March, 2019;
originally announced March 2019.
-
Deep Pepper: Expert Iteration based Chess agent in the Reinforcement Learning Setting
Authors:
Sai Krishna G. V.,
Kyle Goyette,
Ahmad Chamseddine,
Breandan Considine
Abstract:
An almost-perfect chess playing agent has been a long standing challenge in the field of Artificial Intelligence. Some of the recent advances demonstrate we are approaching that goal. In this project, we provide methods for faster training of self-play style algorithms, mathematical details of the algorithm used, various potential future directions, and discuss most of the relevant work in the are…
▽ More
An almost-perfect chess playing agent has been a long standing challenge in the field of Artificial Intelligence. Some of the recent advances demonstrate we are approaching that goal. In this project, we provide methods for faster training of self-play style algorithms, mathematical details of the algorithm used, various potential future directions, and discuss most of the relevant work in the area of computer chess. Deep Pepper uses embedded knowledge to accelerate the training of the chess engine over a "tabula rasa" system such as Alpha Zero. We also release our code to promote further research.
△ Less
Submitted 17 October, 2018; v1 submitted 2 June, 2018;
originally announced June 2018.
-
Randomized ICA and LDA Dimensionality Reduction Methods for Hyperspectral Image Classification
Authors:
Chippy Jayaprakash,
Bharath Bhushan Damodaran,
Sowmya V,
K P Soman
Abstract:
Dimensionality reduction is an important step in processing the hyperspectral images (HSI) to overcome the curse of dimensionality problem. Linear dimensionality reduction methods such as Independent component analysis (ICA) and Linear discriminant analysis (LDA) are commonly employed to reduce the dimensionality of HSI. These methods fail to capture non-linear dependency in the HSI data, as data…
▽ More
Dimensionality reduction is an important step in processing the hyperspectral images (HSI) to overcome the curse of dimensionality problem. Linear dimensionality reduction methods such as Independent component analysis (ICA) and Linear discriminant analysis (LDA) are commonly employed to reduce the dimensionality of HSI. These methods fail to capture non-linear dependency in the HSI data, as data lies in the nonlinear manifold. To handle this, nonlinear transformation techniques based on kernel methods were introduced for dimensionality reduction of HSI. However, the kernel methods involve cubic computational complexity while computing the kernel matrix, and thus its potential cannot be explored when the number of pixels (samples) are large. In literature a fewer number of pixels are randomly selected to partial to overcome this issue, however this sub-optimal strategy might neglect important information in the HSI. In this paper, we propose randomized solutions to the ICA and LDA dimensionality reduction methods using Random Fourier features, and we label them as RFFICA and RFFLDA. Our proposed method overcomes the scalability issue and to handle the non-linearities present in the data more efficiently. Experiments conducted with two real-world hyperspectral datasets demonstrates that our proposed randomized methods outperform the conventional kernel ICA and kernel LDA in terms overall, per-class accuracies and computational time.
△ Less
Submitted 19 April, 2018;
originally announced April 2018.
-
A Novel Design of Linear Phase Non-uniform Digital Filter Banks
Authors:
Sakthivel V,
Elizabeth Elias
Abstract:
In many applications such as wireless communications and subband adaptive filtering, we need to design non-uniform filter banks (NUFB), which may lead to better performances and reduced hardware complexity when compared to uniform filter bank. NUFB satisfying linear phase property for all the constituent filters, are desirable in applications such as speech and image processing and in communicatio…
▽ More
In many applications such as wireless communications and subband adaptive filtering, we need to design non-uniform filter banks (NUFB), which may lead to better performances and reduced hardware complexity when compared to uniform filter bank. NUFB satisfying linear phase property for all the constituent filters, are desirable in applications such as speech and image processing and in communication. This paper proposes a novel design of non-uniform modified discrete fourier transform filter bank (MDFT FB). Here, each non-uniform channel is obtained by merging the nearby channels of a uniform MDFT FB. The reported works of non-uniform cosine modulated filter banks (CMFBs) do not satisfy linear phase property for all the constituent filters. In this work, we introduce the design of a non-uniform MDFT FB which satisfies linear phase property for all the constituent filters. The proposed design of the non-uniform MDFT FB is checked utilizing the alias cancellation among the channels, distortion and flatness condition of the channels. A condition is derived to find the channels when merged with adjacent channels, will cause aliasing in M channels. In the design and implementation of the proposed non-uniform MDFT FB, the structure of the uniform MDFT filter bank is preserved and hence all the advantages of MDFT FB over the DFT filter bank, are guaranteed. Hence without increasing the design complexity, the non-uniform MDFT FB is designed.
