Skip to main content

Showing 1–50 of 56 results for author: Kumar, J

  1. arXiv:2406.18571  [pdf, other

    cs.CV

    UltraCortex: Submillimeter Ultra-High Field 9.4 T1 Brain MR Image Collection and Manual Cortical Segmentations

    Authors: Lucas Mahler, Julius Steiglechner, Benjamin Bender, Tobias Lindig, Dana Ramadan, Jonas Bause, Florian Birk, Rahel Heule, Edyta Charyasz, Michael Erb, Vinod Jangir Kumar, Gisela E Hagberg, Pascal Martin, Gabriele Lohmann, Klaus Scheffler

    Abstract: The UltraCortex repository (https://www.ultracortex.org) houses magnetic resonance imaging data of the human brain obtained at an ultra-high field strength of 9.4 T. It contains 86 structural MR images with spatial resolutions ranging from 0.6 to 0.8 mm. Additionally, the repository includes segmentations of 12 brains into gray and white matter compartments. These segmentations have been independe… ▽ More

    Submitted 5 July, 2024; v1 submitted 3 June, 2024; originally announced June 2024.

  2. arXiv:2404.13099  [pdf, other

    cs.CL cs.AI

    Mathify: Evaluating Large Language Models on Mathematical Problem Solving Tasks

    Authors: Avinash Anand, Mohit Gupta, Kritarth Prasad, Navya Singla, Sanjana Sanjeev, Jatin Kumar, Adarsh Raj Shivam, Rajiv Ratn Shah

    Abstract: The rapid progress in the field of natural language processing (NLP) systems and the expansion of large language models (LLMs) have opened up numerous opportunities in the field of education and instructional methods. These advancements offer the potential for tailored learning experiences and immediate feedback, all delivered through accessible and cost-effective services. One notable application… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

    Comments: 10 pages, 3 figures, NeurIPS 2023 Workshop on Generative AI for Education (GAIED)

    Journal ref: NeurIPS 2023 Workshop on Generative AI for Education (GAIED)

  3. arXiv:2404.12926  [pdf, other

    cs.AI

    MM-PhyRLHF: Reinforcement Learning Framework for Multimodal Physics Question-Answering

    Authors: Avinash Anand, Janak Kapuriya, Chhavi Kirtani, Apoorv Singh, Jay Saraf, Naman Lal, Jatin Kumar, Adarsh Raj Shivam, Astha Verma, Rajiv Ratn Shah, Roger Zimmermann

    Abstract: Recent advancements in LLMs have shown their significant potential in tasks like text summarization and generation. Yet, they often encounter difficulty while solving complex physics problems that require arithmetic calculation and a good understanding of concepts. Moreover, many physics problems include images that contain important details required to understand the problem's context. We propose… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

  4. arXiv:2404.09091  [pdf, other

    cs.IR cs.AI cs.CL cs.LG

    Semantic In-Domain Product Identification for Search Queries

    Authors: Sanat Sharma, Jayant Kumar, Twisha Naik, Zhaoyu Lu, Arvind Srikantan, Tracy Holloway King

    Abstract: Accurate explicit and implicit product identification in search queries is critical for enhancing user experiences, especially at a company like Adobe which has over 50 products and covers queries across hundreds of tools. In this work, we present a novel approach to training a product classifier from user behavioral data. Our semantic model led to >25% relative improvement in CTR (click through r… ▽ More

    Submitted 29 May, 2024; v1 submitted 13 April, 2024; originally announced April 2024.

  5. arXiv:2404.08020  [pdf, other

    cs.AI cs.CL cs.DL cs.IR cs.LG

    Augmenting Knowledge Graph Hierarchies Using Neural Transformers

    Authors: Sanat Sharma, Mayank Poddar, Jayant Kumar, Kosta Blank, Tracy King

    Abstract: Knowledge graphs are useful tools to organize, recommend and sort data. Hierarchies in knowledge graphs provide significant benefit in improving understanding and compartmentalization of the data within a knowledge graph. This work leverages large language models to generate and augment hierarchies in an existing knowledge graph. For small (<100,000 node) domain-specific KGs, we find that a combin… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

    Comments: European Conference on Information Retrieval 2024

  6. arXiv:2403.17199  [pdf, other

    cs.CL

    Extracting Social Support and Social Isolation Information from Clinical Psychiatry Notes: Comparing a Rule-based NLP System and a Large Language Model

    Authors: Braja Gopal Patra, Lauren A. Lepow, Praneet Kasi Reddy Jagadeesh Kumar, Veer Vekaria, Mohit Manoj Sharma, Prakash Adekkanattu, Brian Fennessy, Gavin Hynes, Isotta Landi, Jorge A. Sanchez-Ruiz, Euijung Ryu, Joanna M. Biernacka, Girish N. Nadkarni, Ardesheer Talati, Myrna Weissman, Mark Olfson, J. John Mann, Alexander W. Charney, Jyotishman Pathak

