-
"Stupid robot, I want to speak to a human!" User Frustration Detection in Task-Oriented Dialog Systems
Authors:
Mireia Hernandez Caralt,
Ivan Sekulić,
Filip Carević,
Nghia Khau,
Diana Nicoleta Popa,
Bruna Guedes,
Victor Guimarães,
Zeyu Yang,
Andre Manso,
Meghana Reddy,
Paolo Rosso,
Roland Mathis
Abstract:
Detecting user frustration in modern-day task-oriented dialog (TOD) systems is imperative for maintaining overall user satisfaction, engagement, and retention. However, most recent research is focused on sentiment and emotion detection in academic settings, thus failing to fully encapsulate implications of real-world user data. To mitigate this gap, in this work, we focus on user frustration in a…
▽ More
Detecting user frustration in modern-day task-oriented dialog (TOD) systems is imperative for maintaining overall user satisfaction, engagement, and retention. However, most recent research is focused on sentiment and emotion detection in academic settings, thus failing to fully encapsulate implications of real-world user data. To mitigate this gap, in this work, we focus on user frustration in a deployed TOD system, assessing the feasibility of out-of-the-box solutions for user frustration detection. Specifically, we compare the performance of our deployed keyword-based approach, open-source approaches to sentiment analysis, dialog breakdown detection methods, and emerging in-context learning LLM-based detection. Our analysis highlights the limitations of open-source methods for real-world frustration detection, while demonstrating the superior performance of the LLM-based approach, achieving a 16\% relative improvement in F1 score on an internal benchmark. Finally, we analyze advantages and limitations of our methods and provide an insight into user frustration detection task for industry practitioners.
△ Less
Submitted 10 January, 2025; v1 submitted 26 November, 2024;
originally announced November 2024.
-
Transitioning Together: Collaborative Work in Adolescent Chronic Illness Management
Authors:
Rachael Zehrung,
Madhu Reddy,
Yunan Chen
Abstract:
Adolescents with chronic illnesses need to learn self-management skills in preparation for the transition from pediatric to adult healthcare, which is associated with negative health outcomes for youth. However, few studies have explored how adolescents in a pre-transition stage practice self-management and collaborative management with their parents. Through interviews with 15 adolescents (aged 1…
▽ More
Adolescents with chronic illnesses need to learn self-management skills in preparation for the transition from pediatric to adult healthcare, which is associated with negative health outcomes for youth. However, few studies have explored how adolescents in a pre-transition stage practice self-management and collaborative management with their parents. Through interviews with 15 adolescents (aged 15-17), we found that adolescents managed mundane self-care tasks and experimented with lifestyle changes to be more independent, which sometimes conflicted with their parents' efforts to ensure their safety. Adolescents and their parents also performed shared activities that provided adolescents with the opportunity to learn and practice self-management skills. Based on our findings, we discuss considerations for technology design to facilitate transition and promote parent-adolescent collaboration in light of these tensions.
△ Less
Submitted 26 September, 2024;
originally announced September 2024.
-
Scale-Invariant Monocular Depth Estimation via SSI Depth
Authors:
S. Mahdi H. Miangoleh,
Mahesh Reddy,
Yağız Aksoy
Abstract:
Existing methods for scale-invariant monocular depth estimation (SI MDE) often struggle due to the complexity of the task, and limited and non-diverse datasets, hindering generalizability in real-world scenarios. This is while shift-and-scale-invariant (SSI) depth estimation, simplifying the task and enabling training with abundant stereo datasets achieves high performance. We present a novel appr…
▽ More
Existing methods for scale-invariant monocular depth estimation (SI MDE) often struggle due to the complexity of the task, and limited and non-diverse datasets, hindering generalizability in real-world scenarios. This is while shift-and-scale-invariant (SSI) depth estimation, simplifying the task and enabling training with abundant stereo datasets achieves high performance. We present a novel approach that leverages SSI inputs to enhance SI depth estimation, streamlining the network's role and facilitating in-the-wild generalization for SI depth estimation while only using a synthetic dataset for training. Emphasizing the generation of high-resolution details, we introduce a novel sparse ordinal loss that substantially improves detail generation in SSI MDE, addressing critical limitations in existing approaches. Through in-the-wild qualitative examples and zero-shot evaluation we substantiate the practical utility of our approach in computational photography applications, showcasing its ability to generate highly detailed SI depth maps and achieve generalization in diverse scenarios.
△ Less
Submitted 13 June, 2024;
originally announced June 2024.
-
Supervised Contrastive Vision Transformer for Breast Histopathological Image Classification
Authors:
Mohammad Shiri,
Monalika Padma Reddy,
Jiangwen Sun
Abstract:
Invasive ductal carcinoma (IDC) is the most prevalent form of breast cancer. Breast tissue histopathological examination is critical in diagnosing and classifying breast cancer. Although existing methods have shown promising results, there is still room for improvement in the classification accuracy and generalization of IDC using histopathology images. We present a novel approach, Supervised Cont…
▽ More
Invasive ductal carcinoma (IDC) is the most prevalent form of breast cancer. Breast tissue histopathological examination is critical in diagnosing and classifying breast cancer. Although existing methods have shown promising results, there is still room for improvement in the classification accuracy and generalization of IDC using histopathology images. We present a novel approach, Supervised Contrastive Vision Transformer (SupCon-ViT), for improving the classification of invasive ductal carcinoma in terms of accuracy and generalization by leveraging the inherent strengths and advantages of both transfer learning, i.e., pre-trained vision transformer, and supervised contrastive learning. Our results on a benchmark breast cancer dataset demonstrate that SupCon-Vit achieves state-of-the-art performance in IDC classification, with an F1-score of 0.8188, precision of 0.7692, and specificity of 0.8971, outperforming existing methods. In addition, the proposed model demonstrates resilience in scenarios with minimal labeled data, making it highly efficient in real-world clinical settings where labelled data is limited. Our findings suggest that supervised contrastive learning in conjunction with pre-trained vision transformers appears to be a viable strategy for an accurate classification of IDC, thus paving the way for a more efficient and reliable diagnosis of breast cancer through histopathological image analysis.
△ Less
Submitted 17 April, 2024; v1 submitted 16 April, 2024;
originally announced April 2024.
-
EdgeRelight360: Text-Conditioned 360-Degree HDR Image Generation for Real-Time On-Device Video Portrait Relighting
Authors:
Min-Hui Lin,
Mahesh Reddy,
Guillaume Berger,
Michel Sarkis,
Fatih Porikli,
Ning Bi
Abstract:
In this paper, we present EdgeRelight360, an approach for real-time video portrait relighting on mobile devices, utilizing text-conditioned generation of 360-degree high dynamic range image (HDRI) maps. Our method proposes a diffusion-based text-to-360-degree image generation in the HDR domain, taking advantage of the HDR10 standard. This technique facilitates the generation of high-quality, reali…
▽ More
In this paper, we present EdgeRelight360, an approach for real-time video portrait relighting on mobile devices, utilizing text-conditioned generation of 360-degree high dynamic range image (HDRI) maps. Our method proposes a diffusion-based text-to-360-degree image generation in the HDR domain, taking advantage of the HDR10 standard. This technique facilitates the generation of high-quality, realistic lighting conditions from textual descriptions, offering flexibility and control in portrait video relighting task. Unlike the previous relighting frameworks, our proposed system performs video relighting directly on-device, enabling real-time inference with real 360-degree HDRI maps. This on-device processing ensures both privacy and guarantees low runtime, providing an immediate response to changes in lighting conditions or user inputs. Our approach paves the way for new possibilities in real-time video applications, including video conferencing, gaming, and augmented reality, by allowing dynamic, text-based control of lighting conditions.
△ Less
Submitted 15 April, 2024;
originally announced April 2024.
-
Plane Hamiltonian Cycles in Convex Drawings
Authors:
Helena Bergold,
Stefan Felsner,
Meghana M. Reddy,
Joachim Orthaber,
Manfred Scheucher
Abstract:
A conjecture by Rafla from 1988 asserts that every simple drawing of the complete graph $K_n$ admits a plane Hamiltonian cycle. It turned out that already the existence of much simpler non-crossing substructures in such drawings is hard to prove. Recent progress was made by Aichholzer et al. and by Suk and Zeng who proved the existence of a plane path of length $Ω(\log n / \log \log n)$ and of a p…
▽ More
A conjecture by Rafla from 1988 asserts that every simple drawing of the complete graph $K_n$ admits a plane Hamiltonian cycle. It turned out that already the existence of much simpler non-crossing substructures in such drawings is hard to prove. Recent progress was made by Aichholzer et al. and by Suk and Zeng who proved the existence of a plane path of length $Ω(\log n / \log \log n)$ and of a plane matching of size $Ω(n^{1/2})$ in every simple drawing of $K_{n}$.
Instead of studying simpler substructures, we prove Rafla's conjecture for the subclass of convex drawings, the most general class in the convexity hierarchy introduced by Arroyo et al. Moreover, we show that every convex drawing of $K_n$ contains a plane Hamiltonian path between each pair of vertices (Hamiltonian connectivity) and a plane $k$-cycle for each $3 \leq k \leq n$ (pancyclicity), and present further results on maximal plane subdrawings.
△ Less
Submitted 19 March, 2024;
originally announced March 2024.
