Skip to main content

Showing 1–50 of 68 results for author: Dutta, P

  1. arXiv:2407.06056  [pdf, other

    cs.RO cs.AI

    Stranger Danger! Identifying and Avoiding Unpredictable Pedestrians in RL-based Social Robot Navigation

    Authors: Sara Pohland, Alvin Tan, Prabal Dutta, Claire Tomlin

    Abstract: Reinforcement learning (RL) methods for social robot navigation show great success navigating robots through large crowds of people, but the performance of these learning-based methods tends to degrade in particularly challenging or unfamiliar situations due to the models' dependency on representative training data. To ensure human safety and comfort, it is critical that these algorithms handle un… ▽ More

    Submitted 8 July, 2024; originally announced July 2024.

  2. arXiv:2406.18700  [pdf, other

    cs.CC

    On Fourier analysis of sparse Boolean functions over certain Abelian groups

    Authors: Sourav Chakraborty, Swarnalipa Datta, Pranjal Dutta, Arijit Ghosh, Swagato Sanyal

    Abstract: Given an Abelian group G, a Boolean-valued function f: G -> {-1,+1}, is said to be s-sparse, if it has at most s-many non-zero Fourier coefficients over the domain G. In a seminal paper, Gopalan et al. proved "Granularity" for Fourier coefficients of Boolean valued functions over Z_2^n, that have found many diverse applications in theoretical computer science and combinatorics. They also studied s… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

  3. arXiv:2406.16993  [pdf, other

    eess.IV cs.CV

    Are Vision xLSTM Embedded UNet More Reliable in Medical 3D Image Segmentation?

    Authors: Pallabi Dutta, Soham Bose, Swalpa Kumar Roy, Sushmita Mitra

    Abstract: The advancement of developing efficient medical image segmentation has evolved from initial dependence on Convolutional Neural Networks (CNNs) to the present investigation of hybrid models that combine CNNs with Vision Transformers. Furthermore, there is an increasing focus on creating architectures that are both high-performing in medical image segmentation tasks and computationally efficient to… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

  4. arXiv:2405.13449  [pdf, other

    cs.LG cs.AI

    Input Guided Multiple Deconstruction Single Reconstruction neural network models for Matrix Factorization

    Authors: Prasun Dutta, Rajat K. De

    Abstract: Referring back to the original text in the course of hierarchical learning is a common human trait that ensures the right direction of learning. The models developed based on the concept of Non-negative Matrix Factorization (NMF), in this paper are inspired by this idea. They aim to deal with high-dimensional data by discovering its low rank approximation by determining a unique pair of factor mat… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

    Comments: 50 pages, 25 figures

  5. arXiv:2401.07631  [pdf, other

    cs.CC math.AG

    Fixed-parameter debordering of Waring rank

    Authors: Pranjal Dutta, Fulvio Gesmundo, Christian Ikenmeyer, Gorav Jindal, Vladimir Lysikov

    Abstract: Border complexity measures are defined via limits (or topological closures), so that any function which can approximated arbitrarily closely by low complexity functions itself has low border complexity. Debordering is the task of proving an upper bound on some non-border complexity measure in terms of a border complexity measure, thus getting rid of limits. Debordering is at the heart of underst… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

    Comments: 22 pages; accepted at STACS 2024; this is an edited part of the preprint arXiv:2211.07055

    MSC Class: 68Q99 ACM Class: F.1.3

  6. Real-Time Human Fall Detection using a Lightweight Pose Estimation Technique

    Authors: Ekram Alam, Abu Sufian, Paramartha Dutta, Marco Leo

    Abstract: The elderly population is increasing rapidly around the world. There are no enough caretakers for them. Use of AI-based in-home medical care systems is gaining momentum due to this. Human fall detection is one of the most important tasks of medical care system for the aged people. Human fall is a common problem among elderly people. Detection of a fall and providing medical help as early as possib… ▽ More

    Submitted 3 January, 2024; originally announced January 2024.

  7. arXiv:2311.17019  [pdf, other

    cs.CC math.AG

    Homogeneous Algebraic Complexity Theory and Algebraic Formulas

    Authors: Pranjal Dutta, Fulvio Gesmundo, Christian Ikenmeyer, Gorav Jindal, Vladimir Lysikov

    Abstract: We study algebraic complexity classes and their complete polynomials under \emph{homogeneous linear} projections, not just under the usual affine linear projections that were originally introduced by Valiant in 1979. These reductions are weaker yet more natural from a geometric complexity theory (GCT) standpoint, because the corresponding orbit closure formulations do not require the padding of po… ▽ More

    Submitted 28 November, 2023; originally announced November 2023.

    Comments: This is edited part of preprint arXiv:2211.07055

    MSC Class: 68Qxx ACM Class: F.1.3

  8. arXiv:2309.17009  [pdf, other

    cs.LG

    Deep Representation Learning for Prediction of Temporal Event Sets in the Continuous Time Domain

    Authors: Parag Dutta, Kawin Mayilvaghanan, Pratyaksha Sinha, Ambedkar Dukkipati

    Abstract: Temporal Point Processes (TPP) play an important role in predicting or forecasting events. Although these problems have been studied extensively, predicting multiple simultaneously occurring events can be challenging. For instance, more often than not, a patient gets admitted to a hospital with multiple conditions at a time. Similarly people buy more than one stock and multiple news breaks out at… ▽ More

    Submitted 29 September, 2023; originally announced September 2023.