△ Less
Submitted 8 March, 2016;
originally announced March 2016.
-
Coefficient of Restitution based Cross Layer Interference Aware Routing Protocol in Wireless Mesh Networks
Authors:
Sarasvathi V,
Snehanshu Saha,
N. Ch. S. N. Iyengar,
Mahalaxmi Koti
Abstract:
In Multi-Radio Multi-Channel (MRMC) Wireless Mesh Networks (WMN), Partially Overlapped Channels (POC) has been used to increase the parallel transmission. But adjacent channel interference is very severe in MRMC environment; it decreases the network throughput very badly. In this paper, we propose a Coefficient of Restitution based Cross layer Interference aware Routing protocol (CoRCiaR) to impro…
▽ More
In Multi-Radio Multi-Channel (MRMC) Wireless Mesh Networks (WMN), Partially Overlapped Channels (POC) has been used to increase the parallel transmission. But adjacent channel interference is very severe in MRMC environment; it decreases the network throughput very badly. In this paper, we propose a Coefficient of Restitution based Cross layer Interference aware Routing protocol (CoRCiaR) to improve TCP performance in Wireless Mesh Networks. This approach comprises of two-steps: Initially, the interference detection algorithm is developed at MAC layer by enhancing the RTS/CTS method. Based on the channel interference, congestion is identified by Round Trip Time (RTT) measurements, and subsequently the route discovery module selects the alternative path to send the data packet. The packets are transmitted to the congestion free path seamlessly by the source. The performance of the proposed CoRCiaR protocol is measured by Coefficient of Restitution (COR) parameter. The impact of the rerouting is experienced on the network throughput performance. The simulation results show that the proposed cross layer interference aware dynamic routing enhances the TCP performance on WMN.
Keywords: Coefficient of Restitution, Wireless Mesh Networks, Partially Overlapped Channels, Round Trip Time, Multi-Radio, Multi-Channel.
△ Less
Submitted 14 November, 2015;
originally announced November 2015.
-
SLI, a New Metric to determine Success of a Software Project
Authors:
Shashi Kumar N. R.,
T. R. Gopalakrishnan Nair,
Suma V
Abstract:
Project Management process plays a critical role in managing factors such as cost, time, technology and personnel towards achieving the success of a project and henceforth the sustainability of the company in the industrial market. This paper emphasizes empirical study of several projects developed over a period of time in a product and service based CMMI Level 5 Software Company. The investigatio…
▽ More
Project Management process plays a critical role in managing factors such as cost, time, technology and personnel towards achieving the success of a project and henceforth the sustainability of the company in the industrial market. This paper emphasizes empirical study of several projects developed over a period of time in a product and service based CMMI Level 5 Software Company. The investigation shows impact analysis of resources such as cost, time, and number of developers towards the successful completion of the project as allocated by the project manager during the developmental process. The analysis has further led to the introduction of a new qualitative metric, Success Level Index Metric (SLI) whose index value varies from 0 to 1. SLI acts as a maturity indicator that indicates the degree of maturity of the company in terms of success of their projects based on which the company can choose their desired level of success for their projects.
△ Less
Submitted 31 July, 2014;
originally announced July 2014.
-
A Parametric Analysis of Project Management Performance to Enhance Software Development Process
Authors:
Shashikumar N. R.,
T. R. Gopalakrishnan Nair,
Suma V
Abstract:
Project Management process plays a significant role in effective development of software projects. Key challenges in the project management process are the estimation of time, cost, defect count, and subsequently selection of apt developers. Therefore precise estimation of above stated factors decides the success level of a project. This paper provides an empirical study of several projects develo…
▽ More
Project Management process plays a significant role in effective development of software projects. Key challenges in the project management process are the estimation of time, cost, defect count, and subsequently selection of apt developers. Therefore precise estimation of above stated factors decides the success level of a project. This paper provides an empirical study of several projects developed in a service oriented software company in order to comprehend the project management process. The analysis throws light on the existence of variation in the aforementioned factors between estimation and observed results. It further captures the need for betterment of project management process in estimation and allocation of resources in the realization of high quality software product. The paper therefore aims to bring in an improved awareness in software engineering personnel concerning the magnitude and significance of better estimation and accurate allocation of resources for develo** successful project.
△ Less
Submitted 20 July, 2014;
originally announced July 2014.
