Skip to main content

Showing 1–13 of 13 results for author: Kumari, M

  1. arXiv:2407.07858  [pdf, other

    cs.LG cs.CL

    FACTS About Building Retrieval Augmented Generation-based Chatbots

    Authors: Rama Akkiraju, Anbang Xu, Deepak Bora, Tan Yu, Lu An, Vishal Seth, Aaditya Shukla, Pritam Gundecha, Hridhay Mehta, Ashwin Jha, Prithvi Raj, Abhinav Balasubramanian, Murali Maram, Guru Muthusamy, Shivakesh Reddy Annepally, Sidney Knowles, Min Du, Nick Burnett, Sean Javiya, Ashok Marannan, Mamta Kumari, Surbhi Jha, Ethan Dereszenski, Anupam Chakraborty, Subhash Ranjan , et al. (13 additional authors not shown)

    Abstract: Enterprise chatbots, powered by generative AI, are emerging as key applications to enhance employee productivity. Retrieval Augmented Generation (RAG), Large Language Models (LLMs), and orchestration frameworks like Langchain and Llamaindex are crucial for building these chatbots. However, creating effective enterprise chatbots is challenging and requires meticulous RAG pipeline engineering. This… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

    Comments: 8 pages, 6 figures, 2 tables, Preprint submission to ACM CIKM 2024

  2. arXiv:2307.08073  [pdf, ps, other

    math.NT cs.DM math.CO

    The sequence of higher order Mersenne numbers and associated binomial transforms

    Authors: Kalika Prasad, Munesh Kumari, Rabiranjan Mohanta, Hrishikesh Mahato

    Abstract: In this article, we introduce and study a new integer sequence referred to as the higher order Mersenne sequence. The proposed sequence is analogous to the higher order Fibonacci numbers and closely associated with the Mersenne numbers. Here, we discuss various algebraic properties such as Binet's formula, Catalan's identity, d'Ocagne's identity, generating functions, finite and binomial sums, etc… ▽ More

    Submitted 16 July, 2023; originally announced July 2023.

    Comments: 16 pages

    MSC Class: 11B37; 11B39; 11B83

  3. arXiv:2210.10092  [pdf

    cs.DL cs.SI

    Awareness of Predatory Journals in Library and Information Science Faculties in India

    Authors: Madhuri Kumari, Subaveerapandiyan A

    Abstract: Predatory journals that pretended to resemble refereed journals but are used for money-making purposes. Predatory publishers produce less quality scientific and research papers; it is a severe academic threat in scientific publications. Researchers are ensuring the quality of the journal and peer-reviewing process before submitting the manuscript. This paper aims to know the Indian Library and Inf… ▽ More

    Submitted 14 October, 2022; originally announced October 2022.

  4. arXiv:2202.08156  [pdf, other

    cs.CR cs.DM math.CO math.NT

    A novel public key cryptography based on generalized Lucas matrices

    Authors: Kalika Prasad, Hrishikesh Mahato, Munesh Kumari

    Abstract: In this article, we have proposed a generalized Lucas matrix (recursive matrix of higher order) having relation with generalized Fibonacci sequences and established many special properties in addition to that usual matrix algebra. Further, we have proposed a modified public key cryptography using these matrices as keys in Affine cipher and key agreement for encryption-decryption with the combinati… ▽ More

    Submitted 16 February, 2022; originally announced February 2022.

    Comments: 14pages

    MSC Class: 11T71; 11B39; 94A60; 14G50; 68P30 ACM Class: E.3; G.2.1

    Journal ref: Communications in Combinatorics and Optimization 2024

  5. arXiv:2112.11013  [pdf, ps, other

    cs.CR math.CO math.NT

    On the role of the Fibonacci matrix as key in modified ECC

    Authors: Munesh Kumari, Jagmohan Tanti

    Abstract: In this paper, we have proposed a modified cryptographic scheme based on the application of recursive matrices as key in ECC and ElGamal. For encryption, we consider mapping analogous to affine Hill cipher in which a plaintext matrix has been constructed by points corresponding to letters on elliptic curves. In the formation of key-space, the generalized Fibonacci matrices have been taken into acc… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.

    Comments: 13 pages

    MSC Class: 11T71; 14G50; 14H52; 68P25; 94A60

  6. arXiv:2012.05800  [pdf

    cs.CV eess.IV

    Sylvester Matrix Based Similarity Estimation Method for Automation of Defect Detection in Textile Fabrics

    Authors: R. M. L. N. Kumari, G. A. C. T. Bandara, Maheshi B. Dissanayake

    Abstract: Fabric defect detection is a crucial quality control step in the textile manufacturing industry. In this article, machine vision system based on the Sylvester Matrix Based Similarity Method (SMBSM) is proposed to automate the defect detection process. The algorithm involves six phases, namely resolution matching, image enhancement using Histogram Specification and Median-Mean Based Sub-Image-Clipp… ▽ More

    Submitted 8 December, 2020; originally announced December 2020.