    Abstract: Background: Social support (SS) and social isolation (SI) are social determinants of health (SDOH) associated with psychiatric outcomes. In electronic health records (EHRs), individual-level SS/SI is typically documented as narrative clinical notes rather than structured coded data. Natural language processing (NLP) algorithms can automate the otherwise labor-intensive process of data extraction.… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    Comments: 2 figures, 3 tables

  7. arXiv:2403.11778  [pdf, other

    cs.SD cs.CR cs.LG eess.AS

    Towards the Development of a Real-Time Deepfake Audio Detection System in Communication Platforms

    Authors: Jonat John Mathew, Rakin Ahsan, Sae Furukawa, Jagdish Gautham Krishna Kumar, Huzaifa Pallan, Agamjeet Singh Padda, Sara Adamski, Madhu Reddiboina, Arjun Pankajakshan

    Abstract: Deepfake audio poses a rising threat in communication platforms, necessitating real-time detection for audio stream integrity. Unlike traditional non-real-time approaches, this study assesses the viability of employing static deepfake audio detection models in real-time communication platforms. An executable software is developed for cross-platform compatibility, enabling real-time execution. Two… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

  8. arXiv:2401.06413  [pdf

    cs.HC

    Why Doesn't Microsoft Let Me Sleep? How Automaticity of Windows Updates Impacts User Autonomy

    Authors: Sanju Ahuja, Ridhi Jain, Jyoti Kumar

    Abstract: 'Automating the user away' has been designated as a dark pattern in literature for performing tasks without user consent or confirmation. However, limited studies have been reported on how users experience the sense of autonomy when digital systems fully or partially bypass consent. More research is required to understand what makes automaticity a threat to autonomy. To address this gap, a qualita… ▽ More

    Submitted 12 January, 2024; originally announced January 2024.

    Comments: 6 pages, 2 figures

  9. A Neural Radiance Field-Based Architecture for Intelligent Multilayered View Synthesis

    Authors: D. Dhinakaran, S. M. Udhaya Sankar, G. Elumalai, N. Jagadish kumar

    Abstract: A mobile ad hoc network is made up of a number of wireless portable nodes that spontaneously come together en route for establish a transitory network with no need for any central management. A mobile ad hoc network (MANET) is made up of a sizable and reasonably dense community of mobile nodes that travel across any terrain and rely solely on wireless interfaces for communication, not on any well… ▽ More

    Submitted 3 November, 2023; originally announced November 2023.

  10. arXiv:2311.01574  [pdf

    eess.IV cs.CV cs.LG

    Improving Lesion Segmentation in FDG-18 Whole-Body PET/CT scans using Multilabel approach: AutoPET II challenge

    Authors: Gowtham Krishnan Murugesan, Diana McCrumb, Eric Brunner, Jithendra Kumar, Rahul Soni, Vasily Grigorash, Stephen Moore, Jeff Van Oss

    Abstract: Automatic segmentation of lesions in FDG-18 Whole Body (WB) PET/CT scans using deep learning models is instrumental for determining treatment response, optimizing dosimetry, and advancing theranostic applications in oncology. However, the presence of organs with elevated radiotracer uptake, such as the liver, spleen, brain, and bladder, often leads to challenges, as these regions are often misiden… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

    Comments: AutoPET II challenge paper

  11. arXiv:2310.18948  [pdf, other

    cs.LG cs.AI cs.DM math.PR

    Probabilistic Feature Augmentation for AIS-Based Multi-Path Long-Term Vessel Trajectory Forecasting

    Authors: Gabriel Spadon, Jay Kumar, Derek Eden, Josh van Berkel, Tom Foster, Amilcar Soares, Ronan Fablet, Stan Matwin, Ronald Pelot

    Abstract: Maritime transportation is paramount in achieving global economic growth, entailing concurrent ecological obligations in sustainability and safeguarding endangered marine species, most notably preserving large whale populations. In this regard, the Automatic Identification System (AIS) data plays a significant role by offering real-time streaming data on vessel movement, allowing enhanced traffic… ▽ More

    Submitted 2 May, 2024; v1 submitted 29 October, 2023; originally announced October 2023.

  12. arXiv:2308.12312  [pdf, other

    physics.comp-ph cs.AI physics.plasm-ph

    Physics informed Neural Networks applied to the description of wave-particle resonance in kinetic simulations of fusion plasmas

    Authors: Jai Kumar, David Zarzoso, Virginie Grandgirard, Jan Ebert, Stefan Kesselheim

    Abstract: The Vlasov-Poisson system is employed in its reduced form version (1D1V) as a test bed for the applicability of Physics Informed Neural Network (PINN) to the wave-particle resonance. Two examples are explored: the Landau damping and the bump-on-tail instability. PINN is first tested as a compression method for the solution of the Vlasov-Poisson system and compared to the standard neural networks.… ▽ More

    Submitted 23 August, 2023; originally announced August 2023.