-
AADNet: Attention aware Demoiréing Network
Authors:
M Rakesh Reddy,
Shubham Mandloi,
Aman Kumar
Abstract:
Moire pattern frequently appears in photographs captured with mobile devices and digital cameras, potentially degrading image quality. Despite recent advancements in computer vision, image demoire'ing remains a challenging task due to the dynamic textures and variations in colour, shape, and frequency of moire patterns. Most existing methods struggle to generalize to unseen datasets, limiting thei…
▽ More
Moire pattern frequently appears in photographs captured with mobile devices and digital cameras, potentially degrading image quality. Despite recent advancements in computer vision, image demoire'ing remains a challenging task due to the dynamic textures and variations in colour, shape, and frequency of moire patterns. Most existing methods struggle to generalize to unseen datasets, limiting their effectiveness in removing moire patterns from real-world scenarios. In this paper, we propose a novel lightweight architecture, AADNet (Attention Aware Demoireing Network), for high-resolution image demoire'ing that effectively works across different frequency bands and generalizes well to unseen datasets. Extensive experiments conducted on the UHDM dataset validate the effectiveness of our approach, resulting in high-fidelity images.
△ Less
Submitted 6 May, 2024; v1 submitted 13 March, 2024;
originally announced March 2024.
-
HexaGen3D: StableDiffusion is just one step away from Fast and Diverse Text-to-3D Generation
Authors:
Antoine Mercier,
Ramin Nakhli,
Mahesh Reddy,
Rajeev Yasarla,
Hong Cai,
Fatih Porikli,
Guillaume Berger
Abstract:
Despite the latest remarkable advances in generative modeling, efficient generation of high-quality 3D assets from textual prompts remains a difficult task. A key challenge lies in data scarcity: the most extensive 3D datasets encompass merely millions of assets, while their 2D counterparts contain billions of text-image pairs. To address this, we propose a novel approach which harnesses the power…
▽ More
Despite the latest remarkable advances in generative modeling, efficient generation of high-quality 3D assets from textual prompts remains a difficult task. A key challenge lies in data scarcity: the most extensive 3D datasets encompass merely millions of assets, while their 2D counterparts contain billions of text-image pairs. To address this, we propose a novel approach which harnesses the power of large, pretrained 2D diffusion models. More specifically, our approach, HexaGen3D, fine-tunes a pretrained text-to-image model to jointly predict 6 orthographic projections and the corresponding latent triplane. We then decode these latents to generate a textured mesh. HexaGen3D does not require per-sample optimization, and can infer high-quality and diverse objects from textual prompts in 7 seconds, offering significantly better quality-to-latency trade-offs when comparing to existing approaches. Furthermore, HexaGen3D demonstrates strong generalization to new objects or compositions.
△ Less
Submitted 15 January, 2024;
originally announced January 2024.
-
The Density Formula: One Lemma to Bound Them All
Authors:
Michael Kaufmann,
Boris Klemz,
Kristin Knorr,
Meghana M. Reddy,
Felix Schröder,
Torsten Ueckerdt
Abstract:
We introduce the Density Formula for (topological) drawings of graphs in the plane or on the sphere, which relates the number of edges, vertices, crossings, and sizes of cells in the drawing. We demonstrate its capability by providing several applications: we prove tight upper bounds on the edge density of various beyond-planar graph classes, including so-called $k$-planar graphs with $k=1,2$, fan…
▽ More
We introduce the Density Formula for (topological) drawings of graphs in the plane or on the sphere, which relates the number of edges, vertices, crossings, and sizes of cells in the drawing. We demonstrate its capability by providing several applications: we prove tight upper bounds on the edge density of various beyond-planar graph classes, including so-called $k$-planar graphs with $k=1,2$, fan-crossing / fan-planar graphs, $k$-bend RAC-graphs with $k=0,1,2$, quasiplanar graphs, and $k^+$-real face graphs. In some cases ($1$-bend and $2$-bend RAC-graphs and fan-crossing / fan-planar graphs), we thereby obtain the first tight upper bounds on the edge density of the respective graph classes. In other cases, we give new streamlined and significantly shorter proofs for bounds that were already known in the literature. Thanks to the Density Formula, all of our proofs are mostly elementary counting and mostly circumvent the typical intricate case analysis found in earlier proofs. Further, in some cases (simple and non-homotopic quasiplanar graphs), our alternative proofs using the Density Formula lead to the first tight lower bound examples.
△ Less
Submitted 17 September, 2024; v1 submitted 10 November, 2023;
originally announced November 2023.
-
Optimizing Symbol Visibility through Displacement
Authors:
Bernd Gärtner,
Vishwas Kalani,
Meghana M. Reddy,
Wouter Meulemans,
Bettina Speckmann,
Miloš Stojaković
Abstract:
In information visualization, the position of symbols often encodes associated data values. When visualizing data elements with both a numerical and a categorical dimension, positioning in the categorical axis admits some flexibility. This flexibility can be exploited to reduce symbol overlap, and thereby increase legibility. In this paper, we initialize the algorithmic study of optimizing symbol…
▽ More
In information visualization, the position of symbols often encodes associated data values. When visualizing data elements with both a numerical and a categorical dimension, positioning in the categorical axis admits some flexibility. This flexibility can be exploited to reduce symbol overlap, and thereby increase legibility. In this paper, we initialize the algorithmic study of optimizing symbol legibility via a limited displacement of the symbols. Specifically, we consider closed unit square symbols that need to be placed at specified $y$-coordinates. We optimize the drawing order of the symbols as well as their $x$-displacement, constrained within a rectangular container, to maximize the minimum visible perimeter over all squares. If the container has width and height at most $2$, there is a point that stabs all squares. In this case, we prove that a staircase layout is arbitrarily close to optimality and can be computed in $O(n\log n)$ time. If the width is at most $2$, there is a vertical line that stabs all squares, and in this case, we design a 2-approximation algorithm (assuming fixed container height) that runs in $O(n\log n)$ time. As it turns out that a minimum visible perimeter of 2 is always achievable with a generic construction, we measure this approximation with respect to the visible perimeter exceeding 2. We show that, despite its simplicity, the algorithm gives asymptotically optimal results for certain instances.
△ Less
Submitted 21 May, 2025; v1 submitted 2 October, 2023;
originally announced October 2023.
-
Using SAT to study plane Hamiltonian substructures in simple drawings
Authors:
Helena Bergold,
Stefan Felsner,
Meghana M. Reddy,
Manfred Scheucher
Abstract:
In 1988 Rafla conjectured that every simple drawing of a complete graph $K_n$ contains a plane, i.e., non-crossing, Hamiltonian cycle. The conjecture is far from being resolved. The lower bounds for plane paths and plane matchings have recently been raised to $(\log n)^{1-o(1)}$ and $Ω(\sqrt{n})$, respectively. We develop a SAT framework which allows the study of simple drawings of $K_n$. Based on…
▽ More
In 1988 Rafla conjectured that every simple drawing of a complete graph $K_n$ contains a plane, i.e., non-crossing, Hamiltonian cycle. The conjecture is far from being resolved. The lower bounds for plane paths and plane matchings have recently been raised to $(\log n)^{1-o(1)}$ and $Ω(\sqrt{n})$, respectively. We develop a SAT framework which allows the study of simple drawings of $K_n$. Based on the computational data we conjecture that every simple drawing of $K_n$ contains a plane Hamiltonian subgraph with $2n-3$ edges. We prove this strengthening of Rafla's conjecture for convex drawings, a rich subclass of simple drawings. Our computer experiments also led to other new challenging conjectures regarding plane substructures in simple drawings of complete graphs.
△ Less
Submitted 16 May, 2023;
originally announced May 2023.
-
Classification of social media Toxic comments using Machine learning models
Authors:
K. Poojitha,
A. Sai Charish,
M. Arun Kuamr Reddy,
S. Ayyasamy
Abstract:
The abstract outlines the problem of toxic comments on social media platforms, where individuals use disrespectful, abusive, and unreasonable language that can drive users away from discussions. This behavior is referred to as anti-social behavior, which occurs during online debates, comments, and fights. The comments containing explicit language can be classified into various categories, such as…
▽ More
The abstract outlines the problem of toxic comments on social media platforms, where individuals use disrespectful, abusive, and unreasonable language that can drive users away from discussions. This behavior is referred to as anti-social behavior, which occurs during online debates, comments, and fights. The comments containing explicit language can be classified into various categories, such as toxic, severe toxic, obscene, threat, insult, and identity hate. This behavior leads to online harassment and cyberbullying, which forces individuals to stop expressing their opinions and ideas. To protect users from offensive language, companies have started flagging comments and blocking users. The abstract proposes to create a classifier using an Lstm-cnn model that can differentiate between toxic and non-toxic comments with high accuracy. The classifier can help organizations examine the toxicity of the comment section better.
△ Less
Submitted 14 April, 2023;
originally announced April 2023.