-
Impact Analysis of Allocation of Resources by Project Manager on Success of Software Projects
Authors:
T. R. Gopalakrishnan Nair,
Suma V,
Shashi Kumar N. R
Abstract:
Generation Production of successful software project is one of the prime considerations of software industry. Engineering high quality software products is further influenced by several factors such as budget, schedule, resource constraints etc. A project manager is responsible for estimation and allocation of these resources in a project. Hence, role of project manager has a vital influence on su…
▽ More
Generation Production of successful software project is one of the prime considerations of software industry. Engineering high quality software products is further influenced by several factors such as budget, schedule, resource constraints etc. A project manager is responsible for estimation and allocation of these resources in a project. Hence, role of project manager has a vital influence on success of the project. This research comprises of an empirical study of several projects developed in a product and service based CMMI Level 5 Software Company. The investigation result shows a significant impact of aforementioned factors on the success of software and on the company. The analysis further indicates the vital role of project managers in optimizing the resource allocation towards development of software. This paper brings in impact analysis of efficiency of project manager in effectively allocating resources such as time, cost, number of developers etc. An awareness of efficiency level of project manager in optimal allocation of resources enables one to realize the desired level of quality.
△ Less
Submitted 20 July, 2014;
originally announced July 2014.
-
Enhancing Human Aspect of Software Engineering using Bayesian Classifier
Authors:
Sangita Gupta,
Suma V
Abstract:
IT industries in current scenario have to struggle effectively in terms of cost, quality, service or innovation for their subsistence in the global market. Due to the swift transformation of technology, software industries owe to manage a large set of data having precious information hidden. Data mining technique enables one to effectively cope with this hidden information where it can be applied…
▽ More
IT industries in current scenario have to struggle effectively in terms of cost, quality, service or innovation for their subsistence in the global market. Due to the swift transformation of technology, software industries owe to manage a large set of data having precious information hidden. Data mining technique enables one to effectively cope with this hidden information where it can be applied to code optimization, fault prediction and other domains which modulates the success nature of software projects. Additionally, the efficiency of the product developed further depends upon the quality of the project personnel. The position of the paper therefore is to explore potentials of project personnel in terms of their competency and skill set and its influence on quality of project. The above mentioned objective is accomplished using a Bayesian classifier in order to capture the pattern of human performance. By this means, the hidden and valuable knowledge discovered in the related databases will be summarized in the statistical structure. This mode of predictive study enables the project managers to reduce the failure ratio to a significant level and improve the performance of the project using the right choice of project personnel.
△ Less
Submitted 11 February, 2014;
originally announced February 2014.
-
Empirical Study on Selection of Team Members for Software Projects - Data Mining Approach
Authors:
Sangita Gupta,
Suma. V
Abstract:
One of the essential requisites of any software industry is the development of customer satisfied products. However, accomplishing the aforesaid business objective depends upon the depth of quality of product that is engineered in the organization. Thus, generation of high quality depends upon process, which is in turn depends upon the people. Existing scenario in IT industries demands a requireme…
▽ More
One of the essential requisites of any software industry is the development of customer satisfied products. However, accomplishing the aforesaid business objective depends upon the depth of quality of product that is engineered in the organization. Thus, generation of high quality depends upon process, which is in turn depends upon the people. Existing scenario in IT industries demands a requirement for deploying the right personnel for achieving desirable quality in the product through the existing process. The goal of this paper is to identify the criteria which will be used in industrial practice to select members of a software project team, and to look for relationships between these criteria and project success. Using semi-structured interviews and qualitative methods for data analysis and synthesis, a set of team building criteria was identified from project managers in industry. The findings show that the consistent use of the set of criteria correlated significantly with project success, and the criteria related to human factors present strong correlations with software quality and thereby project success. This knowledge enables decision making for project managers in allocation of right personnel to realize desired level.
△ Less
Submitted 11 February, 2014;
originally announced February 2014.