  13. arXiv:2306.08188  [pdf, other

    cs.HC cs.IR cs.LG

    Contextual Font Recommendations based on User Intent

    Authors: Sanat Sharma, Jayant Kumar, Jing Zheng, Tracy Holloway King

    Abstract: Adobe Fonts has a rich library of over 20,000 unique fonts that Adobe users utilize for creating graphics, posters, composites etc. Due to the nature of the large library, knowing what font to select can be a daunting task that requires a lot of experience. For most users in Adobe products, especially casual users of Adobe Express, this often means choosing the default font instead of utilizing th… ▽ More

    Submitted 13 June, 2023; originally announced June 2023.

    Comments: In Proceedings of ACM SIGIR Workshop on eCommerce (SIGIR eCom'23)

    Journal ref: SIGIR Workshop on eCommerce,2023

  14. arXiv:2303.15803  [pdf, other

    cs.RO

    Vision based UAV Navigation through Narrow Passages

    Authors: Jayakant Kumar, Himanshu, Harikumar Kandath, Pooja Agrawal

    Abstract: This research paper presents a novel approach for navigating a micro UAV (Unmanned Aerial Vehicle) through narrow passages using only its onboard camera feed and a PID control system. The proposed method uses edge detection and homography techniques to extract the key features of the passage from the camera feed and then employs a tuned PID controller to guide the UAV through and out of the passag… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Comments: Currently under review in IEEE CASE 2023

  15. An AI-driven intelligent traffic management model for 6G cloud radio access networks

    Authors: Smruti Rekha Swain, Deepika Saxena, Jatinder Kumar, Ashutosh Kumar Singh, Chung-Nan Lee

    Abstract: This letter proposes a novel Cloud Radio Access Network (C-RAN) traffic analysis and management model that estimates probable RAN traffic congestion and mitigate its effect by adopting a suitable handling mechanism. A computation approach is introduced to classify heterogeneous RAN traffic into distinct traffic states based on bandwidth consumption and execution time of various job requests. Furth… ▽ More

    Submitted 25 March, 2023; originally announced March 2023.

    Journal ref: IEEE Wireless Communications Letters 2023

  16. Performance Analysis of Machine Learning Centered Workload Prediction Models for Cloud

    Authors: Deepika Saxena, Jitendra Kumar, Ashutosh Kumar Singh, Stefan Schmid

    Abstract: The precise estimation of resource usage is a complex and challenging issue due to the high variability and dimensionality of heterogeneous service types and dynamic workloads. Over the last few years, the prediction of resource usage and traffic has received ample attention from the research community. Many machine learning-based workload forecasting models have been developed by exploiting their… ▽ More

    Submitted 5 February, 2023; originally announced February 2023.

  17. arXiv:2212.00321  [pdf, other

    cs.CR

    Security and Privacy-Preservation of IoT Data in Cloud-Fog Computing Environment

    Authors: Jatinder Kumar, Ashutosh Kumar Singh

    Abstract: IoT is the fastest-growing technology with a wide range of applications in various domains. IoT devices generate data from a real-world environment every second and transfer it to the cloud due to the less storage at the edge site. An outsourced cloud is a solution for handling the storage problem. Users' privacy can be exposed by storing the data on the cloud. Therefore, we propose a Private Data… ▽ More

    Submitted 1 December, 2022; originally announced December 2022.

  18. A Quantum Approach Towards the Adaptive Prediction of Cloud Workloads

    Authors: Ashutosh Kumar Singh, Deepika Saxena, Jitendra Kumar, Vrinda Gupta

    Abstract: This work presents a novel Evolutionary Quantum Neural Network (EQNN) based workload prediction model for Cloud datacenter. It exploits the computational efficiency of quantum computing by encoding workload information into qubits and propagating this information through the network to estimate the workload or resource demands with enhanced accuracy proactively. The rotation and reverse rotation e… ▽ More

    Submitted 26 November, 2022; originally announced November 2022.

    Journal ref: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021

  19. arXiv:2208.06916  [pdf, other

    cs.PL

    Synthesis of Semantic Actions in Attribute Grammars

    Authors: Pankaj Kumar Kalita, Miriyala Jeevan Kumar, Subhajit Roy

    Abstract: Attribute grammars allow the association of semantic actions to the production rules in context-free grammars, providing a simple yet effective formalism to define the semantics of a language. However, drafting the semantic actions can be tricky and a large drain on developer time. In this work, we propose a synthesis methodology to automatically infer the semantic actions from a set of examples a… ▽ More

    Submitted 14 August, 2022; originally announced August 2022.