    Comments: Accepted in ACML 2023 - Conference Track (Long Paper)

  9. arXiv:2309.07449  [pdf

    physics.soc-ph cs.MA math.DS nlin.AO

    Rate-Induced Transitions in Networked Complex Adaptive Systems: Exploring Dynamics and Management Implications Across Ecological, Social, and Socioecological Systems

    Authors: Vítor V. Vasconcelos, Flávia M. D. Marquitti, Theresa Ong, Lisa C. McManus, Marcus Aguiar, Amanda B. Campos, Partha S. Dutta, Kristen Jovanelly, Victoria Junquera, Jude Kong, Elisabeth H. Krueger, Simon A. Levin, Wenying Liao, Mingzhen Lu, Dhruv Mittal, Mercedes Pascual, Flávio L. Pinheiro, Juan Rocha, Fernando P. Santos, Peter Sloot, Chenyang, Su, Benton Taylor, Eden Tekwa, Sjoerd Terpstra , et al. (5 additional authors not shown)

    Abstract: Complex adaptive systems (CASs), from ecosystems to economies, are open systems and inherently dependent on external conditions. While a system can transition from one state to another based on the magnitude of change in external conditions, the rate of change -- irrespective of magnitude -- may also lead to system state changes due to a phenomenon known as a rate-induced transition (RIT). This st… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

    Comments: 25 pages, 4 figures, 1 box, supplementary information

    MSC Class: 37G; 37N; 91B; 91C; 91D; 91E; 92D; 92D25; 92D40; 92F; 93A; 93A14; 93A16 ACM Class: I.6.3; I.6.m; J.3; J.4; J.m; K.4.2

  10. arXiv:2306.15006  [pdf, other

    q-bio.GN cs.AI cs.CE cs.CL

    DNABERT-2: Efficient Foundation Model and Benchmark For Multi-Species Genome

    Authors: Zhihan Zhou, Yanrong Ji, Weijian Li, Pratik Dutta, Ramana Davuluri, Han Liu

    Abstract: Decoding the linguistic intricacies of the genome is a crucial problem in biology, and pre-trained foundational models such as DNABERT and Nucleotide Transformer have made significant strides in this area. Existing works have largely hinged on k-mer, fixed-length permutations of A, T, C, and G, as the token of the genome language due to its simplicity. However, we argue that the computation and sa… ▽ More

    Submitted 18 March, 2024; v1 submitted 26 June, 2023; originally announced June 2023.

    Comments: Accepted by ICLR 2024

  11. arXiv:2304.11325  [pdf, ps, other

    cs.CC cs.SC math.AC

    Deterministic identity testing paradigms for bounded top-fanin depth-4 circuits

    Authors: Pranjal Dutta, Prateek Dwivedi, Nitin Saxena

    Abstract: Polynomial Identity Testing (PIT) is a fundamental computational problem. The famous depth-$4$ reduction result by Agrawal and Vinay (FOCS 2008) has made PIT for depth-$4$ circuits an enticing pursuit. A restricted depth-4 circuit computing a $n$-variate degree-$d$ polynomial of the form $\sum_{i = 1}^{k} \prod_{j} g_{ij}$, where $°g_{ij} \leq δ$ is called $Σ^{[k]}ΠΣΠ^{[δ]}$ circuit. On further re… ▽ More

    Submitted 22 April, 2023; originally announced April 2023.

    Comments: A preliminary version appeared in 36th Computational Complexity Conference (CCC), 2021

    ACM Class: F.2.1

  12. arXiv:2301.06961  [pdf, other

    eess.IV cs.CV

    Composite Deep Network with Feature Weighting for Improved Delineation of COVID Infection in Lung CT

    Authors: Pallabi Dutta, Sushmita Mitra

    Abstract: An early effective screening and grading of COVID-19 has become imperative towards optimizing the limited available resources of the medical facilities. An automated segmentation of the infected volumes in lung CT is expected to significantly aid in the diagnosis and care of patients. However, an accurate demarcation of lesions remains problematic due to their irregular structure and location(s) w… ▽ More

    Submitted 17 February, 2023; v1 submitted 17 January, 2023; originally announced January 2023.

