Skip to main content

Showing 1–24 of 24 results for author: Balaji, S

  1. arXiv:2311.02454  [pdf, other

    cs.RO

    Enhancing the Performance of Pneu-net Actuators Using a Torsion Resistant Strain Limiting Layer

    Authors: Ian Sullivan Good, Srivatsan Balaji, Jeffrey Ian Lipton

    Abstract: Pneunets are the primary form of soft robotic grippers. A key limitation to their wider adoption is their inability to grasp larger payloads due to objects slipping out of grasps. We have overcome this limitation by introducing a torsionally rigid strain limiting layer (TRL). This reduces out-of-plane bending while maintaining the gripper's softness and in-plane flexibility. We characterize the de… ▽ More

    Submitted 24 January, 2024; v1 submitted 4 November, 2023; originally announced November 2023.

    Comments: 8 pages, 10 figures, submitted to Robosoft 2024. Updated to correct supporting grant information and author affiliations

  2. arXiv:2310.03030  [pdf, other

    physics.chem-ph cs.LG

    GPT-MolBERTa: GPT Molecular Features Language Model for molecular property prediction

    Authors: Suryanarayanan Balaji, Rishikesh Magar, Yayati Jadhav, Amir Barati Farimani

    Abstract: With the emergence of Transformer architectures and their powerful understanding of textual data, a new horizon has opened up to predict the molecular properties based on text description. While SMILES are the most common form of representation, they are lacking robustness, rich information and canonicity, which limit their effectiveness in becoming generalizable representations. Here, we present… ▽ More

    Submitted 10 October, 2023; v1 submitted 20 September, 2023; originally announced October 2023.

    Comments: Paper has 17 pages, 4 figures and 4 tables, along with 71 references

  3. Comparative Analysis of Imbalanced Malware Byteplot Image Classification using Transfer Learning

    Authors: Jayasudha M, Ayesha Shaik, Gaurav Pendharkar, Soham Kumar, Muhesh Kumar B, Sudharshanan Balaji

    Abstract: Cybersecurity is a major concern due to the increasing reliance on technology and interconnected systems. Malware detectors help mitigate cyber-attacks by comparing malware signatures. Machine learning can improve these detectors by automating feature extraction, identifying patterns, and enhancing dynamic analysis. In this paper, the performance of six multiclass classification models is compared… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

    Comments: accepted at PEIS2023 and will be published in Lecture Notes in Electrical Engineering

  4. arXiv:2303.08774  [pdf, other

    cs.CL cs.AI

    GPT-4 Technical Report

    Authors: OpenAI, Josh Achiam, Steven Adler, Sandhini Agarwal, Lama Ahmad, Ilge Akkaya, Florencia Leoni Aleman, Diogo Almeida, Janko Altenschmidt, Sam Altman, Shyamal Anadkat, Red Avila, Igor Babuschkin, Suchir Balaji, Valerie Balcom, Paul Baltescu, Haiming Bao, Mohammad Bavarian, Jeff Belgum, Irwan Bello, Jake Berdine, Gabriel Bernadett-Shapiro, Christopher Berner, Lenny Bogdonoff, Oleg Boiko , et al. (256 additional authors not shown)

    Abstract: We report the development of GPT-4, a large-scale, multimodal model which can accept image and text inputs and produce text outputs. While less capable than humans in many real-world scenarios, GPT-4 exhibits human-level performance on various professional and academic benchmarks, including passing a simulated bar exam with a score around the top 10% of test takers. GPT-4 is a Transformer-based mo… ▽ More

    Submitted 4 March, 2024; v1 submitted 15 March, 2023; originally announced March 2023.

    Comments: 100 pages; updated authors list; fixed author names and added citation

  5. Investigating Strategies for Clause Recommendation

    Authors: Sagar Joshi, Sumanth Balaji, Jerrin Thomas, Aparna Garimella, Vasudeva Varma

    Abstract: Clause recommendation is the problem of recommending a clause to a legal contract, given the context of the contract in question and the clause type to which the clause should belong. With not much prior work being done toward the generation of legal contracts, this problem was proposed as a first step toward the bigger problem of contract generation. As an open-ended text generation problem, the… ▽ More

    Submitted 21 January, 2023; originally announced January 2023.