    Comments: 12 pages, 11 Figures, 2 tables, 48 References

  20. arXiv:2205.00347  [pdf, other

    cs.CV cs.AI

    LayoutBERT: Masked Language Layout Model for Object Insertion

    Authors: Kerem Turgutlu, Sanat Sharma, Jayant Kumar

    Abstract: Image compositing is one of the most fundamental steps in creative workflows. It involves taking objects/parts of several images to create a new image, called a composite. Currently, this process is done manually by creating accurate masks of objects to be inserted and carefully blending them with the target scene or images, usually with the help of tools such as Photoshop or GIMP. While there hav… ▽ More

    Submitted 30 April, 2022; originally announced May 2022.

    Comments: 8 pages main paper, 6 pages supplemental material. Accepted to AI4CC Workshop @CVPR 2022

  21. arXiv:2204.01487  [pdf

    cs.CY cs.CR

    Identifying Security Risks in NFT Platforms

    Authors: Yash Gupta, Jayanth Kumar, Dr. Andrew Reifers

    Abstract: This paper examines the effects of inherent risks in the emerging technology of non-fungible tokens and proposes an actionable set of solutions for stakeholders in this ecosystem and observers. Web3 and NFTs are a fast-growing 300 billion dollar economy with some clear, highly publicized harms that came to light recently. We set out to explore the risks to understand their nature and scope, and if… ▽ More

    Submitted 5 April, 2022; v1 submitted 18 March, 2022; originally announced April 2022.

  22. arXiv:2201.12805  [pdf, other

    cs.CV eess.IV

    Automatic Segmentation of Left Ventricle in Cardiac Magnetic Resonance Images

    Authors: Garvit Chhabra, J. H. Gagan, J. R. Harish Kumar

    Abstract: Segmentation of the left ventricle in cardiac magnetic resonance imaging MRI scans enables cardiologists to calculate the volume of the left ventricle and subsequently its ejection fraction. The ejection fraction is a measurement that expresses the percentage of blood leaving the heart with each contraction. Cardiologists often use ejection fraction to determine one's cardiac function. We propose… ▽ More

    Submitted 30 January, 2022; originally announced January 2022.

  23. arXiv:2111.15438  [pdf, other

    cs.CV eess.IV

    FMD-cGAN: Fast Motion Deblurring using Conditional Generative Adversarial Networks

    Authors: Jatin Kumar, Indra Deep Mastan, Shanmuganathan Raman

    Abstract: In this paper, we present a Fast Motion Deblurring-Conditional Generative Adversarial Network (FMD-cGAN) that helps in blind motion deblurring of a single image. FMD-cGAN delivers impressive structural similarity and visual appearance after deblurring an image. Like other deep neural network architectures, GANs also suffer from large model size (parameters) and computations. It is not easy to depl… ▽ More

    Submitted 9 December, 2021; v1 submitted 30 November, 2021; originally announced November 2021.

    Comments: International Conference on Computer Vision and Image Processing 2021

    ACM Class: I.4.3; I.4.4

  24. arXiv:2111.09227  [pdf, other

    cs.CR

    A Discussion and Comparative Study on Security and Privacy of Smart Meter Data

    Authors: Jatinder Kumar, Ashutosh Kumar Singh

    Abstract: Cloud computing comes with a lot of advanced features along with privacy and security problem. Smart meter data takes the benefit of cloud computing in the smart grid. User's privacy can be compromised by analyzing the smart meter data generated by household electrical appliances. The user loses control over the data while data is shifted to the cloud. This paper describes the issues under the pri… ▽ More

    Submitted 17 November, 2021; originally announced November 2021.

  25. arXiv:2110.13650  [pdf, other

    cs.CR

    GANash -- A GAN approach to steganography

    Authors: Venkatesh Subramaniyan, Vignesh Sivakumar, A. K. Vagheesan, S. Sakthivelan, K. J. Jegadish Kumar, K. K. Nagarajan

    Abstract: Data security is of the utmost concern of a communication system. Since the early days, many developments have been made to improve the performance of the system. PSNR of the received signal, secure transmission channel, quality of encoding used, etc. are some of the key attributes of a good system. To ensure security, the most commonly used technique is cryptography in which the message is altere… ▽ More

    Submitted 25 October, 2021; originally announced October 2021.