-
The Number of Edges in Maximal 2-planar Graphs
Authors:
Michael Hoffmann,
Meghana M. Reddy
Abstract:
A graph is $2$-planar if it has local crossing number two, that is, it can be drawn in the plane such that every edge has at most two crossings. A graph is maximal $2$-planar if no edge can be added such that the resulting graph remains $2$-planar. A $2$-planar graph on $n$ vertices has at most $5n-10$ edges, and some (maximal) $2$-planar graphs -- referred to as optimal $2$-planar -- achieve this…
▽ More
A graph is $2$-planar if it has local crossing number two, that is, it can be drawn in the plane such that every edge has at most two crossings. A graph is maximal $2$-planar if no edge can be added such that the resulting graph remains $2$-planar. A $2$-planar graph on $n$ vertices has at most $5n-10$ edges, and some (maximal) $2$-planar graphs -- referred to as optimal $2$-planar -- achieve this bound. However, in strong contrast to maximal planar graphs, a maximal $2$-planar graph may have fewer than the maximum possible number of edges. In this paper, we determine the minimum edge density of maximal $2$-planar graphs by proving that every maximal $2$-planar graph on $n\ge 5$ vertices has at least $2n$ edges. We also show that this bound is tight, up to an additive constant. The lower bound is based on an analysis of the degree distribution in specific classes of drawings of the graph. The upper bound construction is verified by carefully exploring the space of admissible drawings using computer support.
△ Less
Submitted 15 March, 2023;
originally announced March 2023.
-
Data-Driven Approach to form Energy Resilient Smart Microgrids with Identification of Vulnerable Nodes in Active Electrical Distribution Network
Authors:
D Maneesh Reddy,
Divyanshi Dwivedi,
Pradeep Kumar Yemula,
Mayukha Pal
Abstract:
With the commitment to climate, globally many countries started reducing brownfield energy production and strongly opting towards green energy resources. However, the optimal allocation of distributed energy resources (DERs) in electrical distribution systems still pertains as a challenging issue to attain the maximum benefits. It happens due to the systems complex behaviour and inappropriate inte…
▽ More
With the commitment to climate, globally many countries started reducing brownfield energy production and strongly opting towards green energy resources. However, the optimal allocation of distributed energy resources (DERs) in electrical distribution systems still pertains as a challenging issue to attain the maximum benefits. It happens due to the systems complex behaviour and inappropriate integration of DERs that adversely affects the distribution grid. In this work, we propose a methodology for the optimal allocation of DERs with vulnerable node identification in active electrical distribution networks. A failure or extreme event at the vulnerable node would interrupt the power flow in the distribution network. Also, the power variation in these vulnerable nodes would significantly affect the operation of other linked nodes. Thus, these nodes are found suitable for the optimal placement of DERs. We demonstrate the proposed data-driven approach on a standard IEEE-123 bus test feeder. Initially, we partitioned the distribution system into optimal microgrids using graph theory and graph neural network (GNN) architecture. Further, using Granger causality analysis, we identified vulnerable nodes in the partitioned microgrid; suitable for DERs integration. The placement of DERs on the vulnerable nodes enhanced network reliability and resilience. Improvement in resilience is validated by computing the percolation threshold for the microgrid networks. The results show a 20.45% improvement in the resilience of the system due to the optimal allocation of DERs.
△ Less
Submitted 25 March, 2023; v1 submitted 24 August, 2022;
originally announced August 2022.
-
Battling Hateful Content in Indic Languages HASOC '21
Authors:
Aditya Kadam,
Anmol Goel,
Jivitesh Jain,
Jushaan Singh Kalra,
Mallika Subramanian,
Manvith Reddy,
Prashant Kodali,
T. H. Arjun,
Manish Shrivastava,
Ponnurangam Kumaraguru
Abstract:
The extensive rise in consumption of online social media (OSMs) by a large number of people poses a critical problem of curbing the spread of hateful content on these platforms. With the growing usage of OSMs in multiple languages, the task of detecting and characterizing hate becomes more complex. The subtle variations of code-mixed texts along with switching scripts only add to the complexity. T…
▽ More
The extensive rise in consumption of online social media (OSMs) by a large number of people poses a critical problem of curbing the spread of hateful content on these platforms. With the growing usage of OSMs in multiple languages, the task of detecting and characterizing hate becomes more complex. The subtle variations of code-mixed texts along with switching scripts only add to the complexity. This paper presents a solution for the HASOC 2021 Multilingual Twitter Hate-Speech Detection challenge by team PreCog IIIT Hyderabad. We adopt a multilingual transformer based approach and describe our architecture for all 6 subtasks as part of the challenge. Out of the 6 teams that participated in all the subtasks, our submissions rank 3rd overall.
△ Less
Submitted 5 November, 2021; v1 submitted 25 October, 2021;
originally announced October 2021.
-
Simplifying Non-Simple Fan-Planar Drawings
Authors:
Boris Klemz,
Kristin Knorr,
Meghana M. Reddy,
Felix Schröder
Abstract:
A drawing of a graph is fan-planar if the edges intersecting a common edge $a$ share a vertex $A$ on the same side of $a$. More precisely, orienting $e$ arbitrarily and the other edges towards $A$ results in a consistent orientation of the crossings. So far, fan-planar drawings have only been considered in the context of simple drawings, where any two edges share at most one point, including endpo…
▽ More
A drawing of a graph is fan-planar if the edges intersecting a common edge $a$ share a vertex $A$ on the same side of $a$. More precisely, orienting $e$ arbitrarily and the other edges towards $A$ results in a consistent orientation of the crossings. So far, fan-planar drawings have only been considered in the context of simple drawings, where any two edges share at most one point, including endpoints. We show that every non-simple fan-planar drawing can be redrawn as a simple fan-planar drawing of the same graph while not introducing additional crossings. Combined with previous results on fan-planar drawings, this yields that $n$-vertex-graphs having such a drawing can have at most $6.5n$ edges and that the recognition of such graphs is NP-hard. We thereby answer an open problem posed by Kaufmann and Ueckerdt in 2014.
△ Less
Submitted 30 August, 2021;
originally announced August 2021.
-
"A Virus Has No Religion": Analyzing Islamophobia on Twitter During the COVID-19 Outbreak
Authors:
Mohit Chandra,
Manvith Reddy,
Shradha Sehgal,
Saurabh Gupta,
Arun Balaji Buduru,
Ponnurangam Kumaraguru
Abstract:
The COVID-19 pandemic has disrupted people's lives driving them to act in fear, anxiety, and anger, leading to worldwide racist events in the physical world and online social networks. Though there are works focusing on Sinophobia during the COVID-19 pandemic, less attention has been given to the recent surge in Islamophobia. A large number of positive cases arising out of the religious Tablighi J…
▽ More
The COVID-19 pandemic has disrupted people's lives driving them to act in fear, anxiety, and anger, leading to worldwide racist events in the physical world and online social networks. Though there are works focusing on Sinophobia during the COVID-19 pandemic, less attention has been given to the recent surge in Islamophobia. A large number of positive cases arising out of the religious Tablighi Jamaat gathering has driven people towards forming anti-Muslim communities around hashtags like #coronajihad, #tablighijamaatvirus on Twitter. In addition to the online spaces, the rise in Islamophobia has also resulted in increased hate crimes in the real world. Hence, an investigation is required to create interventions. To the best of our knowledge, we present the first large-scale quantitative study linking Islamophobia with COVID-19.
In this paper, we present CoronaBias dataset which focuses on anti-Muslim hate spanning four months, with over 410,990 tweets from 244,229 unique users. We use this dataset to perform longitudinal analysis. We find the relation between the trend on Twitter with the offline events that happened over time, measure the qualitative changes in the context associated with the Muslim community, and perform macro and micro topic analysis to find prevalent topics. We also explore the nature of the content, focusing on the toxicity of the URLs shared within the tweets present in the CoronaBias dataset. Apart from the content-based analysis, we focus on user analysis, revealing that the portrayal of religion as a symbol of patriotism played a crucial role in deciding how the Muslim community was perceived during the pandemic. Through these experiments, we reveal the existence of anti-Muslim rhetoric around COVID-19 in the Indian sub-continent.
△ Less
Submitted 25 July, 2021; v1 submitted 11 July, 2021;
originally announced July 2021.
-
A (2+ε)-Approximation Algorithm for Maximum Independent Set of Rectangles
Authors:
Waldo Gálvez,
Arindam Khan,
Mathieu Mari,
Tobias Mömke,
Madhusudhan Reddy,
Andreas Wiese
Abstract:
We study the Maximum Independent Set of Rectangles (MISR) problem, where we are given a set of axis-parallel rectangles in the plane and the goal is to select a subset of non-overlapping rectangles of maximum cardinality. In a recent breakthrough, Mitchell [2021] obtained the first constant-factor approximation algorithm for MISR. His algorithm achieves an approximation ratio of 10 and it is based…
▽ More
We study the Maximum Independent Set of Rectangles (MISR) problem, where we are given a set of axis-parallel rectangles in the plane and the goal is to select a subset of non-overlapping rectangles of maximum cardinality. In a recent breakthrough, Mitchell [2021] obtained the first constant-factor approximation algorithm for MISR. His algorithm achieves an approximation ratio of 10 and it is based on a dynamic program that intuitively recursively partitions the input plane into special polygons called corner-clipped rectangles (CCRs), without intersecting certain special horizontal line segments called fences.
In this paper, we present a $(2+ε)$-approximation algorithm for MISR which is also based on a recursive partitioning scheme. First, we use a partition into a class of axis-parallel polygons with constant complexity each that are more general than CCRs. This allows us to provide an arguably simpler analysis and at the same time already improves the approximation ratio to 6. Then, using a more elaborate charging scheme and a recursive partitioning into general axis-parallel polygons with constant complexity, we improve our approximation ratio to $2+ε$. In particular, we construct a recursive partitioning based on more general fences which can be sequences of up to $O(1/ε)$ line segments each. This partitioning routine and our other new ideas may be useful for future work towards a PTAS for MISR.