  13. arXiv:2211.07357  [pdf, other

    cs.LG cs.AI eess.SY

    Controlling Commercial Cooling Systems Using Reinforcement Learning

    Authors: Jerry Luo, Cosmin Paduraru, Octavian Voicu, Yuri Chervonyi, Scott Munns, Jerry Li, Crystal Qian, Praneet Dutta, Jared Quincy Davis, Ningjia Wu, Xingwei Yang, Chu-Ming Chang, Ted Li, Rob Rose, Mingyan Fan, Hootan Nakhost, Tinglin Liu, Brian Kirkman, Frank Altamura, Lee Cline, Patrick Tonker, Joel Gouker, Dave Uden, Warren Buddy Bryan, Jason Law , et al. (11 additional authors not shown)

    Abstract: This paper is a technical overview of DeepMind and Google's recent work on reinforcement learning for controlling commercial cooling systems. Building on expertise that began with cooling Google's data centers more efficiently, we recently conducted live experiments on two real-world facilities in partnership with Trane Technologies, a building management system provider. These live experiments ha… ▽ More

    Submitted 14 December, 2022; v1 submitted 11 November, 2022; originally announced November 2022.

    Comments: 27 pages, 11 figures

  14. arXiv:2211.07055  [pdf, ps, other

    cs.CC math.AG

    De-bordering and Geometric Complexity Theory for Waring rank and related models

    Authors: Pranjal Dutta, Fulvio Gesmundo, Christian Ikenmeyer, Gorav Jindal, Vladimir Lysikov

    Abstract: De-bordering is the task of proving that a border complexity measure is bounded from below, by a non-border complexity measure. This task is at the heart of understanding the difference between Valiant's determinant vs permanent conjecture, and Mulmuley and Sohoni's Geometric Complexity Theory (GCT) approach to settle the P \neq NP conjecture. Currently, very few de-bordering results are known.… ▽ More

    Submitted 13 April, 2023; v1 submitted 13 November, 2022; originally announced November 2022.

    MSC Class: 68W30; 14-XX; 05E10 ACM Class: F.1.3

  15. arXiv:2210.15722  [pdf, other

    cs.CV

    PatchRot: A Self-Supervised Technique for Training Vision Transformers

    Authors: Sachin Chhabra, Prabal Bijoy Dutta, Hemanth Venkateswara, Baoxin Li

    Abstract: Vision transformers require a huge amount of labeled data to outperform convolutional neural networks. However, labeling a huge dataset is a very expensive process. Self-supervised learning techniques alleviate this problem by learning features similar to supervised learning in an unsupervised way. In this paper, we propose a self-supervised technique PatchRot that is crafted for vision transforme… ▽ More

    Submitted 27 October, 2022; originally announced October 2022.

    Comments: NeurIPS Workshop on Vision Transformers: Theory and Applications (VTTA)

  16. arXiv:2210.15571  [pdf, other

    eess.IV cs.CV

    Full-scale Deeply Supervised Attention Network for Segmenting COVID-19 Lesions

    Authors: Pallabi Dutta, Sushmita Mitra

    Abstract: Automated delineation of COVID-19 lesions from lung CT scans aids the diagnosis and prognosis for patients. The asymmetric shapes and positioning of the infected regions make the task extremely difficult. Capturing information at multiple scales will assist in deciphering features, at global and local levels, to encompass lesions of variable size and texture. We introduce the Full-scale Deeply Sup… ▽ More

    Submitted 27 October, 2022; originally announced October 2022.

  17. arXiv:2209.08112  [pdf, other

    cs.LG cs.AI cs.MA cs.RO eess.SY

    Optimizing Industrial HVAC Systems with Hierarchical Reinforcement Learning

    Authors: William Wong, Praneet Dutta, Octavian Voicu, Yuri Chervonyi, Cosmin Paduraru, Jerry Luo

    Abstract: Reinforcement learning (RL) techniques have been developed to optimize industrial cooling systems, offering substantial energy savings compared to traditional heuristic policies. A major challenge in industrial control involves learning behaviors that are feasible in the real world due to machinery constraints. For example, certain actions can only be executed every few hours while other actions c… ▽ More

    Submitted 16 September, 2022; originally announced September 2022.

    Comments: 11 pages, 5 figures

  18. arXiv:2207.13131  [pdf, other

    cs.AI cs.LG cs.RO

    Semi-analytical Industrial Cooling System Model for Reinforcement Learning

    Authors: Yuri Chervonyi, Praneet Dutta, Piotr Trochim, Octavian Voicu, Cosmin Paduraru, Crystal Qian, Emre Karagozler, Jared Quincy Davis, Richard Chippendale, Gautam Bajaj, Sims Witherspoon, Jerry Luo

    Abstract: We present a hybrid industrial cooling system model that embeds analytical solutions within a multi-physics simulation. This model is designed for reinforcement learning (RL) applications and balances simplicity with simulation fidelity and interpretability. The model's fidelity is evaluated against real world data from a large scale cooling system. This is followed by a case study illustrating ho… ▽ More

    Submitted 26 July, 2022; originally announced July 2022.

    Comments: 27 pages, 13 figures

  19. arXiv:2207.10952  [pdf, other

    cs.CV cs.AI

    Vision-based Human Fall Detection Systems using Deep Learning: A Review

    Authors: Ekram Alam, Abu Sufian, Paramartha Dutta, Marco Leo

    Abstract: Human fall is one of the very critical health issues, especially for elders and disabled people living alone. The number of elder populations is increasing steadily worldwide. Therefore, human fall detection is becoming an effective technique for assistive living for those people. For assistive living, deep learning and computer vision have been used largely. In this review article, we discuss dee… ▽ More

    Submitted 22 July, 2022; originally announced July 2022.

