Skip to main content

Showing 1–20 of 20 results for author: Raj, P

  1. arXiv:2407.07858  [pdf, other

    cs.LG cs.CL

    FACTS About Building Retrieval Augmented Generation-based Chatbots

    Authors: Rama Akkiraju, Anbang Xu, Deepak Bora, Tan Yu, Lu An, Vishal Seth, Aaditya Shukla, Pritam Gundecha, Hridhay Mehta, Ashwin Jha, Prithvi Raj, Abhinav Balasubramanian, Murali Maram, Guru Muthusamy, Shivakesh Reddy Annepally, Sidney Knowles, Min Du, Nick Burnett, Sean Javiya, Ashok Marannan, Mamta Kumari, Surbhi Jha, Ethan Dereszenski, Anupam Chakraborty, Subhash Ranjan , et al. (13 additional authors not shown)

    Abstract: Enterprise chatbots, powered by generative AI, are emerging as key applications to enhance employee productivity. Retrieval Augmented Generation (RAG), Large Language Models (LLMs), and orchestration frameworks like Langchain and Llamaindex are crucial for building these chatbots. However, creating effective enterprise chatbots is challenging and requires meticulous RAG pipeline engineering. This… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

    Comments: 8 pages, 6 figures, 2 tables, Preprint submission to ACM CIKM 2024

  2. arXiv:2406.16890  [pdf, other

    cs.CL cs.LG

    TextAge: A Curated and Diverse Text Dataset for Age Classification

    Authors: Shravan Cheekati, Mridul Gupta, Vibha Raghu, Pranav Raj

    Abstract: Age-related language patterns play a crucial role in understanding linguistic differences and developing age-appropriate communication strategies. However, the lack of comprehensive and diverse datasets has hindered the progress of research in this area. To address this issue, we present TextAge, a curated text dataset that maps sentences to the age and age group of the producer, as well as an und… ▽ More

    Submitted 2 May, 2024; originally announced June 2024.

  3. arXiv:2402.12080  [pdf, other

    cs.CL

    Can LLMs Compute with Reasons?

    Authors: Harshit Sandilya, Peehu Raj, Jainit Sushil Bafna, Srija Mukhopadhyay, Shivansh Sharma, Ellwil Sharma, Arastu Sharma, Neeta Trivedi, Manish Shrivastava, Rajesh Kumar

    Abstract: Large language models (LLMs) often struggle with complex mathematical tasks, prone to "hallucinating" incorrect answers due to their reliance on statistical patterns. This limitation is further amplified in average Small LangSLMs with limited context and training data. To address this challenge, we propose an "Inductive Learning" approach utilizing a distributed network of SLMs. This network lever… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.

    Comments: 8 pages

    MSC Class: 68T50 ACM Class: I.2.7

  4. arXiv:2312.16741  [pdf, other

    cs.RO

    Bin-picking of novel objects through category-agnostic-segmentation: RGB matters

    Authors: Prem Raj, Sachin Bhadang, Gaurav Chaudhary, Laxmidhar Behera, Tushar Sandhan

    Abstract: This paper addresses category-agnostic instance segmentation for robotic manipulation, focusing on segmenting objects independent of their class to enable versatile applications like bin-picking in dynamic environments. Existing methods often lack generalizability and object-specific information, leading to grasp failures. We present a novel approach leveraging object-centric instance segmentation… ▽ More

    Submitted 27 December, 2023; originally announced December 2023.

    Comments: Presented at IEEE International Conference on Robotic Computing (IRC), 2023

  5. arXiv:2312.12637  [pdf, other

    cs.RO

    Domain-Independent Disperse and Pick method for Robotic Grasping

    Authors: Prem Raj, Aniruddha Singhal, Vipul Sanap, L. Behera, Rajesh Sinha

    Abstract: Picking unseen objects from clutter is a difficult problem because of the variability in objects (shape, size, and material) and occlusion due to clutter. As a result, it becomes difficult for grasping methods to segment the objects properly and they fail to singulate the object to be picked. This may result in grasp failure or picking of multiple objects together in a single attempt. A push-to-mo… ▽ More

    Submitted 19 December, 2023; originally announced December 2023.

