Zum Hauptinhalt springen

Showing 1–42 of 42 results for author: Chaturvedi, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18256  [pdf, other

    cs.CL

    LLaMIPa: An Incremental Discourse Parser

    Authors: Kate Thompson, Akshay Chaturvedi, Julie Hunter, Nicholas Asher

    Abstract: This paper provides the first discourse parsing experiments with a large language model (LLM) finetuned on corpora annotated in the style of SDRT (Asher, 1993; Asher and Lascarides, 2003). The result is a discourse parser, LLaMIPa (LLaMA Incremental Parser), which is able to more fully exploit discourse context, leading to substantial performance gains over approaches that use encoder-only models… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

    Comments: 12 pages, 2 figures

  2. arXiv:2406.18164  [pdf, other

    cs.CL cs.LG

    NeBuLa: A discourse aware Minecraft Builder

    Authors: Akshay Chaturvedi, Kate Thompson, Nicholas Asher

    Abstract: When engaging in collaborative tasks, humans efficiently exploit the semantic structure of a conversation to optimize verbal and nonverbal interactions. But in recent "language to code" or "language to action" models, this information is lacking. We show how incorporating the prior discourse and nonlinguistic context of a conversation situated in a nonlinguistic environment can improve the "langua… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

    Comments: 10 pages, 3 figures

  3. arXiv:2405.20115  [pdf, other

    quant-ph cs.IT

    Monogamy of nonlocality from multipartite information causality

    Authors: Lucas Pollyceno, Anubhav Chaturvedi, Chithra Raj, Pedro R. Dieguez, Marcin Pawłowski

    Abstract: The monogamy of nonlocality is one the most intriguing and cryptographically significant predictions of quantum theory. The physical principle of information causality offers a promising means to understand and restrict the extent of nonlocality without invoking the abstract mathematical formalism of quantum theory. In this article, we demonstrate that the original bipartite formulation of informa… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: First draft, comments are welcome!

  4. arXiv:2403.19299  [pdf, other

    cs.CR quant-ph

    Post Quantum Cryptography and its Comparison with Classical Cryptography

    Authors: Tanmay Tripathi, Abhinav Awasthi, Shaurya Pratap Singh, Atul Chaturvedi

    Abstract: Cryptography plays a pivotal role in safeguarding sensitive information and facilitating secure communication. Classical cryptography relies on mathematical computations, whereas quantum cryptography operates on the principles of quantum mechanics, offering a new frontier in secure communication. Quantum cryptographic systems introduce novel dimensions to security, capable of detecting and thwarti… ▽ More

    Submitted 28 March, 2024; originally announced March 2024.

  5. arXiv:2402.10988  [pdf, ps, other

    quant-ph cs.CR

    Cryptography: Classical versus Post-Quantum

    Authors: Abhinav Awasthi, Atul Chaturvedi

    Abstract: The advantages of post-quantum cryptography over classical cryptography are covered in this survey. We address several post-quantum cryptography techniques. We conclude that the deployment of quantum-safe cryptographic systems is anticipated to be the future of secure communication, and that the development of post-quantum cryptography is essential to guarantee the security of sensitive informatio… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

  6. arXiv:2402.10576  [pdf, ps, other

    cs.CR

    Post-Quantum Cryptography

    Authors: Pranjal, Atul Chaturvedi

    Abstract: In this survey we propose to cover the prose of post-quantum cryptography over classical cryptography. We talk about the various cryptographic methods that are being practiced to safeguard our information. The future of secure communication is expected to be the implementation of quantum-safe cryptographic systems, and that in the post-quantum era, the development of post-quantum cryptography is e… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

  7. arXiv:2306.12213  [pdf, ps, other

    cs.CL

    Limits for Learning with Language Models

    Authors: Nicholas Asher, Swarnadeep Bhar, Akshay Chaturvedi, Julie Hunter, Soumya Paul

    Abstract: With the advent of large language models (LLMs), the trend in NLP has been to train LLMs on vast amounts of data to solve diverse language understanding and generation tasks. The list of LLM successes is long and varied. Nevertheless, several recent papers provide empirical evidence that LLMs fail to capture important aspects of linguistic meaning. Focusing on universal quantification, we provide… ▽ More

    Submitted 21 June, 2023; originally announced June 2023.