    Comments: Presented at the 6 th National Conference on Information and Communication Technologies (NCICT 2020), June 12, 2020

  26. arXiv:2109.01491  [pdf, ps, other

    math.NA cs.CE

    A mixed method for 3D nonlinear elasticity using finite element exterior calculus

    Authors: Bensingh Dhas, Jamun Kumar, Debasish Roy, J N Reddy

    Abstract: This article discusses a mixed FE technique for 3D nonlinear elasticity using a Hu-Washizu (HW) type variational principle. Here, the deformed configuration and sections from its cotangent bundle are taken as additional input arguments. The critical points of the HW functional enforce compatibility of these sections with the configuration, in addition to mechanical equilibrium and constitutive rel… ▽ More

    Submitted 31 August, 2021; originally announced September 2021.

  27. arXiv:2108.10125  [pdf, other

    cs.AI

    A study on Machine Learning Approaches for Player Performance and Match Results Prediction

    Authors: Harsh Mittal, Deepak Rikhari, Jitendra Kumar, Ashutosh Kumar Singh

    Abstract: Cricket is unarguably one of the most popular sports in the world. Predicting the outcome of a cricket match has become a fundamental problem as we are advancing in the field of machine learning. Multiple researchers have tried to predict the outcome of a cricket match or a tournament, or to predict the performance of players during a match, or to predict the players who should be selected as per… ▽ More

    Submitted 23 August, 2021; originally announced August 2021.

  28. arXiv:2108.10005  [pdf, other

    cs.AI

    Credit Card Fraud Detection using Machine Learning: A Study

    Authors: Pooja Tiwari, Simran Mehta, Nishtha Sakhuja, Jitendra Kumar, Ashutosh Kumar Singh

    Abstract: As the world is rapidly moving towards digitization and money transactions are becoming cashless, the use of credit cards has rapidly increased. The fraud activities associated with it have also been increasing which leads to a huge loss to the financial institutions. Therefore, we need to analyze and detect the fraudulent transaction from the non-fraudulent ones. In this paper, we present a compr… ▽ More

    Submitted 23 August, 2021; originally announced August 2021.

  29. arXiv:2108.06670  [pdf, other

    cs.LG cs.AI

    Deep Geospatial Interpolation Networks

    Authors: Sumit Kumar Varshney, Jeetu Kumar, Aditya Tiwari, Rishabh Singh, Venkata M. V. Gunturi, Narayanan C. Krishnan

    Abstract: Interpolation in Spatio-temporal data has applications in various domains such as climate, transportation, and mining. Spatio-Temporal interpolation is highly challenging due to the complex spatial and temporal relationships. However, traditional techniques such as Kriging suffer from high running time and poor performance on data that exhibit high variance across space and time dimensions. To thi… ▽ More

    Submitted 15 August, 2021; originally announced August 2021.

  30. A Secure and Multi-objective Virtual Machine Placement Framework for Cloud Data Centre

    Authors: Deepika Saxena, Ishu Gupta, Jitendra Kumar, Ashutosh Kumar Singh, Xiaoqing Wen

    Abstract: To facilitate cost-effective and elastic computing benefits to the cloud users, the energy-efficient and secure allocation of virtual machines (VMs) plays a significant role at the data centre. The inefficient VM Placement (VMP) and sharing of common physical machines among multiple users leads to resource wastage, excessive power consumption, increased inter-communication cost and security breach… ▽ More

    Submitted 28 July, 2021; originally announced July 2021.

    Comments: This article has been accepted for inclusion in a future issue of IEEE Systems Journal (2021)

  31. arXiv:2104.10903  [pdf, other

    cs.CR cs.LG eess.IV

    Blockchain based Privacy-Preserved Federated Learning for Medical Images: A Case Study of COVID-19 CT Scans

    Authors: Rajesh Kumar, WenYong Wang, Cheng Yuan, Jay Kumar, Zakria, He Qing, Ting Yang, Abdullah Aman Khan

    Abstract: Medical health care centers are envisioned as a promising paradigm to handle the massive volume of data of COVID-19 patients using artificial intelligence (AI). Traditionally, AI techniques often require centralized data collection and training the model in a single organization, which is most common weakness due to the privacy and security of raw data communication. To solve this challenging task… ▽ More

    Submitted 31 May, 2021; v1 submitted 22 April, 2021; originally announced April 2021.

    Comments: 15 Pages, 5 Tables, 11 Figures, Journal Paper, Elsevier format

  32. arXiv:2104.00871  [pdf, other

    cs.LG cs.AI

    A Comparative Analysis of Machine Learning and Grey Models

    Authors: Gang He, Khwaja Mutahir Ahmad, Wenxin Yu, Xiaochuan Xu, Jay Kumar

    Abstract: Artificial Intelligence (AI) has recently shown its capabilities for almost every field of life. Machine Learning, which is a subset of AI, is a `HOT' topic for researchers. Machine Learning outperforms other classical forecasting techniques in almost all-natural applications. It is a crucial part of modern research. As per this statement, Modern Machine Learning algorithms are hungry for big data… ▽ More

    Submitted 4 December, 2021; v1 submitted 1 April, 2021; originally announced April 2021.