    Comments: Published at 2022 International Joint Conference on Neural Networks (IJCNN)

    Journal ref: 10.1109/IJCNN55064.2022.9892672

  6. arXiv:2307.04610  [pdf, other

    cs.CV

    SPLAL: Similarity-based pseudo-labeling with alignment loss for semi-supervised medical image classification

    Authors: Md Junaid Mahmood, Pranaw Raj, Divyansh Agarwal, Suruchi Kumari, Pravendra Singh

    Abstract: Medical image classification is a challenging task due to the scarcity of labeled samples and class imbalance caused by the high variance in disease prevalence. Semi-supervised learning (SSL) methods can mitigate these challenges by leveraging both labeled and unlabeled data. However, SSL methods for medical image classification need to address two key challenges: (1) estimating reliable pseudo-la… ▽ More

    Submitted 10 July, 2023; originally announced July 2023.

    Comments: Under Review

  7. Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography

    Authors: Kunal Abhishek, E. George Dharma Prakash Raj

    Abstract: Short Weierstrass's elliptic curves with underlying hard Elliptic Curve Discrete Logarithm Problems was widely used in Cryptographic applications. This paper introduces a new security notation 'trusted security' for computation methods of elliptic curves for cryptography. Three additional "trusted security acceptance criteria" is proposed to be met by the elliptic curves aimed for cryptography. Fu… ▽ More

    Submitted 15 April, 2022; originally announced August 2022.

    Comments: CYBERNETICS AND INFORMATION TECHNOLOGIES, Volume 21, No 2

    Journal ref: CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, Volume 21, No 2, pages 71-88

  8. Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography

    Authors: Kunal Abhishek, E. George Dharma Prakash Raj

    Abstract: The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography. Subsequently, this evolution resulted in the establishment of present elliptic curve computational standards. We discuss the chronology of attacks on Elliptic Curve Discrete Logarithm Problem and investigate their countermeasures to highlight the evolved selection criteria of cryptograp… ▽ More

    Submitted 15 April, 2022; originally announced August 2022.

    Comments: CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, Volume 21, No 4

    Journal ref: CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, Volume 21, No 4

  9. arXiv:2108.04208  [pdf, other

    cs.CY cs.HC

    Experiences with the Introduction of AI-based Tools for Moderation Automation of Voice-based Participatory Media Forums

    Authors: Aman Khullar, Paramita Panjal, Rachit Pandey, Abhishek Burnwal, Prashit Raj, Ankit Akash Jha, Priyadarshi Hitesh, R Jayanth Reddy, Himanshu, Aaditeshwar Seth

    Abstract: Voice-based discussion forums where users can record audio messages which are then published for other users to listen and comment, are often moderated to ensure that the published audios are of good quality, relevant, and adhere to editorial guidelines of the forum. There is room for the introduction of AI-based tools in the moderation process, such as to identify and filter out blank or noisy au… ▽ More

    Submitted 9 August, 2021; originally announced August 2021.

    Journal ref: The 3rd KDD Workshop on Data Science for Social Good, 2021

  10. arXiv:2106.12763  [pdf, other

    eess.AS cs.SD eess.IV eess.SP

    SRIB-LEAP submission to Far-field Multi-Channel Speech Enhancement Challenge for Video Conferencing

    Authors: R G Prithvi Raj, Rohit Kumar, M K Jayesh, Anurenjan Purushothaman, Sriram Ganapathy, M A Basha Shaik

    Abstract: This paper presents the details of the SRIB-LEAP submission to the ConferencingSpeech challenge 2021. The challenge involved the task of multi-channel speech enhancement to improve the quality of far field speech from microphone arrays in a video conferencing room. We propose a two stage method involving a beamformer followed by single channel enhancement. For the beamformer, we incorporated self-… ▽ More

    Submitted 24 June, 2021; originally announced June 2021.