  20. arXiv:2207.07697  [pdf, other

    cs.LG cs.CV cs.DC stat.ML

    POET: Training Neural Networks on Tiny Devices with Integrated Rematerialization and Paging

    Authors: Shishir G. Patil, Paras Jain, Prabal Dutta, Ion Stoica, Joseph E. Gonzalez

    Abstract: Fine-tuning models on edge devices like mobile phones would enable privacy-preserving personalization over sensitive data. However, edge training has historically been limited to relatively small models with simple architectures because training is both memory and energy intensive. We present POET, an algorithm to enable training large neural networks on memory-scarce battery-operated edge devices… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

    Comments: Proceedings of the 39th International Conference on Machine Learning 2022 (ICML 2022)

  21. Optimization of Temperature and Relative Humidity in an Automatic Egg Incubator Using Mamdani Interference System

    Authors: Pramit Dutta, Nafisa Anjum

    Abstract: Temperature and humidity are two of the rudimentary factors that must be controlled during egg incubation. Improper temperature and humidity levels during the incubation period often result in unwanted conditions. This paper proposes the design of an efficient Mamdani fuzzy interference system instead of the widely used Takagi-Sugeno system in this field for controlling the temperature and humidit… ▽ More

    Submitted 17 June, 2022; originally announced July 2022.

    Comments: 5 pages, 13 figures, 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), DHAKA, Bangladesh

    Journal ref: 2021 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), DHAKA, Bangladesh, 2021, pp. 12-16

  22. Identifying Counterfeit Products using Blockchain Technology in Supply Chain System

    Authors: Nafisa Anjum, Pramit Dutta

    Abstract: With the advent of globalization and the evergrowing rate of technology, the volume of production as well as ease of procuring counterfeit goods has become unprecedented. Be it food, drug or luxury items, all kinds of industrial manufacturers and distributors are now seeking greater transparency in supply chain operations with a view to deter counterfeiting. This paper introduces a decentralized B… ▽ More

    Submitted 17 June, 2022; originally announced June 2022.

    Comments: 5 pages, 4 figures, 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)

    Journal ref: 16th International Conference on Ubiquitous Information Management and Communication (IMCOM), 2022, pp. 1-5

  23. COVID-19 Detection using Transfer Learning with Convolutional Neural Network

    Authors: Pramit Dutta, Tanny Roy, Nafisa Anjum

    Abstract: The Novel Coronavirus disease 2019 (COVID-19) is a fatal infectious disease, first recognized in December 2019 in Wuhan, Hubei, China, and has gone on an epidemic situation. Under these circumstances, it became more important to detect COVID-19 in infected people. Nowadays, the testing kits are gradually lessening in number compared to the number of infected population. Under recent prevailing con… ▽ More

    Submitted 17 June, 2022; originally announced June 2022.

    Comments: 4 pages, 4 figures, 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), DHAKA, Bangladesh

    Journal ref: 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), DHAKA, Bangladesh, 2021, pp. 429-432

  24. arXiv:2206.08543  [pdf

    eess.IV cs.CV

    Multi-Classification of Brain Tumor Images Using Transfer Learning Based Deep Neural Network

    Authors: Pramit Dutta, Khaleda Akhter Sathi, Md. Saiful Islam

    Abstract: In recent advancement towards computer based diagnostics system, the classification of brain tumor images is a challenging task. This paper mainly focuses on elevating the classification accuracy of brain tumor images with transfer learning based deep neural network. The classification approach is started with the image augmentation operation including rotation, zoom, hori-zontal flip, width shift… ▽ More

    Submitted 17 June, 2022; originally announced June 2022.

    Comments: 7 pages, 4 figures, 2 tables, International Virtual Conference on ARTIFICIAL INTELLIGENCE FOR SMART COMMUNITY, Malaysia

    Journal ref: Conference proceedings \c{opyright} 2023 International Conference on Artificial Intelligence for Smart Community

  25. arXiv:2205.15667  [pdf, other

    cs.CV

    ViT-BEVSeg: A Hierarchical Transformer Network for Monocular Birds-Eye-View Segmentation

    Authors: Pramit Dutta, Ganesh Sistu, Senthil Yogamani, Edgar Galván, John McDonald

    Abstract: Generating a detailed near-field perceptual model of the environment is an important and challenging problem in both self-driving vehicles and autonomous mobile robotics. A Bird Eye View (BEV) map, providing a panoptic representation, is a commonly used approach that provides a simplified 2D representation of the vehicle surroundings with accurate semantic level segmentation for many downstream ta… ▽ More

    Submitted 31 May, 2022; originally announced May 2022.