△ Less
Submitted 26 September, 2021; v1 submitted 1 June, 2021;
originally announced June 2021.
-
An Extensive Analytical Approach on Human Resources using Random Forest Algorithm
Authors:
Swarajya lakshmi v papineni,
A. Mallikarjuna Reddy,
Sudeepti yarlagadda,
Snigdha Yarlagadda,
Haritha Akkinen
Abstract:
The current job survey shows that most software employees are planning to change their job role due to high pay for recent jobs such as data scientists, business analysts and artificial intelligence fields. The survey also indicated that work life imbalances, low pay, uneven shifts and many other factors also make employees think about changing their work life. In this paper, for an efficient orga…
▽ More
The current job survey shows that most software employees are planning to change their job role due to high pay for recent jobs such as data scientists, business analysts and artificial intelligence fields. The survey also indicated that work life imbalances, low pay, uneven shifts and many other factors also make employees think about changing their work life. In this paper, for an efficient organisation of the company in terms of human resources, the proposed system designed a model with the help of a random forest algorithm by considering different employee parameters. This helps the HR department retain the employee by identifying gaps and helping the organisation to run smoothly with a good employee retention ratio. This combination of HR and data science can help the productivity, collaboration and well-being of employees of the organisation. It also helps to develop strategies that have an impact on the performance of employees in terms of external and social factors.
△ Less
Submitted 7 May, 2021;
originally announced May 2021.
-
Big Data Analytics Applying the Fusion Approach of Multicriteria Decision Making with Deep Learning Algorithms
Authors:
Swarajya Lakshmi V Papineni,
Snigdha Yarlagadda,
Harita Akkineni,
A. Mallikarjuna Reddy
Abstract:
Data is evolving with the rapid progress of population and communication for various types of devices such as networks, cloud computing, Internet of Things (IoT), actuators, and sensors. The increment of data and communication content goes with the equivalence of velocity, speed, size, and value to provide the useful and meaningful knowledge that helps to solve the future challenging tasks and lat…
▽ More
Data is evolving with the rapid progress of population and communication for various types of devices such as networks, cloud computing, Internet of Things (IoT), actuators, and sensors. The increment of data and communication content goes with the equivalence of velocity, speed, size, and value to provide the useful and meaningful knowledge that helps to solve the future challenging tasks and latest issues. Besides, multicriteria based decision making is one of the key issues to solve for various issues related to the alternative effects in big data analysis. It tends to find a solution based on the latest machine learning techniques that include algorithms like decision making and deep learning mechanism based on multicriteria in providing insights to big data. On the other hand, the derivations are made for it to go with the approximations to increase the duality of runtime and improve the entire system's potentiality and efficacy. In essence, several fields, including business, agriculture, information technology, and computer science, use deep learning and multicriteria-based decision-making problems. This paper aims to provide various applications that involve the concepts of deep learning techniques and exploiting the multicriteria approaches for issues that are facing in big data analytics by proposing new studies with the fusion approaches of data-driven techniques.
△ Less
Submitted 2 February, 2021;
originally announced February 2021.
-
Local Complexity of Polygons
Authors:
Fabian Klute,
Meghana M. Reddy,
Tillmann Miltzow
Abstract:
Many problems in Discrete and Computational Geometry deal with simple polygons or polygonal regions. Many algorithms and data-structures perform considerably faster, if the underlying polygonal region has low local complexity. One obstacle to make this intuition rigorous, is the lack of a formal definition of local complexity. Here, we give two possible definitions and show how they are related in…
▽ More
Many problems in Discrete and Computational Geometry deal with simple polygons or polygonal regions. Many algorithms and data-structures perform considerably faster, if the underlying polygonal region has low local complexity. One obstacle to make this intuition rigorous, is the lack of a formal definition of local complexity. Here, we give two possible definitions and show how they are related in a combinatorial sense. We say that a polygon $P$ has point visibility width $w=pvw$, if there is no point $q\in P$ that sees more than $w$ reflex vertices. We say that a polygon $P$ has chord visibility width $w=cvw $, if there is no chord $c=\textrm{seg}(a,b)\subset P$ that sees more than w reflex vertices. We show that \[ cvw \leq pvw ^{O( pvw )},\] for any simple polygon. Furthermore, we show that there exists a simple polygon with \[ cvw \geq 2^{Ω( pvw )}.\]
△ Less
Submitted 19 January, 2021;
originally announced January 2021.
-
Capitol (Pat)riots: A comparative study of Twitter and Parler
Authors:
Hitkul,
Avinash Prabhu,
Dipanwita Guhathakurta,
Jivitesh jain,
Mallika Subramanian,
Manvith Reddy,
Shradha Sehgal,
Tanvi Karandikar,
Amogh Gulati,
Udit Arora,
Rajiv Ratn Shah,
Ponnurangam Kumaraguru
Abstract:
On 6 January 2021, a mob of right-wing conservatives stormed the USA Capitol Hill interrupting the session of congress certifying 2020 Presidential election results. Immediately after the start of the event, posts related to the riots started to trend on social media. A social media platform which stood out was a free speech endorsing social media platform Parler; it is being claimed as the platfo…
▽ More
On 6 January 2021, a mob of right-wing conservatives stormed the USA Capitol Hill interrupting the session of congress certifying 2020 Presidential election results. Immediately after the start of the event, posts related to the riots started to trend on social media. A social media platform which stood out was a free speech endorsing social media platform Parler; it is being claimed as the platform on which the riots were planned and talked about. Our report presents a contrast between the trending content on Parler and Twitter around the time of riots. We collected data from both platforms based on the trending hashtags and draw comparisons based on what are the topics being talked about, who are the people active on the platforms and how organic is the content generated on the two platforms. While the content trending on Twitter had strong resentments towards the event and called for action against rioters and inciters, Parler content had a strong conservative narrative echoing the ideas of voter fraud similar to the attacking mob. We also find a disproportionately high manipulation of traffic on Parler when compared to Twitter.
△ Less
Submitted 18 January, 2021;
originally announced January 2021.
-
AdaCrowd: Unlabeled Scene Adaptation for Crowd Counting
Authors:
Mahesh Kumar Krishna Reddy,
Mrigank Rochan,
Yiwei Lu,
Yang Wang
Abstract:
We address the problem of image-based crowd counting. In particular, we propose a new problem called unlabeled scene-adaptive crowd counting. Given a new target scene, we would like to have a crowd counting model specifically adapted to this particular scene based on the target data that capture some information about the new scene. In this paper, we propose to use one or more unlabeled images fro…
▽ More
We address the problem of image-based crowd counting. In particular, we propose a new problem called unlabeled scene-adaptive crowd counting. Given a new target scene, we would like to have a crowd counting model specifically adapted to this particular scene based on the target data that capture some information about the new scene. In this paper, we propose to use one or more unlabeled images from the target scene to perform the adaptation. In comparison with the existing problem setups (e.g. fully supervised), our proposed problem setup is closer to the real-world applications of crowd counting systems. We introduce a novel AdaCrowd framework to solve this problem. Our framework consists of a crowd counting network and a guiding network. The guiding network predicts some parameters in the crowd counting network based on the unlabeled images from a particular scene. This allows our model to adapt to different target scenes. The experimental results on several challenging benchmark datasets demonstrate the effectiveness of our proposed approach compared with other alternative methods. Code is available at https://github.com/maheshkkumar/adacrowd.
△ Less
Submitted 23 February, 2021; v1 submitted 22 October, 2020;
originally announced October 2020.
-
Sentence Guided Temporal Modulation for Dynamic Video Thumbnail Generation
Authors:
Mrigank Rochan,
Mahesh Kumar Krishna Reddy,
Yang Wang
Abstract:
We consider the problem of sentence specified dynamic video thumbnail generation. Given an input video and a user query sentence, the goal is to generate a video thumbnail that not only provides the preview of the video content, but also semantically corresponds to the sentence. In this paper, we propose a sentence guided temporal modulation (SGTM) mechanism that utilizes the sentence embedding to…
▽ More
We consider the problem of sentence specified dynamic video thumbnail generation. Given an input video and a user query sentence, the goal is to generate a video thumbnail that not only provides the preview of the video content, but also semantically corresponds to the sentence. In this paper, we propose a sentence guided temporal modulation (SGTM) mechanism that utilizes the sentence embedding to modulate the normalized temporal activations of the video thumbnail generation network. Unlike the existing state-of-the-art method that uses recurrent architectures, we propose a non-recurrent framework that is simple and allows much more parallelization. Extensive experiments and analysis on a large-scale dataset demonstrate the effectiveness of our framework.
△ Less
Submitted 31 August, 2020;
originally announced August 2020.