    Comments: 22 pages, 8 figures, journal paper

  33. arXiv:2102.13376  [pdf, other

    cs.CR cs.LG

    Collective Intelligence: Decentralized Learning for Android Malware Detection in IoT with Blockchain

    Authors: Rajesh Kumar, WenYong Wang, Jay Kumar, Zakria, Ting Yang, Waqar Ali

    Abstract: The widespread significance of Android IoT devices is due to its flexibility and hardware support features which revolutionized the digital world by introducing exciting applications almost in all walks of daily life, such as healthcare, smart cities, smart environments, safety, remote sensing, and many more. Such versatile applicability gives incentive for more malware attacks. In this paper, we… ▽ More

    Submitted 26 June, 2021; v1 submitted 26 February, 2021; originally announced February 2021.

  34. arXiv:2102.09744  [pdf

    cs.CV cs.AI cs.MM

    Trends in Vehicle Re-identification Past, Present, and Future: A Comprehensive Review

    Authors: Zakria, Jianhua Deng, Muhammad Saddam Khokhar, Muhammad Umar Aftab, Jingye Cai, Rajesh Kumar, Jay Kumar

    Abstract: Vehicle Re-identification (re-id) over surveillance camera network with non-overlapping field of view is an exciting and challenging task in intelligent transportation systems (ITS). Due to its versatile applicability in metropolitan cities, it gained significant attention. Vehicle re-id matches targeted vehicle over non-overlapping views in multiple camera network. However, it becomes more diffic… ▽ More

    Submitted 19 February, 2021; originally announced February 2021.

  35. arXiv:2012.15079  [pdf, other

    cs.CL cs.LG

    A Subword Guided Neural Word Segmentation Model for Sindhi

    Authors: Wazir Ali, Jay Kumar, Zenglin Xu, Congjian Luo, Junyu Lu, Junming Shao, Rajesh Kumar, Yazhou Ren

    Abstract: Deep neural networks employ multiple processing layers for learning text representations to alleviate the burden of manual feature engineering in Natural Language Processing (NLP). Such text representations are widely used to extract features from unlabeled data. The word segmentation is a fundamental and inevitable prerequisite for many languages. Sindhi is an under-resourced language, whose segm… ▽ More

    Submitted 30 December, 2020; originally announced December 2020.

    Comments: Journal Paper, 16 pages

  36. arXiv:2007.06537  [pdf, other

    eess.IV cs.CV cs.LG

    Blockchain-Federated-Learning and Deep Learning Models for COVID-19 detection using CT Imaging

    Authors: Rajesh Kumar, Abdullah Aman Khan, Sinmin Zhang, Jay Kumar, Ting Yang, Noorbakhash Amiri Golalirz, Zakria, Ikram Ali, Sidra Shafiq, WenYong Wang

    Abstract: With the increase of COVID-19 cases worldwide, an effective way is required to diagnose COVID-19 patients. The primary problem in diagnosing COVID-19 patients is the shortage and reliability of testing kits, due to the quick spread of the virus, medical practitioners are facing difficulty identifying the positive cases. The second real-world problem is to share the data among the hospitals globall… ▽ More

    Submitted 8 December, 2020; v1 submitted 10 July, 2020; originally announced July 2020.

    Comments: arXiv admin note: text overlap with arXiv:2003.10849 by other authors

  37. arXiv:2003.00807  [pdf, other

    cs.IR

    Fake Review Detection Using Behavioral and Contextual Features

    Authors: Jay Kumar

    Abstract: User reviews reflect significant value of product in the world of e-market. Many firms or product providers hire spammers for misleading new customers by posting spam reviews. There are three types of fake reviews, untruthful reviews, brand reviews and non-reviews. All three types mislead the new customers. A multinomial organization "Yelp" is separating fake reviews from non-fake reviews since la… ▽ More

    Submitted 26 February, 2020; originally announced March 2020.

  38. arXiv:2002.05538  [pdf, ps, other

    cs.DM cs.CC

    Algorithmic Complexity of Isolate Secure Domination in Graphs

    Authors: Jakkepalli Pavan Kumar, P. Venkata Subba Reddy

    Abstract: A dominating set $S$ is an Isolate Dominating Set (IDS) if the induced subgraph $G[S]$ has at least one isolated vertex. In this paper, we initiate the study of new domination parameter called, isolate secure domination. An isolate dominating set $S\subseteq V$ is an isolate secure dominating set (ISDS), if for each vertex $u \in V \setminus S$, there exists a neighboring vertex $v$ of $u$ in $S$… ▽ More

    Submitted 12 February, 2020; originally announced February 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2002.00002; text overlap with arXiv:2001.11250