-
Prediction of Human Performance Capability during Software Development using Classification
Authors:
Sangita Gupta,
Suma V
Abstract:
The quality of human capital is crucial for software companies to maintain competitive advantages in knowledge economy era. Software companies recognize superior talent as a business advantage. They increasingly recognize the critical linkage between effective talent and business success. However, software companies suffering from high turnover rates often find it hard to recruit the right talents…
▽ More
The quality of human capital is crucial for software companies to maintain competitive advantages in knowledge economy era. Software companies recognize superior talent as a business advantage. They increasingly recognize the critical linkage between effective talent and business success. However, software companies suffering from high turnover rates often find it hard to recruit the right talents. There is an urgent need to develop a personnel selection mechanism to find the talents who are the most suitable for their software projects. Data mining techniques assures exploring the information from the historical projects depending on which the project manager can make decisions for producing high quality software. This study aims to fill the gap by develo** a data mining framework based on decision tree and association rules to refocus on criteria for personnel selection. An empirical study was conducted in a software company to support their hiring decision for project members. The results demonstrated that there is a need to refocus on selection criteria for quality objectives. Better selection criteria was identified by patterns obtained from data mining models by integrating knowledge from software project database and authors research techniques.
△ Less
Submitted 11 February, 2014;
originally announced February 2014.
-
Significance of Coupling and Cohesion on Design Quality
Authors:
Poornima U. S.,
Suma. V
Abstract:
In recent years, the complexity of the software is increasing due to automation of every segment of application. Software is nowhere remained as one-time development product since its architectural dimension is increasing with addition of new requirements over a short duration. Object Oriented Development (OOD) methodology is a popular development approach for such systems which perceives and mode…
▽ More
In recent years, the complexity of the software is increasing due to automation of every segment of application. Software is nowhere remained as one-time development product since its architectural dimension is increasing with addition of new requirements over a short duration. Object Oriented Development (OOD) methodology is a popular development approach for such systems which perceives and models the requirements as real world entities. Classes and Objects logically represent the entities in the solution space and quality of the software is directly depending on the design quality of these logical entities. Cohesion and Coupling (C&C) are two major design decisive factors in OOD which impacts the design of a class and dependency between them in complex software. It is also most significant to measure C&C for software to control the complexity level as requirements increases. Several metrics are in practice to quantify C&C which plays a major role in measuring the design quality. The software industries are focusing on increasing and measuring the quality of the product through quality design to continue their market image in the competitive world. As a part of our research, this paper highlights on the impact of C&C on design quality of a complex system and its measures to quantify the overall quality of software.
△ Less
Submitted 11 February, 2014;
originally announced February 2014.
-
Factors Modulating Software Design Quality
Authors:
Poornima U. S.,
Suma. V
Abstract:
Object oriented approach is one of the popular software development approach for managing complex systems with massive set of requirements. Unlike procedural approach, this approach captures the requirements as set of data rather than services. Further, class is considered as a key unit of the solution-domain with data and services wrapped together, representing architectural design of a basic mod…
▽ More
Object oriented approach is one of the popular software development approach for managing complex systems with massive set of requirements. Unlike procedural approach, this approach captures the requirements as set of data rather than services. Further, class is considered as a key unit of the solution-domain with data and services wrapped together, representing architectural design of a basic module. Thus, system complexity is directly related to the number of modules and the degree of interaction between them. This could be mapped as a functional diagram with cardinalities between the modules. However, complexity is always a threat to quality at each stage of software development. Design phase is therefore one of the core influencing phases during development that selects the right architecture based on the problem statement which is bound to be measured for quality. Hence, software industries adapts several organization- specific principles, domain-specific patterns, metric standards and best practices to improve and measure the quality of both process and product. The paper highlights the factors which influence the overall design quality and metrics implication in improving the quality of final product. It also presents the solution domain as an interdependent layered architecture which has a greater impact on concluding the quality of the end product. This approach of design is a unique contribution to the domain of Object Oriented approach of software development. It also focuses on design metrics which ensures the implementation of right choice of design towards the retention of quality of the product.
△ Less
Submitted 11 February, 2014;
originally announced February 2014.
-
Visualization of Object Oriented Modeling from the Perspective of Set theory
Authors:
Poornima. U. S.,
Suma. V
Abstract:
Language is a medium for communication of our thoughts. Natural language is too wide to conceive and formulate the thoughts and ideas in a precise way. As science and technology grows, the necessity of languages arouses through which the thoughts are expressed in a better manner. Set Theory is such a mathematical language for expressing the thought of interest in a realistic way. It is well suited…
▽ More
Language is a medium for communication of our thoughts. Natural language is too wide to conceive and formulate the thoughts and ideas in a precise way. As science and technology grows, the necessity of languages arouses through which the thoughts are expressed in a better manner. Set Theory is such a mathematical language for expressing the thought of interest in a realistic way. It is well suited for presenting object oriented solution model, since this implementation methodology analyzes and modulates the requirements in a realistic way. Since the design flaws are one of the factors for software failure, industries are focusing on minimizing the design defects through better solution modeling techniques and quality assessment practices. The Object Oriented (OO) solution space can be visualized using the language of Set theory with which the design architecture of modules can be well defined. It provides a strong base to quantify the relationships within and between the modules, which is a mode for measuring the complexity of solution design of any software projects. This paper provides a visualization of OO modeling from the perspective of Set theory. Thereby, it paves the path for the designers to effectively design the application which is one of the challenges of a project development. Further, this mode of visualization enables one to effectively measure and controls the design complexity leading towards reducing the design flaws and enhanced software quality.