-
Simple Topological Drawings of $k$-Planar Graphs
Authors:
Michael Hoffmann,
Chih-Hung Liu,
Meghana M. Reddy,
Csaba D. Tóth
Abstract:
Every finite graph admits a \emph{simple (topological) drawing}, that is, a drawing where every pair of edges intersects in at most one point. However, in combination with other restrictions simple drawings do not universally exist. For instance, \emph{$k$-planar graphs} are those graphs that can be drawn so that every edge has at most $k$ crossings (i.e., they admit a \emph{$k$-plane drawing}). I…
▽ More
Every finite graph admits a \emph{simple (topological) drawing}, that is, a drawing where every pair of edges intersects in at most one point. However, in combination with other restrictions simple drawings do not universally exist. For instance, \emph{$k$-planar graphs} are those graphs that can be drawn so that every edge has at most $k$ crossings (i.e., they admit a \emph{$k$-plane drawing}). It is known that for $k\le 3$, every $k$-planar graph admits a $k$-plane simple drawing. But for $k\ge 4$, there exist $k$-planar graphs that do not admit a $k$-plane simple drawing. Answering a question by Schaefer, we show that there exists a function $f : \mathbb{N}\rightarrow\mathbb{N}$ such that every $k$-planar graph admits an $f(k)$-plane simple drawing, for all $k\in\mathbb{N}$. Note that the function $f$ depends on $k$ only and is independent of the size of the graph. Furthermore, we develop an algorithm to show that every $4$-planar graph admits an $8$-plane simple drawing.
△ Less
Submitted 24 August, 2020;
originally announced August 2020.
-
Adaptive Video Highlight Detection by Learning from User History
Authors:
Mrigank Rochan,
Mahesh Kumar Krishna Reddy,
Linwei Ye,
Yang Wang
Abstract:
Recently, there is an increasing interest in highlight detection research where the goal is to create a short duration video from a longer video by extracting its interesting moments. However, most existing methods ignore the fact that the definition of video highlight is highly subjective. Different users may have different preferences of highlight for the same input video. In this paper, we prop…
▽ More
Recently, there is an increasing interest in highlight detection research where the goal is to create a short duration video from a longer video by extracting its interesting moments. However, most existing methods ignore the fact that the definition of video highlight is highly subjective. Different users may have different preferences of highlight for the same input video. In this paper, we propose a simple yet effective framework that learns to adapt highlight detection to a user by exploiting the user's history in the form of highlights that the user has previously created. Our framework consists of two sub-networks: a fully temporal convolutional highlight detection network $H$ that predicts highlight for an input video and a history encoder network $M$ for user history. We introduce a newly designed temporal-adaptive instance normalization (T-AIN) layer to $H$ where the two sub-networks interact with each other. T-AIN has affine parameters that are predicted from $M$ based on the user history and is responsible for the user-adaptive signal to $H$. Extensive experiments on a large-scale dataset show that our framework can make more accurate and user-specific highlight predictions.
△ Less
Submitted 19 July, 2020;
originally announced July 2020.
-
Few-shot Scene-adaptive Anomaly Detection
Authors:
Yiwei Lu,
Frank Yu,
Mahesh Kumar Krishna Reddy,
Yang Wang
Abstract:
We address the problem of anomaly detection in videos. The goal is to identify unusual behaviours automatically by learning exclusively from normal videos. Most existing approaches are usually data-hungry and have limited generalization abilities. They usually need to be trained on a large number of videos from a target scene to achieve good results in that scene. In this paper, we propose a novel…
▽ More
We address the problem of anomaly detection in videos. The goal is to identify unusual behaviours automatically by learning exclusively from normal videos. Most existing approaches are usually data-hungry and have limited generalization abilities. They usually need to be trained on a large number of videos from a target scene to achieve good results in that scene. In this paper, we propose a novel few-shot scene-adaptive anomaly detection problem to address the limitations of previous approaches. Our goal is to learn to detect anomalies in a previously unseen scene with only a few frames. A reliable solution for this new problem will have huge potential in real-world applications since it is expensive to collect a massive amount of data for each target scene. We propose a meta-learning based approach for solving this new problem; extensive experimental results demonstrate the effectiveness of our proposed method.
△ Less
Submitted 15 July, 2020;
originally announced July 2020.
-
Biologically Inspired Mechanisms for Adversarial Robustness
Authors:
Manish V. Reddy,
Andrzej Banburski,
Nishka Pant,
Tomaso Poggio
Abstract:
A convolutional neural network strongly robust to adversarial perturbations at reasonable computational and performance cost has not yet been demonstrated. The primate visual ventral stream seems to be robust to small perturbations in visual stimuli but the underlying mechanisms that give rise to this robust perception are not understood. In this work, we investigate the role of two biologically p…
▽ More
A convolutional neural network strongly robust to adversarial perturbations at reasonable computational and performance cost has not yet been demonstrated. The primate visual ventral stream seems to be robust to small perturbations in visual stimuli but the underlying mechanisms that give rise to this robust perception are not understood. In this work, we investigate the role of two biologically plausible mechanisms in adversarial robustness. We demonstrate that the non-uniform sampling performed by the primate retina and the presence of multiple receptive fields with a range of receptive field sizes at each eccentricity improve the robustness of neural networks to small adversarial perturbations. We verify that these two mechanisms do not suffer from gradient obfuscation and study their contribution to adversarial robustness through ablation studies.
△ Less
Submitted 29 June, 2020;
originally announced June 2020.
-
Security and Privacy Preserving Deep Learning
Authors:
Saichethan Miriyala Reddy,
Saisree Miriyala
Abstract:
Commercial companies that collect user data on a large scale have been the main beneficiaries of this trend since the success of deep learning techniques is directly proportional to the amount of data available for training. Massive data collection required for deep learning presents obvious privacy issues. Users personal, highly sensitive data such as photos and voice recordings are kept indefini…
▽ More
Commercial companies that collect user data on a large scale have been the main beneficiaries of this trend since the success of deep learning techniques is directly proportional to the amount of data available for training. Massive data collection required for deep learning presents obvious privacy issues. Users personal, highly sensitive data such as photos and voice recordings are kept indefinitely by the companies that collect it. Users can neither delete it nor restrict the purposes for which it is used. So, data privacy has been a very important concern for governments and companies these days. It gives rise to a very interesting challenge since on the one hand, we are pushing further and further for high-quality models and accessible data, but on the other hand, we need to keep data safe from both intentional and accidental leakage. The more personal the data is it is more restricted it means some of the most important social issues cannot be addressed using machine learning because researchers do not have access to proper training data. But by learning how to machine learning that protects privacy we can make a huge difference in solving many social issues like curing disease etc. Deep neural networks are susceptible to various inference attacks as they remember information about their training data. In this chapter, we introduce differential privacy, which ensures that different kinds of statistical analyses dont compromise privacy and federated learning, training a machine learning model on a data to which we do not have access to.
△ Less
Submitted 29 June, 2020; v1 submitted 22 June, 2020;
originally announced June 2020.
-
Few-Shot Scene Adaptive Crowd Counting Using Meta-Learning
Authors:
Mahesh Kumar Krishna Reddy,
Mohammad Hossain,
Mrigank Rochan,
Yang Wang
Abstract:
We consider the problem of few-shot scene adaptive crowd counting. Given a target camera scene, our goal is to adapt a model to this specific scene with only a few labeled images of that scene. The solution to this problem has potential applications in numerous real-world scenarios, where we ideally like to deploy a crowd counting model specially adapted to a target camera. We accomplish this chal…
▽ More
We consider the problem of few-shot scene adaptive crowd counting. Given a target camera scene, our goal is to adapt a model to this specific scene with only a few labeled images of that scene. The solution to this problem has potential applications in numerous real-world scenarios, where we ideally like to deploy a crowd counting model specially adapted to a target camera. We accomplish this challenge by taking inspiration from the recently introduced learning-to-learn paradigm in the context of few-shot regime. In training, our method learns the model parameters in a way that facilitates the fast adaptation to the target scene. At test time, given a target scene with a small number of labeled data, our method quickly adapts to that scene with a few gradient updates to the learned parameters. Our extensive experimental results show that the proposed approach outperforms other alternatives in few-shot scene adaptive crowd counting. Code is available at https://github.com/maheshkkumar/fscc.
△ Less
Submitted 19 June, 2020; v1 submitted 1 February, 2020;
originally announced February 2020.
-
DNN-based cross-lingual voice conversion using Bottleneck Features
Authors:
M Kiran Reddy,
K Sreenivasa Rao
Abstract:
Cross-lingual voice conversion (CLVC) is a quite challenging task since the source and target speakers speak different languages. This paper proposes a CLVC framework based on bottleneck features and deep neural network (DNN). In the proposed method, the bottleneck features extracted from a deep auto-encoder (DAE) are used to represent speaker-independent features of speech signals from different…
▽ More
Cross-lingual voice conversion (CLVC) is a quite challenging task since the source and target speakers speak different languages. This paper proposes a CLVC framework based on bottleneck features and deep neural network (DNN). In the proposed method, the bottleneck features extracted from a deep auto-encoder (DAE) are used to represent speaker-independent features of speech signals from different languages. A DNN model is trained to learn the mapping between bottleneck features and the corresponding spectral features of the target speaker. The proposed method can capture speaker-specific characteristics of a target speaker, and hence requires no speech data from source speaker during training. The performance of the proposed method is evaluated using data from three Indian languages: Telugu, Tamil and Malayalam. The experimental results show that the proposed method outperforms the baseline Gaussian mixture model (GMM)-based CLVC approach.
△ Less
Submitted 10 September, 2019; v1 submitted 9 September, 2019;
originally announced September 2019.