    Comments: Accepted for 2022 IEEE World Congress on Computational Intelligence (Track: IJCNN)

  26. arXiv:2205.12494  [pdf, other

    cs.ET

    A Multi-domain Magneto Tunnel Junction for Racetrack Nanowire Strips

    Authors: Prayash Dutta, Albert Lee, Kang L. Wang, Alex K. Jones, Sanjukta Bhanja

    Abstract: Domain-wall memory (DWM) has SRAM class access performance, low energy, high endurance, high density, and CMOS compatibility. Recently, shift reliability and processing-using-memory (PuM) proposals developed a need to count the number of parallel or anti-parallel domains in a portion of the DWM nanowire. In this paper we propose a multi-domain magneto-tunnel junction (MTJ) that can detect differen… ▽ More

    Submitted 25 May, 2022; originally announced May 2022.

    Comments: This paper is under review for possible publication by the IEEE

  27. arXiv:2204.06389  [pdf, other

    cs.CL cs.AI cs.CY cs.HC cs.SI

    CRUSH: Contextually Regularized and User anchored Self-supervised Hate speech Detection

    Authors: Souvic Chakraborty, Parag Dutta, Sumegh Roychowdhury, Animesh Mukherjee

    Abstract: The last decade has witnessed a surge in the interaction of people through social networking platforms. While there are several positive aspects of these social platforms, the proliferation has led them to become the breeding ground for cyber-bullying and hate speech. Recent advances in NLP have often been used to mitigate the spread of such hateful content. Since the task of hate speech detection… ▽ More

    Submitted 4 May, 2022; v1 submitted 13 April, 2022; originally announced April 2022.

    Comments: Accepted in NAACL HLT 2022 (Long Paper)

    ACM Class: I.2.7; J.4

  28. arXiv:2112.11020  [pdf, ps, other

    cs.DS

    Efficient reductions and algorithms for variants of Subset Sum

    Authors: Pranjal Dutta, Mahesh Sreekumar Rajasree

    Abstract: Given $(a_1, \dots, a_n, t) \in \mathbb{Z}_{\geq 0}^{n + 1}$, the Subset Sum problem ($\mathsf{SSUM}$) is to decide whether there exists $S \subseteq [n]$ such that $\sum_{i \in S} a_i = t$. There is a close variant of the $\mathsf{SSUM}$, called $\mathsf{Subset~Product}$. Given positive integers $a_1, ..., a_n$ and a target integer $t$, the $\mathsf{Subset~Product}$ problem asks to determine whet… ▽ More

    Submitted 1 June, 2022; v1 submitted 21 December, 2021; originally announced December 2021.

    Comments: A part of this work has been published in the proceedings of CALDAM 2022. We have improved running-time of some algorithms from the previous version of the draft

    MSC Class: 68W20; 68W30; 68W40 ACM Class: F.2.1; F.2.2

  29. arXiv:2111.04020  [pdf, other

    cs.NE

    Biologically Inspired Oscillating Activation Functions Can Bridge the Performance Gap between Biological and Artificial Neurons

    Authors: Matthew Mithra Noel, Shubham Bharadwaj, Venkataraman Muthiah-Nakarajan, Praneet Dutta, Geraldine Bessie Amali

    Abstract: The recent discovery of special human neocortical pyramidal neurons that can individually learn the XOR function highlights the significant performance gap between biological and artificial neurons. The output of these pyramidal neurons first increases to a maximum with input and then decreases. Artificial neurons with similar characteristics can be designed with oscillating activation functions.… ▽ More

    Submitted 10 May, 2023; v1 submitted 7 November, 2021; originally announced November 2021.

    Comments: 29 pages, 9 figures

  30. arXiv:2108.12943  [pdf, other

    cs.LG cs.CV cs.NE

    Growing Cosine Unit: A Novel Oscillatory Activation Function That Can Speedup Training and Reduce Parameters in Convolutional Neural Networks

    Authors: Mathew Mithra Noel, Arunkumar L, Advait Trivedi, Praneet Dutta

    Abstract: Convolutional neural networks have been successful in solving many socially important and economically significant problems. This ability to learn complex high-dimensional functions hierarchically can be attributed to the use of nonlinear activation functions. A key discovery that made training deep networks feasible was the adoption of the Rectified Linear Unit (ReLU) activation function to allev… ▽ More

    Submitted 12 January, 2023; v1 submitted 29 August, 2021; originally announced August 2021.

    Comments: 20 Pages

    ACM Class: I.5

  31. arXiv:2108.01202  [pdf, other

    cs.ET

    PIRM: Processing In Racetrack Memories

    Authors: Sebastien Ollivier, Stephen Longofono, Prayash Dutta, Jingtong Hu, Sanjukta Bhanja, Alex K. Jones

    Abstract: The growth in data needs of modern applications has created significant challenges for modern systems leading a "memory wall." Spintronic Domain Wall Memory (DWM), related to Spin-Transfer Torque Memory (STT-MRAM), provides near-SRAM read/write performance, energy savings and nonvolatility, potential for extremely high storage density, and does not have significant endurance limitations. However,… ▽ More

    Submitted 1 August, 2022; v1 submitted 2 August, 2021; originally announced August 2021.