    MSC Class: 05C69; 68Q25

  39. arXiv:2002.02408  [pdf, ps, other

    cs.DM cs.CC

    Algorithmic Aspects of 2-Secure Domination in Graphs

    Authors: J. Pavan Kumar, P. Venkata Subba Reddy

    Abstract: Let $G(V,E)$ be a simple, undirected and connected graph. A dominating set $S \subseteq V(G)$ is called a $2$-\textit{secure dominating set} ($2$-SDS) in $G$, if for every pair of distinct vertices $u_1,u_2 \in V(G)$ there exists a pair of distinct vertices $v_1,v_2 \in S$ such that $v_1 \in N[u_1]$, $v_2 \in N[u_2]$ and $(S \setminus \{v_1,v_2\}) \cup \{u_1,u_2 \}$ is a dominating set in $G$. The… ▽ More

    Submitted 5 February, 2020; originally announced February 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2001.11250, arXiv:2002.00002

    MSC Class: 05C69; 68Q25

  40. arXiv:2002.00713  [pdf, ps, other

    cs.DM cs.CC math.CO

    Algorithmic Complexity of Secure Connected Domination in Graphs

    Authors: Jakkepalli Pavan Kumar, P. Venkata Subba Reddy, S. Arumugam

    Abstract: Let $G = (V,E)$ be a simple, undirected and connected graph. A connected (total) dominating set $S \subseteq V$ is a secure connected (total) dominating set of $G$, if for each $ u \in V \setminus S$, there exists $v \in S$ such that $uv \in E$ and $(S \setminus \lbrace v \rbrace) \cup \lbrace u \rbrace $ is a connected (total) dominating set of $G$. The minimum cardinality of a secure connected (… ▽ More

    Submitted 3 February, 2020; originally announced February 2020.

    MSC Class: 05C69; 68Q25

  41. arXiv:2002.00002  [pdf, ps, other

    cs.DM cs.CC

    Algorithmic Aspects of Some Variants of Domination in Graphs

    Authors: Jakkepalli Pavan Kumar, P. Venkata Subba Reddy

    Abstract: A set $S \subseteq V$ is a dominating set in G if for every u \in V \ S, there exists $v \in S$ such that $(u,v) \in E$, i.e., $N[S] = V$. A dominating set $S$ is an Isolate Dominating Set} (IDS) if the induced subgraph $G[S]$ has at least one isolated vertex. It is known that Isolate Domination Decision problem (IDOM) is NP-complete for bipartite graphs. In this paper, we extend this by showing t… ▽ More

    Submitted 12 February, 2020; v1 submitted 30 January, 2020; originally announced February 2020.

    Comments: arXiv admin note: text overlap with arXiv:2001.11250

    MSC Class: 05C69; 68Q25

  42. Algorithmic Aspects of Secure Connected Domination in Graphs

    Authors: Jakkepalli Pavan Kumar, P. Venkata Subba Reddy

    Abstract: Let $G = (V,E)$ be a simple, undirected and connected graph. A connected dominating set $S \subseteq V$ is a secure connected dominating set of $G$, if for each $ u \in V\setminus S$, there exists $v\in S$ such that $(u,v) \in E$ and the set $(S \setminus \{ v \}) \cup \{ u \} $ is a connected dominating set of $G$. The minimum size of a secure connected dominating set of $G$ denoted by… ▽ More

    Submitted 30 January, 2020; originally announced January 2020.

    MSC Class: 05C69; 68Q25

  43. arXiv:1911.12579  [pdf, other

    cs.CL

    Word Embedding based New Corpus for Low-resourced Language: Sindhi

    Authors: Wazir Ali, Jay Kumar, Junyu Lu, Zenglin Xu

    Abstract: Representing words and phrases into dense vectors of real numbers which encode semantic and syntactic properties is a vital constituent in natural language processing (NLP). The success of neural network (NN) models in NLP largely rely on such dense word representations learned on the large unlabeled corpus. Sindhi is one of the rich morphological language, spoken by large population in Pakistan a… ▽ More

    Submitted 29 December, 2020; v1 submitted 28 November, 2019; originally announced November 2019.

    Comments: Body 21 pages, Tables 9, Figures 7

  44. arXiv:1908.08622  [pdf, other

    cs.SI cs.CY cs.IR

    Toward Maximizing the Visibility of Content in Social Media Brand Pages: A Temporal Analysis

    Authors: Nagendra Kumar, Gopi Ande, J. Shirish Kumar, Manish Singh

    Abstract: A large amount of content is generated everyday in social media. One of the main goals of content creators is to spread their information to a large audience. There are many factors that affect information spread, such as posting time, location, type of information, number of social connections, etc. In this paper, we look at the problem of finding the best posting time(s) to get high content visi… ▽ More

    Submitted 22 August, 2019; originally announced August 2019.