    Comments: Published in Legal Knowledge and Information Systems (JURIX) 2022. (10 pages, 4 figures)

    ACM Class: I.2.7

    Journal ref: Volume 362: Legal Knowledge and Information Systems (2022), Frontiers in Artificial Intelligence and Applications

  6. arXiv:2301.06901  [pdf, other

    cs.CL cs.AI

    Graph-based Keyword Planning for Legal Clause Generation from Topics

    Authors: Sagar Joshi, Sumanth Balaji, Aparna Garimella, Vasudeva Varma

    Abstract: Generating domain-specific content such as legal clauses based on minimal user-provided information can be of significant benefit in automating legal contract generation. In this paper, we propose a controllable graph-based mechanism that can generate legal clauses using only the topic or type of the legal clauses. Our pipeline consists of two stages involving a graph-based planner followed by a c… ▽ More

    Submitted 7 January, 2023; originally announced January 2023.

    Comments: To be published in the Natural Legal Language Processing Workshop, EMNLP 2022 (11 pages, 7 figures)

    ACM Class: I.2.7

  7. arXiv:2112.09332  [pdf, other

    cs.CL cs.AI cs.LG

    WebGPT: Browser-assisted question-answering with human feedback

    Authors: Reiichiro Nakano, Jacob Hilton, Suchir Balaji, Jeff Wu, Long Ouyang, Christina Kim, Christopher Hesse, Shantanu Jain, Vineet Kosaraju, William Saunders, Xu Jiang, Karl Cobbe, Tyna Eloundou, Gretchen Krueger, Kevin Button, Matthew Knight, Benjamin Chess, John Schulman

    Abstract: We fine-tune GPT-3 to answer long-form questions using a text-based web-browsing environment, which allows the model to search and navigate the web. By setting up the task so that it can be performed by humans, we are able to train models on the task using imitation learning, and then optimize answer quality with human feedback. To make human evaluation of factual accuracy easier, models must coll… ▽ More

    Submitted 1 June, 2022; v1 submitted 17 December, 2021; originally announced December 2021.

    Comments: 32 pages

  8. arXiv:2107.03374  [pdf, other

    cs.LG

    Evaluating Large Language Models Trained on Code

    Authors: Mark Chen, Jerry Tworek, Heewoo Jun, Qiming Yuan, Henrique Ponde de Oliveira Pinto, Jared Kaplan, Harri Edwards, Yuri Burda, Nicholas Joseph, Greg Brockman, Alex Ray, Raul Puri, Gretchen Krueger, Michael Petrov, Heidy Khlaaf, Girish Sastry, Pamela Mishkin, Brooke Chan, Scott Gray, Nick Ryder, Mikhail Pavlov, Alethea Power, Lukasz Kaiser, Mohammad Bavarian, Clemens Winter , et al. (33 additional authors not shown)

    Abstract: We introduce Codex, a GPT language model fine-tuned on publicly available code from GitHub, and study its Python code-writing capabilities. A distinct production version of Codex powers GitHub Copilot. On HumanEval, a new evaluation set we release to measure functional correctness for synthesizing programs from docstrings, our model solves 28.8% of the problems, while GPT-3 solves 0% and GPT-J sol… ▽ More

    Submitted 14 July, 2021; v1 submitted 7 July, 2021; originally announced July 2021.

    Comments: corrected typos, added references, added authors, added acknowledgements

  9. arXiv:2011.03206  [pdf, other

    cs.LG cs.DC cs.NI

    Resource-Constrained Federated Learning with Heterogeneous Labels and Models

    Authors: Gautham Krishna Gudur, Bala Shyamala Balaji, Satheesh K. Perepu

    Abstract: Various IoT applications demand resource-constrained machine learning mechanisms for different applications such as pervasive healthcare, activity monitoring, speech recognition, real-time computer vision, etc. This necessitates us to leverage information from multiple devices with few communication overheads. Federated Learning proves to be an extremely viable option for distributed and collabora… ▽ More

    Submitted 6 November, 2020; originally announced November 2020.