    Comments: This paper is accepted to the IEEE/ACM Symposium on Microarchitecture, October 2022 under the title "CORUSCANT: Fast Efficient Processing-in-Racetrack Memories"

  32. arXiv:2107.00596  [pdf, other

    cs.CL

    Multimodal Graph-based Transformer Framework for Biomedical Relation Extraction

    Authors: Sriram Pingali, Shweta Yadav, Pratik Dutta, Sriparna Saha

    Abstract: The recent advancement of pre-trained Transformer models has propelled the development of effective text mining models across various biomedical tasks. However, these models are primarily learned on the textual data and often lack the domain knowledge of the entities to capture the context beyond the sentence. In this study, we introduced a novel framework that enables the model to learn multi-omn… ▽ More

    Submitted 1 July, 2021; originally announced July 2021.

    Comments: To appear in Findings of ACL 2021

  33. arXiv:2103.06490   

    cs.CL cs.AI cs.HC cs.LG cs.NE

    Active$^2$ Learning: Actively reducing redundancies in Active Learning methods for Sequence Tagging and Machine Translation

    Authors: Rishi Hazra, Parag Dutta, Shubham Gupta, Mohammed Abdul Qaathir, Ambedkar Dukkipati

    Abstract: While deep learning is a powerful tool for natural language processing (NLP) problems, successful solutions to these problems rely heavily on large amounts of annotated samples. However, manually annotating data is expensive and time-consuming. Active Learning (AL) strategies reduce the need for huge volumes of labeled data by iteratively selecting a small number of examples for manual annotation… ▽ More

    Submitted 3 April, 2021; v1 submitted 11 March, 2021; originally announced March 2021.

    Comments: Two of the authors had published similar manuscripts on arXiv. So withdrawing this one. All further updations will be reflected at arXiv:1911.00234

  34. arXiv:2102.11690  [pdf, ps, other

    cs.CE

    Inferring temporal dynamics from cross-sectional data using Langevin dynamics

    Authors: Pritha Dutta, Rick Quax, Loes Crielaard, Peter M. A. Sloot

    Abstract: Cross-sectional studies are widely prevalent since they are more feasible to conduct compared to longitudinal studies. However, cross-sectional data lack the temporal information required to study the evolution of the underlying processes. Nevertheless, this is essential to develop predictive computational models which is the first step towards causal modelling. We propose a method for inferring c… ▽ More

    Submitted 23 February, 2021; originally announced February 2021.

    Comments: 17 pages, 3 figures, "The code for the proposed method is written in Mathematica programming language and is available at https://github.com/Pritha17/langevin-crosssectional"

  35. arXiv:2011.09192  [pdf, other

    cs.AI cs.GT cs.MA

    Game Plan: What AI can do for Football, and What Football can do for AI

    Authors: Karl Tuyls, Shayegan Omidshafiei, Paul Muller, Zhe Wang, Jerome Connor, Daniel Hennes, Ian Graham, William Spearman, Tim Waskett, Dafydd Steele, Pauline Luc, Adria Recasens, Alexandre Galashov, Gregory Thornton, Romuald Elie, Pablo Sprechmann, Pol Moreno, Kris Cao, Marta Garnelo, Praneet Dutta, Michal Valko, Nicolas Heess, Alex Bridgland, Julien Perolat, Bart De Vylder , et al. (11 additional authors not shown)

    Abstract: The rapid progress in artificial intelligence (AI) and machine learning has opened unprecedented analytics possibilities in various team and individual sports, including baseball, basketball, and tennis. More recently, AI techniques have been applied to football, due to a huge increase in data collection by professional teams, increased computational power, and advances in machine learning, with t… ▽ More

    Submitted 18 November, 2020; originally announced November 2020.

  36. arXiv:2011.08456  [pdf, ps, other

    cs.CR

    Collusion-Resistant Identity-based Proxy Re-Encryption: Lattice-based Constructions in Standard Model

    Authors: Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Partha Sarathi Roy

    Abstract: The concept of proxy re-encryption (PRE) dates back to the work of Blaze, Bleumer, and Strauss in 1998. PRE offers delegation of decryption rights, i.e., it securely enables the re-encryption of ciphertexts from one key to another, without relying on trusted parties. PRE allows a semi-trusted third party termed as a ``proxy" to securely divert encrypted files of user A (delegator) to user B (deleg… ▽ More

    Submitted 16 November, 2020; originally announced November 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2005.06741

  37. arXiv:2005.13164  [pdf, other

    cs.CR cs.CY

    CoVista: A Unified View on Privacy Sensitive Mobile Contact Tracing Effort

    Authors: David Culler, Prabal Dutta, Gabe Fierro, Joseph E. Gonzalez, Nathan Pemberton, Johann Schleier-Smith, K. Shankari, Alvin Wan, Thomas Zachariah

    Abstract: Governments around the world have become increasingly frustrated with tech giants dictating public health policy. The software created by Apple and Google enables individuals to track their own potential exposure through collated exposure notifications. However, the same software prohibits location tracking, denying key information needed by public health officials for robust contract tracing. Thi… ▽ More

    Submitted 27 May, 2020; originally announced May 2020.