  45. arXiv:1906.08853  [pdf, other

    cs.NE

    Hardware-friendly Neural Network Architecture for Neuromorphic Computing

    Authors: Roshan Gopalakrishnan, Yansong Chua, Ashish Jith Sreejith Kumar

    Abstract: The hardware-software co-optimization of neural network architectures is becoming a major stream of research especially due to the emergence of commercial neuromorphic chips such as the IBM Truenorth and Intel Loihi. Development of specific neural network architectures in tandem with the design of the neuromorphic hardware considering the hardware constraints will make a huge impact in the complet… ▽ More

    Submitted 3 April, 2019; originally announced June 2019.

    Comments: 18 pages, 14 figures, 4 tables, submitted to Frontiers in Neuroscience

  46. arXiv:1901.00128  [pdf, other

    cs.NE cs.ET

    MaD: Mapping and debugging framework for implementing deep neural network onto a neuromorphic chip with crossbar array of synapses

    Authors: Roshan Gopalakrishnan, Ashish Jith Sreejith Kumar, Yansong Chua

    Abstract: Neuromorphic systems or dedicated hardware for neuromorphic computing is getting popular with the advancement in research on different device materials for synapses, especially in crossbar architecture and also algorithms specific or compatible to neuromorphic hardware. Hence, an automated mapping of any deep neural network onto the neuromorphic chip with crossbar array of synapses and an efficien… ▽ More

    Submitted 1 January, 2019; originally announced January 2019.

    Comments: 7 pages, 6 figures and 6 tables. Submitting to IJCNN 2019

  47. arXiv:1812.11212  [pdf

    cond-mat.soft cond-mat.mtrl-sci cs.LG physics.comp-ph stat.ML

    Machine learning enables polymer cloud-point engineering via inverse design

    Authors: Jatin N. Kumar, Qianxiao Li, Karen Y. T. Tang, Tonio Buonassisi, Anibal L. Gonzalez-Oyarce, Jun Ye

    Abstract: Inverse design is an outstanding challenge in disordered systems with multiple length scales such as polymers, particularly when designing polymers with desired phase behavior. We demonstrate high-accuracy tuning of poly(2-oxazoline) cloud point via machine learning. With a design space of four repeating units and a range of molecular masses, we achieve an accuracy of 4 °C root mean squared error… ▽ More

    Submitted 21 November, 2018; originally announced December 2018.

    Comments: 27 pages made up of main article and electronic supplementary information

  48. arXiv:1811.06231  [pdf, other

    cond-mat.mtrl-sci cs.LG

    Graph Convolutional Neural Networks for Polymers Property Prediction

    Authors: Minggang Zeng, Jatin Nitin Kumar, Zeng Zeng, Ramasamy Savitha, Vijay Ramaseshan Chandrasekhar, Kedar Hippalgaonkar

    Abstract: A fast and accurate predictive tool for polymer properties is demanding and will pave the way to iterative inverse design. In this work, we apply graph convolutional neural networks (GCNN) to predict the dielectric constant and energy bandgap of polymers. Using density functional theory (DFT) calculated properties as the ground truth, GCNN can achieve remarkable agreement with DFT results. Moreove… ▽ More

    Submitted 15 November, 2018; originally announced November 2018.

    Comments: Accepted for NIPS 2018 Workshop on Machine Learning for Molecules and Materials

  49. arXiv:1705.09222  [pdf, other

    cs.HC cs.CL

    Towards a Knowledge Graph based Speech Interface

    Authors: Ashwini Jaya Kumar, Sören Auer, Christoph Schmidt, Joachim köhler

    Abstract: Applications which use human speech as an input require a speech interface with high recognition accuracy. The words or phrases in the recognised text are annotated with a machine-understandable meaning and linked to knowledge graphs for further processing by the target application. These semantic annotations of recognised words can be represented as a subject-predicate-object triples which collec… ▽ More

    Submitted 23 May, 2017; originally announced May 2017.

    Comments: Under Review in International Workshop on Grounding Language Understanding, Satellite of Interspeech 2017

  50. arXiv:1705.08018  [pdf, other

    cs.CL

    Use of Knowledge Graph in Rescoring the N-Best List in Automatic Speech Recognition

    Authors: Ashwini Jaya Kumar, Camilo Morales, Maria-Esther Vidal, Christoph Schmidt, Sören Auer

    Abstract: With the evolution of neural network based methods, automatic speech recognition (ASR) field has been advanced to a level where building an application with speech interface is a reality. In spite of these advances, building a real-time speech recogniser faces several problems such as low recognition accuracy, domain constraint, and out-of-vocabulary words. The low recognition accuracy problem is… ▽ More

    Submitted 22 May, 2017; originally announced May 2017.