    Comments: Journal of Sensors, Hindawi

    Journal ref: Journal of Sensors,Volume 2021, Article ID 6625421

  7. arXiv:2004.09982  [pdf, other

    cs.CR math.HO

    A review on mathematical strength and analysis of Enigma

    Authors: Kalika Prasad, Munesh Kumari

    Abstract: In this review article, we discussed the Mathematics and mechanics behind the Enigma machine with an analysis of security strength. The German army used the Enigma machine during the second world war to encrypt communications. Due to its complexity, the encryption done by the Enigma Machine was assumed to be almost unbreakable. However, the Polish believed that people with good background and deep… ▽ More

    Submitted 17 April, 2020; originally announced April 2020.

    Comments: Enigma Machine, Mathematical Strength

  8. arXiv:2003.08634  [pdf, ps, other

    cs.CR math.NT

    A public key cryptography using multinacci block matrices

    Authors: Munesh Kumari, Jagmohan Tanti

    Abstract: In this paper, we have proposed a public key cryptography using recursive block matrices involving generalized Fibonacci numbers over a finite field Fp. For this, we define multinacci block matrices, a type of upper triangular matrix involving multinacci matrices at diagonal places and obtained some of its algebraic properties. Moreover, we have set up a method for key element agreement at end use… ▽ More

    Submitted 19 April, 2022; v1 submitted 19 March, 2020; originally announced March 2020.

    Comments: 11 Pages, No figures

    MSC Class: 11T71; 94A60

  9. Reduction of Redundant Rules in Association Rule Mining-Based Bug Assignment

    Authors: Meera Sharma, Abhishek Tandon, Madhu Kumari, V B Singh

    Abstract: Bug triaging is a process to decide what to do with newly coming bug reports. In this paper, we have mined association rules for the prediction of bug assignee of a newly reported bug using different bug attributes, namely, severity, priority, component and operating system. To deal with the problem of large data sets, we have taken subsets of data set by dividing the large data set using K-means… ▽ More

    Submitted 23 July, 2018; originally announced July 2018.

    Comments: 14 pages

    Journal ref: International Journal of Reliability, Quality and Safety Engineering Vol. 24, No. 6 (2017) 1740005 (14 pages) World Scientific Publishing Company

  10. arXiv:1612.08178  [pdf

    cs.IR cs.CL

    JU_KS_Group@FIRE 2016: Consumer Health Information Search

    Authors: Kamal Sarkar, Debanjan Das, Indra Banerjee, Mamta Kumari, Prasenjit Biswas

    Abstract: In this paper, we describe the methodology used and the results obtained by us for completing the tasks given under the shared task on Consumer Health Information Search (CHIS) collocated with the Forum for Information Retrieval Evaluation (FIRE) 2016, ISI Kolkata. The shared task consists of two sub-tasks - (1) task1: given a query and a document/set of documents associated with that query, the t… ▽ More

    Submitted 24 December, 2016; originally announced December 2016.

    Comments: 8th meeting of Forum for Information Retrieval Evaluation 2016, 2016

  11. arXiv:1411.0442  [pdf, other

    cs.CV

    Non Binary Local Gradient Contours for Face Recognition

    Authors: Abdullah Gubbi, Mohammad Fazle Azeem, M Sharmila Kumari

    Abstract: As the features from the traditional Local Binary Patterns (LBP) and Local Directional Patterns (LDP) are found to be ineffective for face recognition, we have proposed a new approach derived on the basis of Information sets whereby the loss of information that occurs during the binarization is eliminated. The information sets expand the scope of fuzzy sets by connecting the attribute and the corr… ▽ More

    Submitted 3 November, 2014; originally announced November 2014.

    Comments: 12 pages

    Journal ref: International Journal of Information Processing, 8(3), 63-74, 2014

  12. 3D Face Recognition using Significant Point based SULD Descriptor

    Authors: B. H. Shekar, N. Harivinod, M. Sharmila Kumari, K. Raghurama Holla

    Abstract: In this work, we present a new 3D face recognition method based on Speeded-Up Local Descriptor (SULD) of significant points extracted from the range images of faces. The proposed model consists of a method for extracting distinctive invariant features from range images of faces that can be used to perform reliable matching between different poses of range images of faces. For a given 3D face scan,… ▽ More

    Submitted 26 October, 2012; originally announced October 2012.

  13. Primitive Polynomials, Singer Cycles, and Word-Oriented Linear Feedback Shift Registers

    Authors: Sudhir R. Ghorpade, Sartaj Ul Hasan, Meena Kumari

    Abstract: Using the structure of Singer cycles in general linear groups, we prove that a conjecture of Zeng, Han and He (2007) holds in the affirmative in a special case, and outline a plausible approach to prove it in the general case. This conjecture is about the number of primitive $σ$-LFSRs of a given order over a finite field, and it generalizes a known formula for the number of primitive LFSRs, which… ▽ More

    Submitted 28 March, 2010; v1 submitted 8 April, 2009; originally announced April 2009.

    Comments: Version 2 with some minor changes; to appear in Designs, Codes and Cryptography.

    MSC Class: 11T06; 11T31; 20G40; 94A60

    Journal ref: Designs, Codes and Cryptography, Vol. 58, No. 2 (2011), pp. 123-134