  38. arXiv:2005.06741  [pdf, ps, other

    cs.CR

    Lattice-based Unidirectional IBPRE Secure in Standard Model

    Authors: Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Joonsang Baek, Partha Sarathi Roy

    Abstract: Proxy re-encryption (PRE) securely enables the re-encryption of ciphertexts from one key to another, without relying on trusted parties, i.e., it offers delegation of decryption rights. PRE allows a semi-trusted third party termed as a "proxy" to securely divert encrypted files of user A (delegator) to user B (delegatee) without revealing any information about the underlying files to the proxy. To… ▽ More

    Submitted 14 May, 2020; originally announced May 2020.

  39. Evolution of Image Segmentation using Deep Convolutional Neural Network: A Survey

    Authors: Farhana Sultana, Abu Sufian, Paramartha Dutta

    Abstract: From the autonomous car driving to medical diagnosis, the requirement of the task of image segmentation is everywhere. Segmentation of an image is one of the indispensable tasks in computer vision. This task is comparatively complicated than other vision tasks as it needs low-level spatial information. Basically, image segmentation can be of two types: semantic segmentation and instance segmentati… ▽ More

    Submitted 29 May, 2020; v1 submitted 13 January, 2020; originally announced January 2020.

    Comments: 38 pages, 29 figures, 8 tables

    Journal ref: journal = "Knowledge-Based Systems", volume = "201-202", pages = "106062", year = "2020"

  40. arXiv:1911.06932  [pdf, other

    eess.IV cs.CV cs.LG

    3D Conditional Generative Adversarial Networks to enable large-scale seismic image enhancement

    Authors: Praneet Dutta, Bruce Power, Adam Halpert, Carlos Ezequiel, Aravind Subramanian, Chanchal Chatterjee, Sindhu Hari, Kenton Prindle, Vishal Vaddina, Andrew Leach, Raj Domala, Laura Bandura, Massimo Mascaro

    Abstract: We propose GAN-based image enhancement models for frequency enhancement of 2D and 3D seismic images. Seismic imagery is used to understand and characterize the Earth's subsurface for energy exploration. Because these images often suffer from resolution limitations and noise contamination, our proposed method performs large-scale seismic volume frequency enhancement and denoising. The enhanced imag… ▽ More

    Submitted 15 November, 2019; originally announced November 2019.

    Comments: To be Presented at the NeurIPS 2019, Second Workshop on Machine Learning and the Physicial Sciences, Vancouver, Canada

  41. arXiv:1911.00234  [pdf, other

    cs.LG cs.IR stat.ML

    Active$^2$ Learning: Actively reducing redundancies in Active Learning methods for Sequence Tagging and Machine Translation

    Authors: Rishi Hazra, Parag Dutta, Shubham Gupta, Mohammed Abdul Qaathir, Ambedkar Dukkipati

    Abstract: While deep learning is a powerful tool for natural language processing (NLP) problems, successful solutions to these problems rely heavily on large amounts of annotated samples. However, manually annotating data is expensive and time-consuming. Active Learning (AL) strategies reduce the need for huge volumes of labeled data by iteratively selecting a small number of examples for manual annotation… ▽ More

    Submitted 6 April, 2021; v1 submitted 1 November, 2019; originally announced November 2019.

    Comments: Accepted in NAACL-HLT 2021

  42. arXiv:1910.11916  [pdf, other

    cs.NI

    Minus HELLO: HELLO Devoid Protocols for Energy Preservation in Mobile Ad Hoc Networks

    Authors: Anuradha Banerjee, Abu Sufian, Paramartha Dutta, M M Hafizur Rahman

    Abstract: In mobile ad-hoc networks, nodes have to transmit HELLO or Route Maintenance messages at regular intervals, and all nodes residing within its radio range, reply with an acknowledgment message informing their node identifier, current location, and radio-range. Regular transmitting these messages consume a significant amount of battery power in nodes, especially when the set of down-link neighbors d… ▽ More

    Submitted 8 September, 2020; v1 submitted 25 October, 2019; originally announced October 2019.

    Comments: 33 pages, 20 figures, pre-print of under review manuscript

  43. arXiv:1909.03212  [pdf, other

    cs.LG cs.AI stat.ML

    AutoML for Contextual Bandits

    Authors: Praneet Dutta, Joe Cheuk, Jonathan S Kim, Massimo Mascaro

    Abstract: Contextual Bandits is one of the widely popular techniques used in applications such as personalization, recommendation systems, mobile health, causal marketing etc . As a dynamic approach, it can be more efficient than standard A/B testing in minimizing regret. We propose an end to end automated meta-learning pipeline to approximate the optimal Q function for contextual bandits problems. We see t… ▽ More

    Submitted 1 February, 2022; v1 submitted 7 September, 2019; originally announced September 2019.

    Comments: Presented(peer-reviewed) at the REVEAL Workshop at the ACM RecSys Conference Copenhagen'19 [https://sites.google.com/view/reveal2019/proceedings]

  44. Fuzzy Route Switching For Energy Preservation (FEP) in Ad Hoc Networks

    Authors: A. Banerjee, P. Dutta, A. Sufian

    Abstract: Nodes in ad hoc networks have limited battery power. Hence they require an energy-efficient technique to improve average network performance. Maintaining energy-efficiency in ad hoc networks is really challenging because highest energy efficiency is achieved if all the nodes are always switched off and energy-efficiency will be minimum if all the nodes are fully operational i.e. always turned-on.… ▽ More

    Submitted 26 May, 2019; originally announced June 2019.