-
Future Frame Prediction Using Convolutional VRNN for Anomaly Detection
Authors:
Yiwei Lu,
Mahesh Kumar Krishna Reddy,
Seyed shahabeddin Nabavi,
Yang Wang
Abstract:
Anomaly detection in videos aims at reporting anything that does not conform the normal behaviour or distribution. However, due to the sparsity of abnormal video clips in real life, collecting annotated data for supervised learning is exceptionally cumbersome. Inspired by the practicability of generative models for semi-supervised learning, we propose a novel sequential generative model based on v…
▽ More
Anomaly detection in videos aims at reporting anything that does not conform the normal behaviour or distribution. However, due to the sparsity of abnormal video clips in real life, collecting annotated data for supervised learning is exceptionally cumbersome. Inspired by the practicability of generative models for semi-supervised learning, we propose a novel sequential generative model based on variational autoencoder (VAE) for future frame prediction with convolutional LSTM (ConvLSTM). To the best of our knowledge, this is the first work that considers temporal information in future frame prediction based anomaly detection framework from the model perspective. Our experiments demonstrate that our approach is superior to the state-of-the-art methods on three benchmark datasets.
△ Less
Submitted 18 October, 2019; v1 submitted 4 September, 2019;
originally announced September 2019.
-
Multilingual and Multimode Phone Recognition System for Indian Languages
Authors:
Kumud Tripathi,
M. Kiran Reddy,
K. Sreenivasa Rao
Abstract:
The aim of this paper is to develop a flexible framework capable of automatically recognizing phonetic units present in a speech utterance of any language spoken in any mode. In this study, we considered two modes of speech: conversation, and read modes in four Indian languages, namely, Telugu, Kannada, Odia, and Bengali. The proposed approach consists of two stages: (1) Automatic speech mode clas…
▽ More
The aim of this paper is to develop a flexible framework capable of automatically recognizing phonetic units present in a speech utterance of any language spoken in any mode. In this study, we considered two modes of speech: conversation, and read modes in four Indian languages, namely, Telugu, Kannada, Odia, and Bengali. The proposed approach consists of two stages: (1) Automatic speech mode classification (SMC) and (2) Automatic phonetic recognition using mode-specific multilingual phone recognition system (MPRS). In this work, the vocal tract and excitation source features are considered for speech mode classification (SMC) task. SMC systems are developed using multilayer perceptron (MLP). Further, vocal tract, excitation source, and tandem features are used to build the deep neural network (DNN)-based MPRSs. The performance of the proposed approach is compared with mode-dependent MPRSs. Experimental results show that the proposed approach which combines both SMC and MPRS into a single system outperforms the baseline mode-dependent MPRSs.
△ Less
Submitted 23 August, 2019;
originally announced August 2019.
-
Modeling and Performance Analysis of Spatially Distributed LTE-U and Wi-Fi Networks
Authors:
Anand M. Baswade,
Mohith Reddy,
Antony Franklin A,
Bheemarjuna Reddy Tamma
Abstract:
To access an unlicensed channel Wi-Fi follows Listen Before Talk (LBT) mechanism whereas LTE-U adopts ON-OFF duty cycled mechanism to fairly share the channel with Wi-Fi. These contrasting mechanisms result in quite different performance for Wi-Fi and LTE-U based on their relative deployment and density in the environment. In this work, we present an analytical model for characterization of achiev…
▽ More
To access an unlicensed channel Wi-Fi follows Listen Before Talk (LBT) mechanism whereas LTE-U adopts ON-OFF duty cycled mechanism to fairly share the channel with Wi-Fi. These contrasting mechanisms result in quite different performance for Wi-Fi and LTE-U based on their relative deployment and density in the environment. In this work, we present an analytical model for characterization of achievable throughputs of Wi-Fi and LTE-U networks in spatially distributed high-density scenarios. The proposed model is used to study how LTE-U and Wi-Fi coexist with each other in different deployment scenarios. Our extensive simulation results prove it to be a reliable model for estimating throughput of both Wi-Fi and LTE-U. We record a very good accuracy in throughput estimation and the mean normalized error is less than 1% for 40-node scenario in which 50% of nodes belong to each of Wi-Fi and LTE-U. Finally, we use the analytical model to conduct coexistence studies of LTE-U and Wi-Fi.
△ Less
Submitted 21 July, 2019;
originally announced July 2019.
-
FPT Algorithms for Conflict-free Coloring of Graphs and Chromatic Terrain Guarding
Authors:
Akanksha Agrawal,
Pradeesha Ashok,
Meghana M Reddy,
Saket Saurabh,
Dolly Yadav
Abstract:
We present fixed parameter tractable algorithms for the conflict-free coloring problem on graphs. Given a graph $G=(V,E)$, \emph{conflict-free coloring} of $G$ refers to coloring a subset of $V$ such that for every vertex $v$, there is a color that is assigned to exactly one vertex in the closed neighborhood of $v$. The \emph{k-Conflict-free Coloring} problem is to decide whether $G$ can be confli…
▽ More
We present fixed parameter tractable algorithms for the conflict-free coloring problem on graphs. Given a graph $G=(V,E)$, \emph{conflict-free coloring} of $G$ refers to coloring a subset of $V$ such that for every vertex $v$, there is a color that is assigned to exactly one vertex in the closed neighborhood of $v$. The \emph{k-Conflict-free Coloring} problem is to decide whether $G$ can be conflict-free colored using at most $k$ colors. This problem is NP-hard even for $k=1$ and therefore under standard complexity theoretic assumptions, FPT algorithms do not exist when parameterised by the solution size. We consider the \emph{k-Conflict-free Coloring} problem parameterised by the treewidth of the graph and show that this problem is fixed parameter tractable. We also initiate the study of \emph{Strong Conflict-free Coloring} of graphs. Given a graph $G=(V,E)$, \emph{strong conflict-free coloring} of $G$ refers to coloring a subset of $V$ such that every vertex $v$ has at least one colored vertex in its closed neighborhood and moreover all the colored vertices in $v$'s neighborhood have distinct colors. We show that this problem is in FPT when parameterised by both the treewidth and the solution size. We further apply these algorithms to get efficient algorithms for a geometric problem namely the Terrain Guarding problem, when parameterised by a structural parameter.
△ Less
Submitted 6 May, 2019;
originally announced May 2019.
-
Twitter Sentiment Analysis using Distributed Word and Sentence Representation
Authors:
Dwarampudi Mahidhar Reddy,
N V Subba Reddy,
N V Subba Reddy
Abstract:
An important part of the information gathering and data analysis is to find out what people think about, either a product or an entity. Twitter is an opinion rich social networking site. The posts or tweets from this data can be used for mining people's opinions. The recent surge of activity in this area can be attributed to the computational treatment of data, which made opinion extraction and se…
▽ More
An important part of the information gathering and data analysis is to find out what people think about, either a product or an entity. Twitter is an opinion rich social networking site. The posts or tweets from this data can be used for mining people's opinions. The recent surge of activity in this area can be attributed to the computational treatment of data, which made opinion extraction and sentiment analysis easier. This paper classifies tweets into positive and negative sentiments, but instead of using traditional methods or preprocessing text data here we use the distributed representations of words and sentences to classify the tweets. We use Long Short Term Memory (LSTM) Networks, Convolutional Neural Networks (CNNs) and Artificial Neural Networks. The first two are used on Distributed Representation of words while the latter is used on the distributed representation of sentences. This paper achieves accuracies as high as 81%. It also suggests the best and optimal ways for creating distributed representations of words for sentiment analysis, out of the available methods.
△ Less
Submitted 1 April, 2019;
originally announced April 2019.
-
StartupBR: Higher Education's Influence on Social Networks and Entrepreneurship in Brazil
Authors:
Michelle Reddy,
Júlio C. Nardelli,
Yuri L. Pereira,
Marisa Vasconcelos,
Thiago H. Silva,
Leonardo B. Oliveira,
Mark Horowitz
Abstract:
Developing and middle-income countries increasingly empha-size higher education and entrepreneurship in their long-term develop-ment strategy. Our work focuses on the influence of higher education institutions (HEIs) on startup ecosystems in Brazil, an emerging economy. First, we describe regional variability in entrepreneurial network characteristics. Then we examine the influence of elite HEIs i…
▽ More
Developing and middle-income countries increasingly empha-size higher education and entrepreneurship in their long-term develop-ment strategy. Our work focuses on the influence of higher education institutions (HEIs) on startup ecosystems in Brazil, an emerging economy. First, we describe regional variability in entrepreneurial network characteristics. Then we examine the influence of elite HEIs in economic hubs on entrepreneur networks. Second, we investigate the influence ofthe academic trajectories of startup founders, including their courses of study and HEIs of origin, on the fundraising capacity of startups. Given the growing capability of social media databases such as Crunchbase and LinkedIn to provide startup and individual-level data, we draw on computational methods to mine data for social network analysis. We find that HEI quality and the maturity of the ecosystem influence startup success. Our network analysis illustrates that elite HEIs have powerful influences on local entrepreneur ecosystems. Surprisingly, while the most nationally prestigious HEIs in the South and Southeast have the longest geographical reach, their network influence still remains local.
△ Less
Submitted 29 April, 2019; v1 submitted 26 April, 2019;
originally announced April 2019.
