-
An Efficient Architecture for Predicting the Case of Characters using Sequence Models
Authors:
Gopi Ramena,
Divija Nagaraju,
Sukumar Moharana,
Debi Prasanna Mohanty,
Naresh Purre
Abstract:
The dearth of clean textual data often acts as a bottleneck in several natural language processing applications. The data available often lacks proper case (uppercase or lowercase) information. This often comes up when text is obtained from social media, messaging applications and other online platforms. This paper attempts to solve this problem by restoring the correct case of characters, commonl…
▽ More
The dearth of clean textual data often acts as a bottleneck in several natural language processing applications. The data available often lacks proper case (uppercase or lowercase) information. This often comes up when text is obtained from social media, messaging applications and other online platforms. This paper attempts to solve this problem by restoring the correct case of characters, commonly known as Truecasing. Doing so improves the accuracy of several processing tasks further down in the NLP pipeline. Our proposed architecture uses a combination of convolutional neural networks (CNN), bi-directional long short-term memory networks (LSTM) and conditional random fields (CRF), which work at a character level without any explicit feature engineering. In this study we compare our approach to previous statistical and deep learning based approaches. Our method shows an increment of 0.83 in F1 score over the current state of the art. Since truecasing acts as a preprocessing step in several applications, every increment in the F1 score leads to a significant improvement in the language processing tasks.
△ Less
Submitted 30 January, 2020;
originally announced February 2020.
-
On-Device User Intent Prediction for Context and Sequence Aware Recommendation
Authors:
Benu Madhab Changmai,
Divija Nagaraju,
Debi Prasanna Mohanty,
Kriti Singh,
Kunal Bansal,
Sukumar Moharana
Abstract:
The pursuit of improved accuracy in recommender systems has led to the incorporation of user context. Context-aware recommender systems typically handle large amounts of data which must be uploaded and stored on the cloud, putting the user's personal information at risk. While there have been previous studies on privacy-sensitive and context-aware recommender systems, there has not been a full-fle…
▽ More
The pursuit of improved accuracy in recommender systems has led to the incorporation of user context. Context-aware recommender systems typically handle large amounts of data which must be uploaded and stored on the cloud, putting the user's personal information at risk. While there have been previous studies on privacy-sensitive and context-aware recommender systems, there has not been a full-fledged system deployed in an isolated mobile environment. We propose a secure and efficient on-device mechanism to predict a user's next intention. The knowledge of the user's real-time intention can help recommender systems to provide more relevant recommendations at the right moment. Our proposed algorithm is both context and sequence aware. We embed user intentions as weighted nodes in an n-dimensional vector space where each dimension represents a specific user context factor. Through a neighborhood searching method followed by a sequence matching algorithm, we search for the most relevant node to make the prediction. An evaluation of our methodology was done on a diverse real-world dataset where it was able to address practical scenarios like behavior drifts and sequential patterns efficiently and robustly. Our system also outperformed most of the state-of-the-art methods when evaluated for a similar problem domain on standard datasets.
△ Less
Submitted 18 September, 2019;
originally announced September 2019.
-
Binary Protector: Intrusion Detection in Multitier Web Applications
Authors:
C. Venkatesh,
D. Nagaraju,
T. Sunil Kumar Reddy
Abstract:
The services of internet place a key role in the daily life by enabling the in sequence from anywhere. To provide somewhere to stay the communication and management in applications the web services has stimulated to multitier design. In this multitier the web servers contain front end logic and data with database servers. In this paper, we present binary protector intrusion detection systems which…
▽ More
The services of internet place a key role in the daily life by enabling the in sequence from anywhere. To provide somewhere to stay the communication and management in applications the web services has stimulated to multitier design. In this multitier the web servers contain front end logic and data with database servers. In this paper, we present binary protector intrusion detection systems which designs the network behavior of user sessions across both the front-end web server and the back-end database. By examining both web and subsequent database requests, we are able to rummage out attacks that independent IDS would not be able to distinguish.
△ Less
Submitted 1 May, 2014;
originally announced May 2014.
-
Updating the Routing Position in Adhoc Networks by using Adaptive Position
Authors:
Ravi Kumar Poluru,
T. Sunil Kumar Reddy,
D. Nagaraju
Abstract:
In geographic routing, nodes to their instantaneous neighbour call for to maintain up-to-date positions for making successful forwarding decisions. The geographic location coordinates of the nodes by the periodic broadcasting of beacon packets is a trendy method used by the majority geographic routing protocols to preserve neighbour positions. We contend and display that periodic beaconing apart f…
▽ More
In geographic routing, nodes to their instantaneous neighbour call for to maintain up-to-date positions for making successful forwarding decisions. The geographic location coordinates of the nodes by the periodic broadcasting of beacon packets is a trendy method used by the majority geographic routing protocols to preserve neighbour positions. We contend and display that periodic beaconing apart from of the node mobility and traffic patterns in the network is not nice-looking from both update cost and routing recital points of view. We recommend the Adaptive Position Update (APU) strategy for geographic routing, which enthusiastically adjusts the occurrence of position updates based on the mobility dynamics of the nodes and the forwarding patterns in the system. APU is based on two easy principles: 1) nodes whose arrangements are harder to guess update their positions more recurrently (and vice versa), and (ii) nodes faster to forwarding paths update their positions more recurrently (and vice versa). Our speculative analysis, which is validated by NS2 simulations of a well-known geographic routing procedure, Greedy Perimeter Stateless Routing Protocol (GPSR),shows that APU can drastically reduce the update cost and pick up the routing performance in terms of packet delivery ratio and regular end-to-end delay in assessment with periodic beaconing and other recently proposed updating schemes. The benefits of APU are additional confirmed by responsibility evaluations in realistic network scenarios, which account for localization error, practical radio propagation, and sparse system.
△ Less
Submitted 30 April, 2014;
originally announced April 2014.