△ Less
Submitted 11 February, 2014;
originally announced February 2014.
-
Design Patterns as Quality Influencing Factor in Object Oriented Design Approach
Authors:
Poornima. U. S.,
Suma. V,
Vasanth Kumar. H
Abstract:
Object Oriented Design methodology is an emerging software development approach for complex systems with huge set of requirements. Unlike procedural approach, it captures the requirements as a set of data rather than services, encapsulated as a single entity. The success such a project relies on major factors like design patterns framework, key principles, metric standards and best practices adapt…
▽ More
Object Oriented Design methodology is an emerging software development approach for complex systems with huge set of requirements. Unlike procedural approach, it captures the requirements as a set of data rather than services, encapsulated as a single entity. The success such a project relies on major factors like design patterns framework, key principles, metric standards and best practices adapted by the industry. The patterns are key structures for recursive problem bits in the problem domain. The combination of design patterns forms a framework which suits the problem statement in hand. The pattern includes static design and dynamic behavior of different types of entities which can be mapped as a functional diagram with cardinalities between them. The degree of cardinality represents the coupling factor which the industry perceives and measures for software design quality. The organization specific design principles and rich repository of on-the-shelf patterns are the major design-quality-influencing-factor contribute to software success. These are the asset of an industry to deliver a quality product to sustain itself in the competitive market.
△ Less
Submitted 10 February, 2014;
originally announced February 2014.
-
Defect Detection Efficiency A Combined Approach
Authors:
Rashmi N,
Suma V
Abstract:
Survival of IT industries depends much upon the development of high quality and customer satisfied software products. Quality however can be viewed from various perspectives such as deployment of the products within estimated resources, constrains and also being defect free. Testing is one of the promising techniques ever since the inception of software in the global market. Though there are sever…
▽ More
Survival of IT industries depends much upon the development of high quality and customer satisfied software products. Quality however can be viewed from various perspectives such as deployment of the products within estimated resources, constrains and also being defect free. Testing is one of the promising techniques ever since the inception of software in the global market. Though there are several testing techniques existing, the most widely accepted is the conventional scripted testing. Despite of advancement in the technology, achieving defect free deliverables is yet a challenge. This paper therefore aims to enhance the existing testing techniques in order to achieve nearly zero defect products through the combined approach of scripted and exploratory testing. This approach thus enables the testing team to capture maximum defects and thereby reduce the expensive nature of overheads. Further, it leads towards generation of high quality products and assures the continued customer satisfaction.
△ Less
Submitted 31 January, 2014;
originally announced January 2014.
-
Performance Limits of a Cloud Radio
Authors:
Maaz M. Mohiuddin,
Varun Maheshwari,
Sreejith T. V.,
Kiran Kuchi,
G. V. V. Sharma,
Shahriar Emami
Abstract:
Cooperation in a cellular network is seen as a key technique in managing other cell interference to observe a gain in achievable rate. In this paper, we present the achievable rate regions for a cloud radio network using a sub-optimal zero forcing equalizer with dirty paper precoding. We show that when complete channel state information is available at the cloud, rates close to those achievable wi…
▽ More
Cooperation in a cellular network is seen as a key technique in managing other cell interference to observe a gain in achievable rate. In this paper, we present the achievable rate regions for a cloud radio network using a sub-optimal zero forcing equalizer with dirty paper precoding. We show that when complete channel state information is available at the cloud, rates close to those achievable with total interference cancellation can be achieved. With mean capacity gains, of up to 2 fold over the conventional cellular network in both uplink and downlink, this precoding scheme shows great promise for implementation in a cloud radio network. To simplify the analysis, we use a stochastic geometric framework based of Poisson point processes instead of the traditional grid based cellular network model.