-
Computer vision-based framework for extracting geological lineaments from optical remote sensing data
Authors:
Ehsan Farahbakhsh,
Rohitash Chandra,
Hugo K. H. Olierook,
Richard Scalzo,
Chris Clark,
Steven M. Reddy,
R. Dietmar Muller
Abstract:
The extraction of geological lineaments from digital satellite data is a fundamental application in remote sensing. The location of geological lineaments such as faults and dykes are of interest for a range of applications, particularly because of their association with hydrothermal mineralization. Although a wide range of applications have utilized computer vision techniques, a standard workflow…
▽ More
The extraction of geological lineaments from digital satellite data is a fundamental application in remote sensing. The location of geological lineaments such as faults and dykes are of interest for a range of applications, particularly because of their association with hydrothermal mineralization. Although a wide range of applications have utilized computer vision techniques, a standard workflow for application of these techniques to mineral exploration is lacking. We present a framework for extracting geological lineaments using computer vision techniques which is a combination of edge detection and line extraction algorithms for extracting geological lineaments using optical remote sensing data. It features ancillary computer vision techniques for reducing data dimensionality, removing noise and enhancing the expression of lineaments. We test the proposed framework on Landsat 8 data of a mineral-rich portion of the Gascoyne Province in Western Australia using different dimension reduction techniques and convolutional filters. To validate the results, the extracted lineaments are compared to our manual photointerpretation and geologically mapped structures by the Geological Survey of Western Australia (GSWA). The results show that the best correlation between our extracted geological lineaments and the GSWA geological lineament map is achieved by applying a minimum noise fraction transformation and a Laplacian filter. Application of a directional filter instead shows a stronger correlation with the output of our manual photointerpretation and known sites of hydrothermal mineralization. Hence, our framework using either filter can be used for mineral prospectivity mapping in other regions where faults are exposed and observable in optical remote sensing data.
△ Less
Submitted 4 October, 2018;
originally announced October 2018.
-
Dataset: Rare Event Classification in Multivariate Time Series
Authors:
Chitta Ranjan,
Mahendranath Reddy,
Markku Mustonen,
Kamran Paynabar,
Karim Pourak
Abstract:
A real-world dataset is provided from a pulp-and-paper manufacturing industry. The dataset comes from a multivariate time series process. The data contains a rare event of paper break that commonly occurs in the industry. The data contains sensor readings at regular time-intervals (x's) and the event label (y). The primary purpose of the data is thought to be building a classification model for ea…
▽ More
A real-world dataset is provided from a pulp-and-paper manufacturing industry. The dataset comes from a multivariate time series process. The data contains a rare event of paper break that commonly occurs in the industry. The data contains sensor readings at regular time-intervals (x's) and the event label (y). The primary purpose of the data is thought to be building a classification model for early prediction of the rare event. However, it can also be used for multivariate time series data exploration and building other supervised and unsupervised models.
△ Less
Submitted 31 May, 2019; v1 submitted 27 September, 2018;
originally announced September 2018.
-
A Socio-inspired CALM Approach to Channel Assignment Performance Prediction and WMN Capacity Estimation
Authors:
Srikant Manas Kala,
Vanlin Sathya,
M Pavan Kumar Reddy,
Betty Lala,
Bheemarjuna Reddy Tamma
Abstract:
A significant amount of research literature is dedicated to interference mitigation in Wireless Mesh Networks (WMNs), with a special emphasis on designing channel allocation (CA) schemes which alleviate the impact of interference on WMN performance. But having countless CA schemes at one's disposal makes the task of choosing a suitable CA for a given WMN extremely tedious and time consuming. In th…
▽ More
A significant amount of research literature is dedicated to interference mitigation in Wireless Mesh Networks (WMNs), with a special emphasis on designing channel allocation (CA) schemes which alleviate the impact of interference on WMN performance. But having countless CA schemes at one's disposal makes the task of choosing a suitable CA for a given WMN extremely tedious and time consuming. In this work, we propose a new interference estimation and CA performance prediction algorithm called CALM, which is inspired by social theory. We borrow the sociological idea of a "sui generis" social reality, and apply it to WMNs with significant success. To achieve this, we devise a novel Sociological Idea Borrowing Mechanism that facilitates easy operationalization of sociological concepts in other domains. Further, we formulate a heuristic Mixed Integer Programming (MIP) model called NETCAP which makes use of link quality estimates generated by CALM to offer a reliable framework for network capacity prediction. We demonstrate the efficacy of CALM by evaluating its theoretical estimates against experimental data obtained through exhaustive simulations on ns-3 802.11g environment, for a comprehensive CA test-set of forty CA schemes. We compare CALM with three existing interference estimation metrics, and demonstrate that it is consistently more reliable. CALM boasts of accuracy of over 90% in performance testing, and in stress testing too it achieves an accuracy of 88%, while the accuracy of other metrics drops to under 75%. It reduces errors in CA performance prediction by as much as 75% when compared to other metrics. Finally, we validate the expected network capacity estimates generated by NETCAP, and show that they are quite accurate, deviating by as low as 6.4% on an average when compared to experimentally recorded results in performance testing.
△ Less
Submitted 16 August, 2018;
originally announced August 2018.
-
"How to rate a video game?" - A prediction system for video games based on multimodal information
Authors:
Vishal Batchu,
Varshit Battu,
Murali Krishna Reddy,
Radhika Mamidi
Abstract:
Video games have become an integral part of most people's lives in recent times. This led to an abundance of data related to video games being shared online. However, this comes with issues such as incorrect ratings, reviews or anything that is being shared. Recommendation systems are powerful tools that help users by providing them with meaningful recommendations. A straightforward approach would…
▽ More
Video games have become an integral part of most people's lives in recent times. This led to an abundance of data related to video games being shared online. However, this comes with issues such as incorrect ratings, reviews or anything that is being shared. Recommendation systems are powerful tools that help users by providing them with meaningful recommendations. A straightforward approach would be to predict the scores of video games based on other information related to the game. It could be used as a means to validate user-submitted ratings as well as provide recommendations. This work provides a method to predict the G-Score, that defines how good a video game is, from its trailer (video) and summary (text). We first propose models to predict the G-Score based on the trailer alone (unimodal). Later on, we show that considering information from multiple modalities helps the models perform better compared to using information from videos alone. Since we couldn't find any suitable multimodal video game dataset, we created our own dataset named VGD (Video Game Dataset) and provide it along with this work. The approach mentioned here can be generalized to other multimodal datasets such as movie trailers and summaries etc. Towards the end, we talk about the shortcomings of the work and some methods to overcome them.
△ Less
Submitted 29 May, 2018;
originally announced May 2018.
-
A Survey of Techniques for Improving Security of GPUs
Authors:
Sparsh Mittal,
S. B. Abhinaya,
Manish Reddy,
Irfan Ali
Abstract:
Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest `link' in the security `chain'. In this paper, we present a survey of techniques for analyzing and improving GPU security. We classify the works on key attributes to highlight their similarities and diffe…
▽ More
Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest `link' in the security `chain'. In this paper, we present a survey of techniques for analyzing and improving GPU security. We classify the works on key attributes to highlight their similarities and differences. More than informing users and researchers about GPU security techniques, this survey aims to increase their awareness about GPU security vulnerabilities and potential countermeasures.
△ Less
Submitted 30 March, 2018;
originally announced April 2018.
-
A Generative Approach to Zero-Shot and Few-Shot Action Recognition
Authors:
Ashish Mishra,
Vinay Kumar Verma,
M Shiva Krishna Reddy,
Arulkumar S,
Piyush Rai,
Anurag Mittal
Abstract:
We present a generative framework for zero-shot action recognition where some of the possible action classes do not occur in the training data. Our approach is based on modeling each action class using a probability distribution whose parameters are functions of the attribute vector representing that action class. In particular, we assume that the distribution parameters for any action class in th…
▽ More
We present a generative framework for zero-shot action recognition where some of the possible action classes do not occur in the training data. Our approach is based on modeling each action class using a probability distribution whose parameters are functions of the attribute vector representing that action class. In particular, we assume that the distribution parameters for any action class in the visual space can be expressed as a linear combination of a set of basis vectors where the combination weights are given by the attributes of the action class. These basis vectors can be learned solely using labeled data from the known (i.e., previously seen) action classes, and can then be used to predict the parameters of the probability distributions of unseen action classes. We consider two settings: (1) Inductive setting, where we use only the labeled examples of the seen action classes to predict the unseen action class parameters; and (2) Transductive setting which further leverages unlabeled data from the unseen action classes. Our framework also naturally extends to few-shot action recognition where a few labeled examples from unseen classes are available. Our experiments on benchmark datasets (UCF101, HMDB51 and Olympic) show significant performance improvements as compared to various baselines, in both standard zero-shot (disjoint seen and unseen classes) and generalized zero-shot learning settings.
△ Less
Submitted 27 January, 2018;
originally announced January 2018.
-
A Generative Model For Zero Shot Learning Using Conditional Variational Autoencoders
Authors:
Ashish Mishra,
M Shiva Krishna Reddy,
Anurag Mittal,
Hema A Murthy
Abstract:
Zero shot learning in Image Classification refers to the setting where images from some novel classes are absent in the training data but other information such as natural language descriptions or attribute vectors of the classes are available. This setting is important in the real world since one may not be able to obtain images of all the possible classes at training. While previous approaches h…
▽ More
Zero shot learning in Image Classification refers to the setting where images from some novel classes are absent in the training data but other information such as natural language descriptions or attribute vectors of the classes are available. This setting is important in the real world since one may not be able to obtain images of all the possible classes at training. While previous approaches have tried to model the relationship between the class attribute space and the image space via some kind of a transfer function in order to model the image space correspondingly to an unseen class, we take a different approach and try to generate the samples from the given attributes, using a conditional variational autoencoder, and use the generated samples for classification of the unseen classes. By extensive testing on four benchmark datasets, we show that our model outperforms the state of the art, particularly in the more realistic generalized setting, where the training classes can also appear at the test time along with the novel classes.