  8. minOffense: Inter-Agreement Hate Terms for Stable Rules, Concepts, Transitivities, and Lattices

    Authors: Animesh Chaturvedi, Rajesh Sharma

    Abstract: Hate speech classification has become an important problem due to the spread of hate speech on social media platforms. For a given set of Hate Terms lists (HTs-lists) and Hate Speech data (HS-data), it is challenging to understand which hate term contributes the most for hate speech classification. This paper contributes two approaches to quantitatively measure and qualitatively visualise the rela… ▽ More

    Submitted 29 May, 2023; originally announced May 2023.

    Comments: IEEE 9th International Conference on Data Science and Advanced Analytics (DSAA), October 13-16, 2022, Shenzhen, China. IEEE, 2022. (Core A)

    MSC Class: https://www.youtube.com/watch?v=iRGXiJGp3Cc&list=PLtvWi5o3JBnF3yxcjGdT4KCDLxRBIpsyR

  9. Analyzing Semantic Faithfulness of Language Models via Input Intervention on Question Answering

    Authors: Akshay Chaturvedi, Swarnadeep Bhar, Soumadeep Saha, Utpal Garain, Nicholas Asher

    Abstract: Transformer-based language models have been shown to be highly effective for several NLP tasks. In this paper, we consider three transformer models, BERT, RoBERTa, and XLNet, in both small and large versions, and investigate how faithful their representations are with respect to the semantic content of texts. We formalize a notion of semantic faithfulness, in which the semantic content of a text s… ▽ More

    Submitted 30 November, 2023; v1 submitted 20 December, 2022; originally announced December 2022.

    Journal ref: Computational Linguistics (2023)

  10. arXiv:2210.17028  [pdf, other

    cs.LG

    Improved Learning-augmented Algorithms for k-means and k-medians Clustering

    Authors: Thy Nguyen, Anamay Chaturvedi, Huy Lê Nguyen

    Abstract: We consider the problem of clustering in the learning-augmented setting, where we are given a data set in $d$-dimensional Euclidean space, and a label for each data point given by an oracle indicating what subsets of points should be clustered together. This setting captures situations where we have access to some auxiliary information about the data set relevant for our clustering objective, for… ▽ More

    Submitted 1 March, 2023; v1 submitted 30 October, 2022; originally announced October 2022.

  11. arXiv:2210.15965  [pdf

    cs.AI cs.SE

    System Network Analytics: Evolution and Stable Rules of a State Series

    Authors: Animesh Chaturvedi, Aruna Tiwari, Nicolas Spyratos

    Abstract: System Evolution Analytics on a system that evolves is a challenge because it makes a State Series SS = {S1, S2... SN} (i.e., a set of states ordered by time) with several inter-connected entities changing over time. We present stability characteristics of interesting evolution rules occurring in multiple states. We defined an evolution rule with its stability as the fraction of states in which th… ▽ More

    Submitted 28 October, 2022; originally announced October 2022.

    Comments: Accepted on IEEE DSAA and Video Presentation https://www.youtube.com/watch?v=ohOeTXoI-IY&list=PLtvWi5o3JBnF3yxcjGdT4KCDLxRBIpsyR

    Journal ref: IEEE 9th International Conference on Data Science and Advanced Analytics (DSAA), October 13-16, 2022, Shenzhen, China. IEEE, 2022. (Core A)

  12. arXiv:2210.14315  [pdf, ps, other

    cs.LG cs.CR cs.DS stat.ML

    Streaming Submodular Maximization with Differential Privacy

    Authors: Anamay Chaturvedi, Huy Lê Nguyen, Thy Nguyen

    Abstract: In this work, we study the problem of privately maximizing a submodular function in the streaming setting. Extensive work has been done on privately maximizing submodular functions in the general case when the function depends upon the private data of individuals. However, when the size of the data stream drawn from the domain of the objective function is large or arrives very fast, one must priva… ▽ More

    Submitted 25 October, 2022; originally announced October 2022.