We also study the impact of limiting the channel state information and geographical clustering to limit the cloud size on the achievable rate. We have observed that using this zero forcing-dirty paper coding technique, the adverse effect of inter-cluster interference can be minimized thereby transforming an interference limited network into a noise limited network as experienced by an average user in the network for low operating signal-to-noise-ratios. However, for higher signal-to-noise-ratios, both the average achievable rate and cell-edge achievable rate saturate as observed in literature. As the implementation of dirty paper coding is practically not feasible, we present a practical design of a cloud radio network using cloud a minimum mean square equalizer for processing the uplink streams and use Tomlinson-Harashima precoder as a sub-optimal substitute for a dirty paper precoder in downlink.
△ Less
Submitted 17 July, 2013;
originally announced July 2013.
-
Interference Aware Channel Assignmnet Using Edge Coloring in Multi-Channel Multi-Radio Wireless Mesh Networks
Authors:
Sarasvathi V,
N. CH. S. N. Iyengar,
Snehanshu Saha
Abstract:
Recently multi-channel multi-radio wireless mesh networks are considered a reliable and cost effective way for internet access in wide area. A major research challenge in this network is selecting least interference channel from available channel and then assigning it to radio efficiently. Many algorithms and methods have been developed for channel assignment to maximize network throughput using o…
▽ More
Recently multi-channel multi-radio wireless mesh networks are considered a reliable and cost effective way for internet access in wide area. A major research challenge in this network is selecting least interference channel from available channel and then assigning it to radio efficiently. Many algorithms and methods have been developed for channel assignment to maximize network throughput using orthogonal channels. Recent research and testbed experiments proved that POC based channel assignment allows more flexibility in wireless spectrum sharing. In this paper, we represent the channel assignment as a graph edge coloring problem using POC. The signal-to-noise interference ratio is measured to avoid interference from neighbouring transmission, when we assign channel to link. Simulation result shows that our proposed method improves network throughput and performance. Keywords:
Wireless Mesh Networks, Multi-Radio, Multi-Channel, Partially Overlap** Channels, Signal-to-noise interference
△ Less
Submitted 3 November, 2013; v1 submitted 3 May, 2013;
originally announced May 2013.
-
Graphical Visualization of Risk Assessment for Effective Risk Management during Software Development Process
Authors:
Raghavi K Bhujang,
Suma. V
Abstract:
Success of any IT industry depends on the success rate of their projects, which in turn depends on several factors such as cost, time, and availability of resources. These factors formulate the risk areas, which needs to be addressed in a proactive way. The rudimentary objective of risk management is to circumvent the possibility of their occurrence by identifying the risks, preparing the continge…
▽ More
Success of any IT industry depends on the success rate of their projects, which in turn depends on several factors such as cost, time, and availability of resources. These factors formulate the risk areas, which needs to be addressed in a proactive way. The rudimentary objective of risk management is to circumvent the possibility of their occurrence by identifying the risks, preparing the contingency plans and mitigation plans in order to reduce the consequences of the risks. Hence, effective risk management becomes one of the imperative challenges in any organization, which if deemed in an apt way assures the continued sustainability of the organization in the high-end competitive environment. This paper provides visualization of risk assessment through a graphical model. Further, the matrix representation of the risk assessment aids the project personnel to identify all the risks, comprehend their frequency and probability of their occurrence. In addition, the graphical model enables one to analyze the impact of identified risks and henceforth to assign their priorities. This mode of representation of risk assessment factors helps the organization in accurate prediction of success rate of the project.
△ Less
Submitted 4 October, 2012;
originally announced October 2012.
-
Four-Step Approach Model of Inspection (FAMI) for Effective Defect Management in Software Development
Authors:
Suma V.,
T. R. Gopalakrishnan Nair
Abstract:
IT industry should inculcate effective defect management on a continual basis to deploy nearly a zerodefect product to their customers. Inspection is one of the most imperative and effective strategies of defect management. Nevertheless, existing defect management strategies in leading software industries are successful to deliver a maximum of 96% defect-free product. An empirical study of various…
▽ More
IT industry should inculcate effective defect management on a continual basis to deploy nearly a zerodefect product to their customers. Inspection is one of the most imperative and effective strategies of defect management. Nevertheless, existing defect management strategies in leading software industries are successful to deliver a maximum of 96% defect-free product. An empirical study of various projects across several service-based and product-based industries proves the above affirmations. This paper provides an enhanced approach of inspection through a Four-Step Approach Model of Inspection (FAMI). FAMI consists of i) integration of Inspection Life Cycle in V-model of software development, ii) implementation of process metric Depth of Inspection (DI), iii) implementation of people metric Inspection Performance Metric (IPM), iv) application of Bayesian probability approach for selection of appropriate values of inspection affecting parameters to achieve the desirable DI. The managers of software houses can make use of P2 metric as a benchmarking tool for the projects in order to improve the in-house defect management process. Implementation of FAMI in software industries reflects a continual process improvement and leads to the development of nearly a zero-defect product through effective defect management.