  11. Learning to Switch CNNs with Model Agnostic Meta Learning for Fine Precision Visual Servoing

    Authors: Prem Raj, Vinay P. Namboodiri, L. Behera

    Abstract: Convolutional Neural Networks (CNNs) have been successfully applied for relative camera pose estimation from labeled image-pair data, without requiring any hand-engineered features, camera intrinsic parameters or depth information. The trained CNN can be utilized for performing pose based visual servo control (PBVS). One of the ways to improve the quality of visual servo output is to improve the a… ▽ More

    Submitted 9 July, 2020; originally announced July 2020.

    Comments: Accepted in IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS-2020). For video visit - https://youtu.be/GSG20lmWDUo

    Journal ref: 2020 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), 10210-10217

  12. arXiv:2002.01664  [pdf, other

    cs.CL cs.LG eess.AS

    Identification of Indian Languages using Ghost-VLAD pooling

    Authors: Krishna D N, Ankita Patil, M. S. P Raj, Sai Prasad H S, Prabhu Aashish Garapati

    Abstract: In this work, we propose a new pooling strategy for language identification by considering Indian languages. The idea is to obtain utterance level features for any variable length audio for robust language recognition. We use the GhostVLAD approach to generate an utterance level feature vector for any variable length input audio by aggregating the local frame level features across time. The genera… ▽ More

    Submitted 5 February, 2020; originally announced February 2020.

    Journal ref: REJECTED ICASSP 2020

  13. arXiv:1702.08717  [pdf

    cs.CV

    An Extensive Technique to Detect and Analyze Melanoma: A Challenge at the International Symposium on Biomedical Imaging (ISBI) 2017

    Authors: G Wiselin Jiji, P Johnson Durai Raj

    Abstract: An automated method to detect and analyze the melanoma is presented to improve diagnosis which will leads to the exact treatment. Image processing techniques such as segmentation, feature descriptors and classification models are involved in this method. In the First phase the lesion region is segmented using CIELAB Color space Based Segmentation. Then feature descriptors such as shape, color and… ▽ More

    Submitted 28 February, 2017; originally announced February 2017.

    Comments: 4 Page Abstract for ISIC2017 Challenge

  14. arXiv:1604.05274  [pdf

    cs.DB

    A Novel Gaussian Based Similarity Measure for Clustering Customer Transactions Using Transaction Sequence Vector

    Authors: M. S. B. Phridvi Raj, Vangipuram Radhakrishna, C. V. Guru Rao

    Abstract: Clustering Transactions in sequence, temporal and time series databases is achieving an important attention from the database researchers and software industry. Significant research is carried out towards defining and validating the suitability of new similarity measures for sequence, temporal, time series databases which can accurately and efficiently find the similarity between user transactions… ▽ More

    Submitted 18 April, 2016; originally announced April 2016.

    Comments: Technical Journal of the faculty of Engineering, April 2015, 12 pages, Journal Indexed in Scopus and Web of Science

    Journal ref: Rev. Tec. Ing. Univ. Zulia. Vol. 38, No 1, 85 - 96, April 2015

  15. arXiv:1405.1514  [pdf

    cs.NI

    ACO-ESSVHOA - Ant Colony Optimization based Multi-Criteria Decision Making for Efficient Signal Selection in Mobile Vertical Handoff

    Authors: A. Bhuvaneswari, E. George Dharma Prakash Raj, V. Sinthu Janita Prakash

    Abstract: The process of Vertical handoff has become one of the major components of today's wireless environment due to the availability of the vast variety of signals. The decision for a handoff should be performed catering to the needs of the current transmission that is being carried out. Our paper describes a modified Ant Colony Optimization based handoff mechanism, that considers multiple criteria in i… ▽ More

    Submitted 7 May, 2014; originally announced May 2014.