  13. arXiv:2210.08316  [pdf, other

    cs.SE cs.AI cs.LG

    Call Graph Evolution Analytics over a Version Series of an Evolving Software System

    Authors: Animesh Chaturvedi

    Abstract: Call Graph evolution analytics can aid a software engineer when maintaining or evolving a software system. This paper proposes Call Graph Evolution Analytics to extract information from an evolving call graph ECG = CG_1, CG_2,... CG_N for their version series VS = V_1, V_2, ... V_N of an evolving software system. This is done using Call Graph Evolution Rules (CGERs) and Call Graph Evolution Subgra… ▽ More

    Submitted 15 October, 2022; originally announced October 2022.

  14. arXiv:2208.03609  [pdf, other

    eess.IV cs.CV cs.LG

    Continual Learning for Tumor Classification in Histopathology Images

    Authors: Veena Kaustaban, Qinle Ba, Ipshita Bhattacharya, Nahil Sobh, Satarupa Mukherjee, Jim Martin, Mohammad Saleh Miri, Christoph Guetter, Amal Chaturvedi

    Abstract: Recent years have seen great advancements in the development of deep learning models for histopathology image analysis in digital pathology applications, evidenced by the increasingly common deployment of these models in both research and clinical settings. Although such models have shown unprecedented performance in solving fundamental computational tasks in DP applications, they suffer from cata… ▽ More

    Submitted 6 August, 2022; originally announced August 2022.

    Comments: Accepted by MOVI, a MICCAI2022 workshop: https://sites.google.com/view/movi2022

  15. arXiv:2203.12606  [pdf

    q-fin.GN cs.CR

    Journey of Cryptocurrency in India In View of Financial Budget 2022-23

    Authors: Varun Shukla, Manoj Kumar Misra, Atul Chaturvedi

    Abstract: Recently, Indian Finance minister Nirmala Sitharaman announced in Union budget 2022-23 that Indian government will put 30% tax (the highest tax slab in India) on income generated from cryptocurrencies. Big financial institutions, experts and academicians have different opinions in this regard. They claim that it would be the end of cryptocurrency market in India or it would be possible that RBI (R… ▽ More

    Submitted 4 February, 2022; originally announced March 2022.

  16. arXiv:2202.10611  [pdf, ps, other

    cs.IT math.ST

    Universal 1-Bit Compressive Sensing for Bounded Dynamic Range Signals

    Authors: Sidhant Bansal, Arnab Bhattacharyya, Anamay Chaturvedi, Jonathan Scarlett

    Abstract: A {\em universal 1-bit compressive sensing (CS)} scheme consists of a measurement matrix $A$ such that all signals $x$ belonging to a particular class can be approximately recovered from $\textrm{sign}(Ax)$. 1-bit CS models extreme quantization effects where only one bit of information is revealed per measurement. We focus on universal support recovery for 1-bit CS in the case of {\em sparse} sign… ▽ More

    Submitted 18 May, 2022; v1 submitted 21 February, 2022; originally announced February 2022.

    Comments: Extended version of ISIT 2022 paper

  17. arXiv:2201.03380  [pdf, other

    cs.DS cs.CR cs.DB

    Bounded Space Differentially Private Quantiles

    Authors: Daniel Alabi, Omri Ben-Eliezer, Anamay Chaturvedi

    Abstract: Estimating the quantiles of a large dataset is a fundamental problem in both the streaming algorithms literature and the differential privacy literature. However, all existing private mechanisms for distribution-independent quantile computation require space at least linear in the input size $n$. In this work, we devise a differentially private algorithm for the quantile estimation problem, with s… ▽ More

    Submitted 10 January, 2022; originally announced January 2022.