△ Less
Submitted 28 September, 2012;
originally announced September 2012.
-
Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis
Authors:
T. R. Gopalakrishnan Nair,
Suma V,
Manas S
Abstract:
Retention of secrecy is one of the significant features during communication activity. Steganography is one of the popular methods to achieve secret communication between sender and receiver by hiding message in any form of cover media such as an audio, video, text, images etc. Least significant bit encoding is the simplest encoding method used by many steganography programs to hide secret message…
▽ More
Retention of secrecy is one of the significant features during communication activity. Steganography is one of the popular methods to achieve secret communication between sender and receiver by hiding message in any form of cover media such as an audio, video, text, images etc. Least significant bit encoding is the simplest encoding method used by many steganography programs to hide secret message in 24bit, 8bit colour images and grayscale images. Steganalysis is a method of detecting secret message hidden in a cover media using steganography. RS steganalysis is one of the most reliable steganalysis which performs statistical analysis of the pixels to successfully detect the hidden message in an image. However, existing steganography method protects the information against RS steganalysis in grey scale images. This paper presents a steganography method using genetic algorithm to protect against the RS attack in colour images. Stego image is divided into number of blocks. Subsequently, with the implementation of natural evolution on the stego image using genetic algorithm enables to achieve optimized security and image quality.
△ Less
Submitted 12 April, 2012;
originally announced April 2012.
-
Cloud Computing For Microfinances
Authors:
Suma. V,
Bhagavant Deshpande,
Vaidehi. M,
T. R. Gopalakrishnan Nair
Abstract:
Evolution of Science and Engineering has led to the growth of several commercial applications. The wide spread implementation of commercial based applications has in turn directed the emergence of advanced technologies such as cloud computing. India has well proven itself as a potential hub for advanced technologies including cloud based industrial market. Microfinance system has emerged out as a…
▽ More
Evolution of Science and Engineering has led to the growth of several commercial applications. The wide spread implementation of commercial based applications has in turn directed the emergence of advanced technologies such as cloud computing. India has well proven itself as a potential hub for advanced technologies including cloud based industrial market. Microfinance system has emerged out as a panacea to Indian economy since the population encompasses of people who come under poverty and below poverty index. However, one of the key challenges in successful operation of microfinance system in India has given rise to integration of financial services using sophisticated cloud computing model. This paper, therefore propose a fundamental cloud-based microfinance model in order to reduce high transaction risks involved during microfinance operations in an inexpensive and efficient manner.
△ Less
Submitted 12 April, 2012;
originally announced April 2012.
-
Performance of Cache Memory Subsystems for Multicore Architectures
Authors:
N. Ramasubramanian,
Srinivas V. V.,
N. Ammasai Gounden
Abstract:
Advancements in multi-core have created interest among many research groups in finding out ways to harness the true power of processor cores. Recent research suggests that on-board component such as cache memory plays a crucial role in deciding the performance of multi-core systems. In this paper, performance of cache memory is evaluated through the parameters such as cache access time, miss rate…
▽ More
Advancements in multi-core have created interest among many research groups in finding out ways to harness the true power of processor cores. Recent research suggests that on-board component such as cache memory plays a crucial role in deciding the performance of multi-core systems. In this paper, performance of cache memory is evaluated through the parameters such as cache access time, miss rate and miss penalty. The influence of cache parameters over execution time is also discussed. Results obtained from simulated studies of multi-core environments with different instruction set architectures (ISA) like ALPHA and X86 are produced.
△ Less
Submitted 13 November, 2011;
originally announced November 2011.
-
Autonomous Traffic Control System Using Agent Based Technology
Authors:
Venkatesh. M,
K. Kumar,
Srinivas. V
Abstract:
The way of analyzing, designing and building of real-time projects has been changed due to the rapid growth of internet, mobile technologies and intelligent applications. Most of these applications are intelligent, tiny and distributed components called as agent. Agent works like it takes the input from numerous real-time sources and gives back the real-time response. In this paper how these agent…
▽ More
The way of analyzing, designing and building of real-time projects has been changed due to the rapid growth of internet, mobile technologies and intelligent applications. Most of these applications are intelligent, tiny and distributed components called as agent. Agent works like it takes the input from numerous real-time sources and gives back the real-time response. In this paper how these agents can be implemented in vehicle traffic management especially in large cities and identifying various challenges when there is a rapid growth of population and vehicles. In this paper our proposal gives a solution for using autonomous or agent based technology. These autonomous or intelligent agents have the capability to observe, act and learn from their past experience. This system uses the knowledge flow of precedent signal or data to identify the incoming flow of forthcoming signal. Our architecture involves the video analysis and exploration using some Intelligence learning algorithm to estimate and identify the flow of traffic.