    Comments: 6 pages, 5 figures, ACM KDD 2020 (The 3rd International Workshop on Artificial Intelligence of Things - AIoT'20)

  10. arXiv:2010.01344  [pdf, other

    cs.IT

    Codes for Distributed Storage

    Authors: Vinayak Ramkumar, Myna Vajha, S. B. Balaji, M. Nikhil Krishnan, Birenjith Sasidharan, P. Vijay Kumar

    Abstract: This chapter deals with the topic of designing reliable and efficient codes for the storage and retrieval of large quantities of data over storage devices that are prone to failure. For long, the traditional objective has been one of ensuring reliability against data loss while minimizing storage overhead. More recently, a third concern has surfaced, namely of the need to efficiently recover from… ▽ More

    Submitted 3 October, 2020; originally announced October 2020.

    Comments: This survey article will appear as a chapter in the upcoming "A Concise Encyclopedia of Coding Theory", W. C. Huffman, J.-L. Kim, and P. Solé, CRC Press

  11. arXiv:2008.08878  [pdf, other

    cs.LG stat.ML

    Reinforcement Learning based dynamic weighing of Ensemble Models for Time Series Forecasting

    Authors: Satheesh K. Perepu, Bala Shyamala Balaji, Hemanth Kumar Tanneru, Sudhakar Kathari, Vivek Shankar Pinnamaraju

    Abstract: Ensemble models are powerful model building tools that are developed with a focus to improve the accuracy of model predictions. They find applications in time series forecasting in varied scenarios including but not limited to process industries, health care, and economics where a single model might not provide optimal performance. It is known that if models selected for data modelling are distinc… ▽ More

    Submitted 20 August, 2020; originally announced August 2020.

    Comments: 6 pages, 4 figures, In review for conference

  12. arXiv:1912.10752  [pdf, other

    cs.LG cs.CV cs.NE

    Learn-able parameter guided Activation Functions

    Authors: S. Balaji, T. Kavya, Natasha Sebastian

    Abstract: In this paper, we explore the concept of adding learn-able slope and mean shift parameters to an activation function to improve the total response region. The characteristics of an activation function depend highly on the value of parameters. Making the parameters learn-able, makes the activation function more dynamic and capable to adapt as per the requirements of its neighboring layers. The intr… ▽ More

    Submitted 23 December, 2019; originally announced December 2019.

    Comments: 14 pages, 9 figures

  13. arXiv:1812.02502  [pdf, other

    cs.IT

    A Tight Rate Bound and Matching Construction for Locally Recoverable Codes with Sequential Recovery From Any Number of Multiple Erasures

    Authors: S. B. Balaji, Ganesh R. Kini, P. Vijay Kumar

    Abstract: By a locally recoverable code (LRC), we will in this paper, mean a linear code in which a given code symbol can be recovered by taking a linear combination of at most $r$ other code symbols with $r << k$. A natural extension is to the local recovery of a set of $t$ erased symbols. There have been several approaches proposed for the handling of multiple erasures. The approach considered here, is on… ▽ More

    Submitted 6 December, 2018; originally announced December 2018.

    Comments: To admin: Has overlaps with 1806.04474,1611.08561,1801.06794 . This is for submitting to the Journal

  14. arXiv:1806.04474  [pdf, other

    cs.IT

    Erasure Codes for Distributed Storage: Tight Bounds and Matching Constructions

    Authors: S. B. Balaji, P. Vijay Kumar

    Abstract: This thesis makes several significant contributions to the theory of both Regenerating (RG) and Locally Recoverable (LR) codes. The two principal contributions are characterizing the optimal rate of an LR code designed to recover from $t$ erased symbols sequentially, for any $t$ and the development of a tight bound on the sub-packetization level (length of a vector code symbol) of a sub-class of R… ▽ More

    Submitted 12 June, 2018; originally announced June 2018.