  18. arXiv:2105.15007  [pdf, ps, other

    cs.DS cs.CR cs.LG

    Locally Private $k$-Means Clustering with Constant Multiplicative Approximation and Near-Optimal Additive Error

    Authors: Anamay Chaturvedi, Matthew Jones, Huy L. Nguyen

    Abstract: Given a data set of size $n$ in $d'$-dimensional Euclidean space, the $k$-means problem asks for a set of $k$ points (called centers) so that the sum of the $\ell_2^2$-distances between points of a given data set of size $n$ and the set of $k$ centers is minimized. Recent work on this problem in the locally private setting achieves constant multiplicative approximation with additive error… ▽ More

    Submitted 31 May, 2021; originally announced May 2021.

    Comments: 61 pages

  19. arXiv:2009.03988  [pdf, other

    cs.HC eess.SP

    A new architecture for hand-worn Sign language to Speech translator

    Authors: Sai Charan Bodda, Palki Gupta, Gaurav Joshi, Ayush Chaturvedi

    Abstract: People with speech and hearing impairments often rely on sign language to communicate with others but most of the general population cannot understand sign language and sign language itself is a difficult language to learn, so there is a definite need for technologies to translate sign language to speech. In this paper, we describe the design and implementation of Smart glove, a hand-worn hardware… ▽ More

    Submitted 8 September, 2020; originally announced September 2020.

    Comments: 9 pages, 5 figures, research done as part of Samsung electronics

  20. arXiv:2009.01220  [pdf, ps, other

    cs.DS cs.CR cs.LG

    Differentially private $k$-means clustering via exponential mechanism and max cover

    Authors: Anamay Chaturvedi, Huy Nguyen, Eric Xu

    Abstract: We introduce a new $(ε_p, δ_p)$-differentially private algorithm for the $k$-means clustering problem. Given a dataset in Euclidean space, the $k$-means clustering problem requires one to find $k$ points in that space such that the sum of squares of Euclidean distances between each data point and its closest respective point among the $k$ returned is minimised. Although there exist privacy-preserv… ▽ More

    Submitted 2 September, 2020; originally announced September 2020.

  21. Pick-Object-Attack: Type-Specific Adversarial Attack for Object Detection

    Authors: Omid Mohamad Nezami, Akshay Chaturvedi, Mark Dras, Utpal Garain

    Abstract: Many recent studies have shown that deep neural models are vulnerable to adversarial samples: images with imperceptible perturbations, for example, can fool image classifiers. In this paper, we present the first type-specific approach to generating adversarial examples for object detection, which entails detecting bounding boxes around multiple objects present in the image and classifying them at… ▽ More

    Submitted 21 August, 2021; v1 submitted 4 June, 2020; originally announced June 2020.

  22. arXiv:2005.14717  [pdf, ps, other

    cs.LG cs.CR cs.DS stat.ML

    Differentially Private Decomposable Submodular Maximization

    Authors: Anamay Chaturvedi, Huy Nguyen, Lydia Zakynthinou

    Abstract: We study the problem of differentially private constrained maximization of decomposable submodular functions. A submodular function is decomposable if it takes the form of a sum of submodular functions. The special case of maximizing a monotone, decomposable submodular function under cardinality constraints is known as the Combinatorial Public Projects (CPP) problem [Papadimitriou et al., 2008]. P… ▽ More

    Submitted 29 May, 2020; originally announced May 2020.