△ Less
Submitted 27 January, 2018; v1 submitted 3 September, 2017;
originally announced September 2017.
-
Disguised Face Identification (DFI) with Facial KeyPoints using Spatial Fusion Convolutional Network
Authors:
Amarjot Singh,
Devendra Patil,
G Meghana Reddy,
SN Omkar
Abstract:
Disguised face identification (DFI) is an extremely challenging problem due to the numerous variations that can be introduced using different disguises. This paper introduces a deep learning framework to first detect 14 facial key-points which are then utilized to perform disguised face identification. Since the training of deep learning architectures relies on large annotated datasets, two annota…
▽ More
Disguised face identification (DFI) is an extremely challenging problem due to the numerous variations that can be introduced using different disguises. This paper introduces a deep learning framework to first detect 14 facial key-points which are then utilized to perform disguised face identification. Since the training of deep learning architectures relies on large annotated datasets, two annotated facial key-points datasets are introduced. The effectiveness of the facial keypoint detection framework is presented for each keypoint. The superiority of the key-point detection framework is also demonstrated by a comparison with other deep networks. The effectiveness of classification performance is also demonstrated by comparison with the state-of-the-art face disguise classification methods.
△ Less
Submitted 30 August, 2017;
originally announced August 2017.
-
Enhancing Channel Assignment Performance in Wireless Mesh Networks Through Interference Mitigation Functions
Authors:
Mule Pavan Kumar Reddy,
Srikant Manas Kala,
Bheemarjuna Reddy Tamma
Abstract:
The notion of Total Interference Degree (TID) is traditionally used to estimate the intensity of prevalent interference in a Multi-RadioMulti-ChannelWirelessMesh Network (MRMC WMN). Numerous Channel Assignment (CA) approaches, linkscheduling algorithms and routing schemes have been proposed for WMNs which rely entirely on the concept of TID estimates. They focus on minimizing TID to create a minim…
▽ More
The notion of Total Interference Degree (TID) is traditionally used to estimate the intensity of prevalent interference in a Multi-RadioMulti-ChannelWirelessMesh Network (MRMC WMN). Numerous Channel Assignment (CA) approaches, linkscheduling algorithms and routing schemes have been proposed for WMNs which rely entirely on the concept of TID estimates. They focus on minimizing TID to create a minimal interference scenario for the network. In our prior works [1] and [2], we have questioned the efficacy of TID estimate and then proposed two reliable interference estimation metrics viz., Channel Distribution Across Links Cost (CDALcost) and Cumulative X-Link-Set Weight (CXLSwt). In this work, we assess the ability of these interference estimation metrics to replace TID as the interferenceminimizing factor in a CA scheme implemented on a grid MRMC WMN. We carry out a comprehensive evaluation on ns-3 and then conclude from the results that the performance of the network increases by 10-15% when the CA scheme uses CXLSwt as the underlying Interference Mitigation Function (IMF) when compared with CA using TID as IMF. We also confirm that CDALcost is not a better IMF than TID and CXLSwt.
△ Less
Submitted 7 September, 2016;
originally announced September 2016.
-
Evaluation of Channel Assignment Performance Prediction Techniques in Random Wireless Mesh Networks
Authors:
M Pavan Kumar Reddy,
Srikant Manas Kala,
Bheemarjuna Reddy Tamma
Abstract:
Performance of wireless mesh networks (WMNs) in terms of network capacity, end-to-end latency, and network resilience depends upon the prevalent levels of interference. Thus, interference alleviation is a fundamental design concern in multi-radio multi-channel (MRMC) WMNs, and is achieved through a judicious channel assignment (CA) to the radios in a WMN. In our earlier works we have tried to addr…
▽ More
Performance of wireless mesh networks (WMNs) in terms of network capacity, end-to-end latency, and network resilience depends upon the prevalent levels of interference. Thus, interference alleviation is a fundamental design concern in multi-radio multi-channel (MRMC) WMNs, and is achieved through a judicious channel assignment (CA) to the radios in a WMN. In our earlier works we have tried to address the problem of estimating the intensity of interference in a wireless network and predicting the performance of CA schemes based on the measure of the interference estimate. We have proposed reliable CA performance prediction approaches which have proven effective in grid WMNs. In this work, we further assess the reliability of these CA performance prediction techniques in a large MRMC WMN which comprises of randomly placed mesh routers. We perform exhaustive simulations on an ns-3 802.11n environment. We obtain conclusive results to demonstrate the efficacy of proposed schemes in random WMNs as well.
△ Less
Submitted 17 November, 2015; v1 submitted 15 November, 2015;
originally announced November 2015.
-
Listing All Spanning Trees in Halin Graphs - Sequential and Parallel view
Authors:
K. Krishna Mohan Reddy,
P. Renjith,
N. Sadagopan
Abstract:
For a connected labelled graph $G$, a {\em spanning tree} $T$ is a connected and an acyclic subgraph that spans all vertices of $G$. In this paper, we consider a classical combinatorial problem which is to list all spanning trees of $G$. A Halin graph is a graph obtained from a tree with no degree two vertices and by joining all leaves with a cycle. We present a sequential and parallel algorithm t…
▽ More
For a connected labelled graph $G$, a {\em spanning tree} $T$ is a connected and an acyclic subgraph that spans all vertices of $G$. In this paper, we consider a classical combinatorial problem which is to list all spanning trees of $G$. A Halin graph is a graph obtained from a tree with no degree two vertices and by joining all leaves with a cycle. We present a sequential and parallel algorithm to enumerate all spanning trees in Halin graphs. Our approach enumerates without repetitions and we make use of $O((2pd)^{p})$ processors for parallel algorithmics, where $d$ and $p$ are the depth, the number of leaves, respectively, of the Halin graph. We also prove that the number of spanning trees in Halin graphs is $O((2pd)^{p})$.
△ Less
Submitted 20 July, 2016; v1 submitted 5 November, 2015;
originally announced November 2015.
-
Reliable Prediction of Channel Assignment Performance in Wireless Mesh Networks
Authors:
Srikant Manas Kala,
Ranadheer Musham,
M Pavan Kumar Reddy,
Bheemarjuna Reddy Tamma
Abstract:
The advancements in wireless mesh networks (WMN), and the surge in multi-radio multi-channel (MRMC) WMN deployments have spawned a multitude of network performance issues. These issues are intricately linked to the adverse impact of endemic interference. Thus, interference mitigation is a primary design objective in WMNs. Interference alleviation is often effected through efficient channel allocat…
▽ More
The advancements in wireless mesh networks (WMN), and the surge in multi-radio multi-channel (MRMC) WMN deployments have spawned a multitude of network performance issues. These issues are intricately linked to the adverse impact of endemic interference. Thus, interference mitigation is a primary design objective in WMNs. Interference alleviation is often effected through efficient channel allocation (CA) schemes which fully utilize the potential of MRMC environment and also restrain the detrimental impact of interference. However, numerous CA schemes have been proposed in research literature and there is a lack of CA performance prediction techniques which could assist in choosing a suitable CA for a given WMN. In this work, we propose a reliable interference estimation and CA performance prediction approach. We demonstrate its efficacy by substantiating the CA performance predictions for a given WMN with experimental data obtained through rigorous simulations on an ns-3 802.11g environment.
△ Less
Submitted 14 August, 2015;
originally announced August 2015.
-
Predicting Performance of Channel Assignments in Wireless Mesh Networks through Statistical Interference Estimation
Authors:
Srikant Manas Kala,
M. Pavan Kumar Reddy,
Bheemarjuna Reddy Tamma
Abstract:
Wireless Mesh Network (WMN) deployments are poised to reduce the reliance on wired infrastructure especially with the advent of the multi-radio multi-channel (MRMC) WMN architecture. But the benefits that MRMC WMNs offer viz., augmented network capacity, uninterrupted connectivity and reduced latency, are depreciated by the detrimental effect of prevalent interference. Interference mitigation is t…
▽ More
Wireless Mesh Network (WMN) deployments are poised to reduce the reliance on wired infrastructure especially with the advent of the multi-radio multi-channel (MRMC) WMN architecture. But the benefits that MRMC WMNs offer viz., augmented network capacity, uninterrupted connectivity and reduced latency, are depreciated by the detrimental effect of prevalent interference. Interference mitigation is thus a prime objective in WMN deployments. It is often accomplished through prudent channel allocation (CA) schemes which minimize the adverse impact of interference and enhance the network performance. However, a multitude of CA schemes have been proposed in research literature and absence of a CA performance prediction metric, which could aid in the selection of an efficient CA scheme for a given WMN, is often felt. In this work, we offer a fresh characterization of the interference endemic in wireless networks. We then propose a reliable CA performance prediction metric, which employs a statistical interference estimation approach. We carry out a rigorous quantitative assessment of the proposed metric by validating its CA performance predictions with experimental results, recorded from extensive simulations run on an ns-3 802.11g environment.
△ Less
Submitted 28 June, 2015; v1 submitted 30 March, 2015;
originally announced March 2015.