    Comments: My PhD Thesis

  15. arXiv:1806.04437  [pdf, other

    cs.IT

    Erasure Coding for Distributed Storage: An Overview

    Authors: S. B. Balaji, M. Nikhil Krishnan, Myna Vajha, Vinayak Ramkumar, Birenjith Sasidharan, P. Vijay Kumar

    Abstract: In a distributed storage system, code symbols are dispersed across space in nodes or storage units as opposed to time. In settings such as that of a large data center, an important consideration is the efficient repair of a failed node. Efficient repair calls for erasure codes that in the face of node failure, are efficient in terms of minimizing the amount of repair data transferred over the netw… ▽ More

    Submitted 12 June, 2018; originally announced June 2018.

    Comments: This survey article will appear in Science China Information Sciences (SCIS) journal

  16. arXiv:1804.00598  [pdf, other

    cs.IT

    Small-d MSR Codes with Optimal Access, Optimal Sub-Packetization and Linear Field Size

    Authors: Myna Vajha, S. B. Balaji, P. Vijay Kumar

    Abstract: This paper presents an explicit construction of a class of optimal-access, minimum storage regenerating (MSR) codes, for small values of the number $d$ of helper nodes. The construction is valid for any parameter set $(n,k,d)$ with $d \in \{k+1, k+2, k+3\}$ and employs a finite field $\mathbb{F}_q$ of size $q=O(n)$. We will refer to the constructed codes as Small-d MSR codes. The sub-packetization… ▽ More

    Submitted 22 September, 2021; v1 submitted 2 April, 2018; originally announced April 2018.

  17. arXiv:1801.06794  [pdf, other

    cs.IT

    A Rate-Optimal Construction of Codes with Sequential Recovery with Low Block Length

    Authors: Balaji Srinivasan Babu, Ganesh R. Kini, P. Vijay Kumar

    Abstract: An erasure code is said to be a code with sequential recovery with parameters $r$ and $t$, if for any $s \leq t$ erased code symbols, there is an $s$-step recovery process in which at each step we recover exactly one erased code symbol by contacting at most $r$ other code symbols. In earlier work by the same authors, presented at ISIT 2017, we had given a construction for binary codes with sequent… ▽ More

    Submitted 21 January, 2018; originally announced January 2018.

    Comments: Accepted for publication in NCC 2018

  18. arXiv:1710.05876  [pdf, other

    cs.IT

    On Lower Bounds on Sub-Packetization Level of MSR codes and On The Structure of Optimal-Access MSR Codes Achieving The Bound

    Authors: S. B. Balaji, Myna Vajha, P. Vijay Kumar

    Abstract: We present two lower bounds on sub-packetization level $α$ of MSR codes with parameters $(n, k, d=n-1, α)$ where $n$ is the block length, $k$ dimension, $d$ number of helper nodes contacted during single node repair and $α$ the sub-packetization level. The first bound we present is for any MSR code and is given by $α\ge e^{\frac{(k-1)(r-1)}{2r^2}}$. The second bound we present is for the case of… ▽ More

    Submitted 18 September, 2021; v1 submitted 16 October, 2017; originally announced October 2017.

    Comments: Revised for journal submission

  19. arXiv:1611.08561  [pdf, other

    cs.IT

    A Tight Rate Bound and a Matching Construction for Locally Recoverable Codes with Sequential Recovery From Any Number of Multiple Erasures

    Authors: S. B. Balaji, Ganesh R. Kini, P. Vijay Kumar

    Abstract: An $[n,k]$ code $\mathcal{C}$ is said to be locally recoverable in the presence of a single erasure, and with locality parameter $r$, if each of the $n$ code symbols of $\mathcal{C}$ can be recovered by accessing at most $r$ other code symbols. An $[n,k]$ code is said to be a locally recoverable code with sequential recovery from $t$ erasures, if for any set of $s \leq t$ erasures, there is an… ▽ More

    Submitted 17 February, 2017; v1 submitted 25 November, 2016; originally announced November 2016.