    Comments: 11 pages, 12 figures, 4 tables

    Journal ref: Indian Journal of Science and Technology, Vol 9(43), November 2016

  45. Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc Networks

    Authors: A. Sufian, A. Banerjee, P. Dutta

    Abstract: In ad hoc networks, the scheduling of route-request packets should be different from that of message packets, because during transmission of message packets the location of the destination is known whereas in route discovery this is not known in most of the cases. The router has to depend upon the last known location, if any, of the destination to determine the center and radius of the circle that… ▽ More

    Submitted 26 May, 2019; originally announced June 2019.

    Comments: 6 pages, 4 figures

    Journal ref: Indian Journal of Science and Technology, Vol 9(43), November 2016

  46. arXiv:1905.11644  [pdf

    cs.NI

    Cheat-Proof Communication through Cluster Head (C3H) in Mobile Ad Hoc Network

    Authors: A. Sufian, A. Banerjee, P. Dutta

    Abstract: The mobile ad hoc network (MANET) is a wireless network based on a group of mobile nodes without any centralised infrastructure. In civilian data communication, all nodes cannot be homogeneous-type and not do a specific data communication. Therefore, node co-operation and cheat-proof are essential characteristics for successfully running MANETs in civilian data communication. Denial of service and… ▽ More

    Submitted 28 May, 2019; originally announced May 2019.

    Comments: 14 pages, 8 figures, 1 table

    Journal ref: Pertanika J. Sci. & Technol. 26 (3): 1513 - 1526 (2018)

  47. arXiv:1905.11627  [pdf

    cs.NI

    Data Load Balancing In Mobile Ad Hoc Network Using Fuzzy Logic (DBMF)

    Authors: A. Sufian, F. Sultana, P. Dutta

    Abstract: Volume and movement of data rapidly increasing in every type of data communications and networking, and ad hoc networks are not spared from these challenges. Traditional Multipath routing protocols in Mobile Ad-hoc Networks (MANETs) did not focus on data load distribution and balancing as much as required. In this scheme, we have proposed data load distribution and balancing through multiple paths… ▽ More

    Submitted 28 May, 2019; originally announced May 2019.

    Comments: 8 pages, 3 Figures, National Conference on Recent Advances in Computer Science and IT (NCRACIT),BGSB University, Rajouri, J&K

    Journal ref: Proceeding of National Conference on Recent Advances in Computer Science and IT (NCRACIT), BGSB University, Rajouri, J&K, Published online: http://ijsrcseit.com/CSEIT411813, 2018

  48. Advancements in Image Classification using Convolutional Neural Network

    Authors: Farhana Sultana, A. Sufian, Paramartha Dutta

    Abstract: Convolutional Neural Network (CNN) is the state-of-the-art for image classification task. Here we have briefly discussed different components of CNN. In this paper, We have explained different CNN architectures for image classification. Through this paper, we have shown advancements in CNN from LeNet-5 to latest SENet model. We have discussed the model description and training details of each mode… ▽ More

    Submitted 8 May, 2019; originally announced May 2019.

    Comments: 9 pages, 15 figures, 3 Tables. Submitted to 2018 Fourth International Conference on Research in Computational Intelligence and Communication Networks(ICRCICN 2018)

    Journal ref: 2018 Fourth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)

  49. A Review of Object Detection Models based on Convolutional Neural Network

    Authors: F. Sultana, A. Sufian, P. Dutta

    Abstract: Convolutional Neural Network (CNN) has become the state-of-the-art for object detection in image task. In this chapter, we have explained different state-of-the-art CNN based object detection models. We have made this review with categorization those detection models according to two different approaches: two-stage approach and one-stage approach. Through this chapter, it has shown advancements in… ▽ More

    Submitted 1 October, 2019; v1 submitted 5 May, 2019; originally announced May 2019.

    Comments: 17 pages, 11 figures, 1 table

    Journal ref: Intelligent Computing: Image Processing Based Applications. Advances in Intelligent Systems and Computing, vol 1157, pages 1-16, 2020

  50. The Signpost Platform for City-Scale Sensing

    Authors: Joshua Adkins, Branden Ghena, Neal Jackson, Pat Pannuto, Samuel Rohrer, Bradford Campbell, Prabal Dutta

    Abstract: City-scale sensing holds the promise of enabling a deeper understanding of our urban environments. However, a city-scale deployment requires physical installation, power management, and communications---all challenging tasks standing between a good idea and a realized one. This indicates the need for a platform that enables easy deployment and experimentation for applications operating at city sca… ▽ More

    Submitted 21 February, 2018; originally announced February 2018.

    Comments: Published in the proceedings of the 17th ACM/IEEE Conference on Information Processing in Sensor Networks (IPSN'18)