    Comments: 7 Pages, 8 figures

    Journal ref: IJASCSE, Vol.3,Issue 4, April 30 2014

  16. arXiv:1311.3175  [pdf

    cs.CL cs.IR

    Architecture of an Ontology-Based Domain-Specific Natural Language Question Answering System

    Authors: Athira P. M., Sreeja M., P. C. Reghu Raj

    Abstract: Question answering (QA) system aims at retrieving precise information from a large collection of documents against a query. This paper describes the architecture of a Natural Language Question Answering (NLQA) system for a specific domain based on the ontological information, a step towards semantic web question answering. The proposed architecture defines four basic modules suitable for enhancing… ▽ More

    Submitted 13 November, 2013; originally announced November 2013.

    Journal ref: International Journal of Web & Semantic Technology (IJWesT) Vol.4, No.4, October 2013

  17. arXiv:1304.7998  [pdf

    cs.NI

    A Novel Cluster Validation Approach on Pso-Pac Mechanism in Ad Hoc Network

    Authors: S. Thirumurugan, E. George Dharma Prakash Raj

    Abstract: The ad hoc network places a vital role in contemporary days communication scenario. This network performance gets up while the clustering phenomenon has been incorporated. The cluster formation using the vital parameters is incredible on deciding the efficiency level of the clustered ad hoc networks. The PSO-PAC mechanism forms clusters based on swarm intelligence by considering energy as crucial… ▽ More

    Submitted 7 March, 2013; originally announced April 2013.

  18. arXiv:1301.2689  [pdf

    cs.NI cs.DC

    An Extended Weighted Partitioning Around Cluster Head Mechanism for Ad Hoc Network

    Authors: S. Thirumurugan, E. George Dharma Prakash Raj

    Abstract: The wireless network places vital role in the present day communication scenario. The ad hoc nature of wireless communication adds flavour to suit various real world applications. This improves the performance of the network tremendously while the clustering mechanism gets added to the ad hoc network. It has been found out that the existing WCA lacks in forming efficient clusters. Thus, this work… ▽ More

    Submitted 12 January, 2013; originally announced January 2013.

    Comments: IJASUC 2012

  19. arXiv:1003.1479  [pdf

    cs.NI

    Analysis, Modification, and Implementation (AMI) of Scheduling Algorithm for the IEEE 802.116e (Mobile WiMAX)

    Authors: C. Ravichandiran, C. Pethuru Raj, V. Vaidhyanathan

    Abstract: Mobile WiMAX (Worldwide Interoperability for Microwave Access) is being touted as the most promising and potential broadband wireless technology. And the popularity rate has been surging to newer heights as the knowledge-backed service era unfolds steadily. Especially Mobile WiMAX is being projected as a real and strategic boon for developing counties such as India due to its wireless coverage acr… ▽ More

    Submitted 7 March, 2010; originally announced March 2010.

    Comments: Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 7 No. 2, February 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis/

  20. arXiv:0909.2371  [pdf

    cs.CR cs.NI

    Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet

    Authors: Payal N. Raj, Prashant B. Swadas

    Abstract: Security is an essential requirement in mobile ad hoc networks to provide protected communication between mobile nodes. Due to unique characteristics of MANETS, it creates a number of consequential challenges to its security design. To overcome the challenges, there is a need to build a multifence security solution that achieves both broad protection and desirable network performance. MANETs are… ▽ More

    Submitted 12 September, 2009; originally announced September 2009.

    Comments: International Journal of Computer Science Issues (IJCSI), Volume 1, pp54-59, August 2009

    Journal ref: P. N. Raj and P. B. Swadas, "DPRAODV: A DYANAMIC LEARNING SYSTEM AGAINST BLACKHOLE ATTACK IN AODV BASED MANET", International Journal of Computer Science Issues (IJCSI), Volume 1, pp54-59, August 2009