    Comments: Revised version of the paper with revised title and abstract (longer version of ISIT 2017 submission)

  20. arXiv:1611.00159  [pdf, other

    cs.IT

    Bounds on Codes with Locality and Availability

    Authors: S. B. Balaji, P. Vijay Kumar

    Abstract: In this paper we investigate bounds on rate and minimum distance of codes with $t$ availability. We present bounds on minimum distance of a code with $t$ availability that are tighter than existing bounds. For bounds on rate of a code with $t$ availability, we restrict ourselves to a sub-class of codes with $t$ availability called codes with strict $t$ availability and derive a tighter rate bound.… ▽ More

    Submitted 28 February, 2017; v1 submitted 1 November, 2016; originally announced November 2016.

    Comments: submitted to ISIT 2017

  21. arXiv:1607.02817  [pdf, other

    cs.IT

    Binary Codes with Locality for Four Erasures

    Authors: S. B. Balaji, K. P. Prasanth, P. Vijay Kumar

    Abstract: In this paper, codes with locality for four erasures are considered. An upper bound on the rate of codes with locality with sequential recovery from four erasures is derived. The rate bound derived here is field independent. An optimal construction for binary codes meeting this rate bound is also provided. The construction is based on regular graphs of girth $6$ and employs the sequential approach… ▽ More

    Submitted 3 November, 2016; v1 submitted 11 July, 2016; originally announced July 2016.

    Comments: 5 pages, 2 figures

  22. Binary Codes with Locality for Multiple Erasures Having Short Block Length

    Authors: S. B. Balaji, K. P. Prasanth, P. Vijay Kumar

    Abstract: The focus of this paper is on linear, binary codes with locality having locality parameter $r$, that are capable of recovering from $t\geq 2$ erasures and that moreover, have short block length. Both sequential and parallel (through orthogonal parity checks) recovery is considered here. In the case of parallel repair, minimum-block-length constructions for general $t$ are discussed. In the case of… ▽ More

    Submitted 2 February, 2016; v1 submitted 26 January, 2016; originally announced January 2016.

    Comments: 17 pages, submitted to ISIT 2016

  23. arXiv:1501.07130  [pdf, ps, other

    cs.IT

    On Partial Maximally-Recoverable and Maximally-Recoverable Codes

    Authors: S. B. Balaji, P. Vijay Kumar

    Abstract: An [n, k] linear code C that is subject to locality constraints imposed by a parity check matrix H0 is said to be a maximally recoverable (MR) code if it can recover from any erasure pattern that some k-dimensional subcode of the null space of H0 can recover from. The focus in this paper is on MR codes constrained to have all-symbol locality r. Given that it is challenging to construct MR codes ha… ▽ More

    Submitted 28 January, 2015; originally announced January 2015.

  24. arXiv:1303.1913  [pdf

    cs.NE

    Design and Development of Artificial Neural Networking (ANN) system using sigmoid activation function to predict annual rice production in Tamilnadu

    Authors: S. Arun Balaji, K. Baskaran

    Abstract: Prediction of annual rice production in all the 31 districts of Tamilnadu is an important decision for the Government of Tamilnadu. Rice production is a complex process and non linear problem involving soil, crop, weather, pest, disease, capital, labour and management parameters. ANN software was designed and developed with Feed Forward Back Propagation (FFBP) network to predict rice production. T… ▽ More

    Submitted 8 March, 2013; originally announced March 2013.

    Comments: 19 pages, 7 figures, published in the International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3, No.1, February 2013

    Report number: International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3, No.1, February 2013 MSC Class: 14J60 (Primary) 14F05; 14J26 (Secondary) ACM Class: F.2.2; I.2.7

    Journal ref: IJCSEIT, Vol.3, No.1, February 2013