  23. arXiv:2005.04533  [pdf, other

    cs.DS

    Improved Throughput for All-or-Nothing Multicommodity Flows with Arbitrary Demands

    Authors: Anya Chaturvedi, Chandra Chekuri, Mengxue Liu, Andréa W. Richa, Mattias Rost, Stefan Schmid, Jamison Weber

    Abstract: Throughput is a main performance objective in communication networks. This paper considers a fundamental maximum throughput routing problem -- the all-or-nothing multicommodity flow (ANF) problem -- in arbitrary directed graphs and in the practically relevant but challenging setting where demands can be (much) larger than the edge capacities. Hence, in addition to assigning requests to valid flows… ▽ More

    Submitted 25 July, 2022; v1 submitted 9 May, 2020; originally announced May 2020.

  24. arXiv:2002.08663  [pdf, ps, other

    stat.ML cs.IT cs.LG math.ST

    Learning Gaussian Graphical Models via Multiplicative Weights

    Authors: Anamay Chaturvedi, Jonathan Scarlett

    Abstract: Graphical model selection in Markov random fields is a fundamental problem in statistics and machine learning. Two particularly prominent models, the Ising model and Gaussian model, have largely developed in parallel using different (though often related) techniques, and several practical algorithms with rigorous sample complexity bounds have been established for each. In this paper, we adapt a re… ▽ More

    Submitted 24 February, 2020; v1 submitted 20 February, 2020; originally announced February 2020.

    Comments: AISTATS 2020

  25. arXiv:1908.01165  [pdf, ps, other

    cs.LG cs.CL cs.CR stat.ML

    Exploring the Robustness of NMT Systems to Nonsensical Inputs

    Authors: Akshay Chaturvedi, Abijith KP, Utpal Garain

    Abstract: Neural machine translation (NMT) systems have been shown to give undesirable translation when a small change is made in the source sentence. In this paper, we study the behaviour of NMT systems when multiple changes are made to the source sentence. In particular, we ask the following question "Is it possible for an NMT system to predict same translation even when multiple words in the source sente… ▽ More

    Submitted 28 February, 2020; v1 submitted 3 August, 2019; originally announced August 2019.

  26. Mimic and Fool: A Task Agnostic Adversarial Attack

    Authors: Akshay Chaturvedi, Utpal Garain

    Abstract: At present, adversarial attacks are designed in a task-specific fashion. However, for downstream computer vision tasks such as image captioning, image segmentation etc., the current deep learning systems use an image classifier like VGG16, ResNet50, Inception-v3 etc. as a feature extractor. Keeping this in mind, we propose Mimic and Fool, a task agnostic adversarial attack. Given a feature extract… ▽ More

    Submitted 12 April, 2020; v1 submitted 11 June, 2019; originally announced June 2019.

    Journal ref: IEEE Transactions on Neural Networks and Learning Systems (2020)

  27. arXiv:1809.01706  [pdf, ps, other

    stat.ML cs.LG

    A Limitation of V-Matrix based Methods

    Authors: Niharika Gauraha, Akshay Chaturvedi

    Abstract: To estimate the conditional probability functions based on the direct problem setting, V-matrix based method was proposed. We construct V-matrix based constrained quadratic programming problems for which the inequality constraints are inconsistent. In particular, we would like to present that the constrained quadratic optimization problem for conditional probability estimation using V-matrix metho… ▽ More

    Submitted 27 August, 2018; originally announced September 2018.

  28. arXiv:1808.06428  [pdf, other

    cs.CV

    CapsDeMM: Capsule network for Detection of Munro's Microabscess in skin biopsy images

    Authors: Anabik Pal, Akshay Chaturvedi, Utpal Garain, Aditi Chandra, Raghunath Chatterjee, Swapan Senapati

    Abstract: This paper presents an approach for automatic detection of Munro's Microabscess in stratum corneum (SC) of human skin biopsy in order to realize a machine assisted diagnosis of Psoriasis. The challenge of detecting neutrophils in presence of nucleated cells is solved using the recent advances of deep learning algorithms. Separation of SC layer, extraction of patches from the layer followed by clas… ▽ More

    Submitted 21 August, 2018; v1 submitted 20 August, 2018; originally announced August 2018.