△ Less
Submitted 2 August, 2011; v1 submitted 19 July, 2011;
originally announced July 2011.
-
Estimation of Characteristics of a Software Team for Implementing Effective Inspection Process through Inspection Performance Metric
Authors:
T. R. Gopalakrishnan Nair,
Suma. V
Abstract:
The continued existence of any software industry depends on its capability to develop nearly zero-defect product, which is achievable through effective defect management. Inspection has proven to be one of the promising techniques of defect management. Introductions of metrics like, Depth of Inspection (DI, a process metric) and Inspection Performance Metric (IPM, a people metric) enable one to ha…
▽ More
The continued existence of any software industry depends on its capability to develop nearly zero-defect product, which is achievable through effective defect management. Inspection has proven to be one of the promising techniques of defect management. Introductions of metrics like, Depth of Inspection (DI, a process metric) and Inspection Performance Metric (IPM, a people metric) enable one to have an appropriate measurement of inspection technique. This article elucidates a mathematical approach to estimate the IPM value without depending on shop floor defect count at every time. By applying multiple linear regression models, a set of characteristic coefficients of the team is evaluated. These coefficients are calculated from the empirical projects that are sampled from the teams of product-based and service-based IT industries. A sample of three verification projects indicates a close match between the IPM values obtained from the defect count (IPMdc) and IPM values obtained using the team coefficients using the mathematical model (IPMtc). The IPM values observed onsite and IPM values produced by our model which are strongly matching, support the predictive capability of IPM through team coefficients. Having finalized the value of IPM that a company should achieve for a project, it can tune the inspection influencing parameters to realize the desired quality level of IPM. Evaluation of team coefficients resolves several defect-associated issues, which are related to the management, stakeholders, outsourcing agents and customers. In addition, the coefficient vector will further aid the strategy of PSP and TSP
△ Less
Submitted 16 July, 2011;
originally announced July 2011.
-
Defect Prevention Approaches in Medium Scale it Enterprises
Authors:
Suma V,
T. R. Gopalakrishnan Nair
Abstract:
The software industry is successful, if it can draw the complete attention of the customers towards it. This is achievable if the organization can produce a high quality product. To identify a product to be of high quality, it should be free of defects, should be capable of producing expected results. It should be delivered in an estimated cost, time and be maintainable with minimum effort. Defe…
▽ More
The software industry is successful, if it can draw the complete attention of the customers towards it. This is achievable if the organization can produce a high quality product. To identify a product to be of high quality, it should be free of defects, should be capable of producing expected results. It should be delivered in an estimated cost, time and be maintainable with minimum effort. Defect Prevention is the most critical but often neglected component of the software quality assurance in any project. If applied at all stages of software development, it can reduce the time, cost and resources required to engineer a high quality product.
△ Less
Submitted 22 January, 2010;
originally announced January 2010.
-
Effectiveness Of Defect Prevention In I.T. For Product Development
Authors:
Suma V.,
T. R. Gopalakrishnan Nair
Abstract:
Defect Prevention is the most critical but most neglected component of the software quality assurance in any project. If applied at all stages of software development, it can reduce the time, cost and resources required to engineer a high quality product. Software inspection has proved to be the most effective and efficient technique enabling defect detection and prevention. Inspections carried…
▽ More
Defect Prevention is the most critical but most neglected component of the software quality assurance in any project. If applied at all stages of software development, it can reduce the time, cost and resources required to engineer a high quality product. Software inspection has proved to be the most effective and efficient technique enabling defect detection and prevention. Inspections carried at all phases of software life cycle have proved to be most beneficial and value added to the attributes of the software. Work is an analysis based on the data collected for three different projects from a leading product based company. The purpose of the paper is to show that 55% to 65% of total number of defects occurs at design phase. Position of this paper also emphasizes the importance of inspections at all phases of the product development life cycle in order to achieve the minimal post deployment defects.
△ Less
Submitted 21 January, 2010;
originally announced January 2010.