    Comments: Accepted at MICCAI 2018

  29. arXiv:1707.00506  [pdf

    cs.IR cs.LG

    Recommender System for News Articles using Supervised Learning

    Authors: Akshay Kumar Chaturvedi, Filipa Peleja, Ana Freire

    Abstract: In the last decade we have observed a mass increase of information, in particular information that is shared through smartphones. Consequently, the amount of information that is available does not allow the average user to be aware of all his options. In this context, recommender systems use a number of techniques to help a user find the desired product. Hence, nowadays recommender systems play an… ▽ More

    Submitted 3 July, 2017; originally announced July 2017.

    Comments: 36 pages

  30. Random access codes and non-local resources

    Authors: Anubhav Chaturvedi, Marcin Pawlowski, Karol Horodecki

    Abstract: It is known that a PR-BOX (PR), a non-local resource and $(2\rightarrow 1)$ random access code (RAC), a functionality (wherein Alice encodes 2 bits into 1 bit message and Bob learns one of randomly chosen Alice's inputs) are equivalent under the no-signaling condition. In this work we introduce generalizations to PR and $(2\rightarrow 1)$ RAC and study their inter-convertibility. We introduce gene… ▽ More

    Submitted 6 October, 2016; v1 submitted 4 October, 2016; originally announced October 2016.

    Comments: 17 pages, 6 figures

    Journal ref: Phys. Rev. A 96, 022125 (2017)

  31. arXiv:1607.05490  [pdf, ps, other

    quant-ph cs.IT

    Parity Oblivious d-Level Random Access Codes and Class of Noncontextuality Inequalities

    Authors: Andris Ambainis, Manik Banik, Anubhav Chaturvedi, Dmitry Kravchenko, Ashutosh Rai

    Abstract: One of the fundamental results in quantum foundations is the Kochen-Specker no-go theorem. For the quantum theory, the no-go theorem excludes the possibility of a class of hidden variable models where value attribution is context independent. Recently, the notion of contextuality has been generalized for different operational procedures and it has been shown that preparation contextuality of mixed… ▽ More

    Submitted 19 July, 2016; originally announced July 2016.

    Comments: 5+3 pages; no figure

  32. Iterative Matrix Inversion Based Low Complexity Detection in Large/Massive MIMO Systems

    Authors: Vipul Gupta, Abhay Kumar Sah, A. K. Chaturvedi

    Abstract: Linear detectors such as zero forcing (ZF) or minimum mean square error (MMSE) are imperative for large/massive MIMO systems for both the downlink and uplink scenarios. However these linear detectors require matrix inversion which is computationally expensive for such huge systems. In this paper, we assert that calculating an exact inverse is not necessary to find the ZF/MMSE solution and an appro… ▽ More

    Submitted 19 December, 2015; v1 submitted 8 September, 2015; originally announced September 2015.

    Comments: 6 pages, 7 figures, submitted to Proc. of the IEEE International Conference on Communications (ICC) Workshop on 5G RAN Design 2016, Kuala Lumpur, Malaysia

  33. arXiv:1507.00138  [pdf, ps, other

    cs.IT

    Low Complexity Opportunistic Interference Alignment in $K$-Transmitter MIMO Interference Channels

    Authors: Atul Kumar Sinha, A. K. Chaturvedi

    Abstract: In this paper, we propose low complexity opportunistic methods for interference alignment in $K$-transmitter MIMO interference channels by exploiting multiuser diversity. We do not assume availability of channel state information (CSI) at the transmitters. Receivers are required to feed back analog values indicating the extent to which the received interference subspaces are aligned. The proposed… ▽ More

    Submitted 29 September, 2015; v1 submitted 1 July, 2015; originally announced July 2015.

    Comments: 8 pages, 8 figures, typos corrected, some clarifications added in 'Performance Comparison'

  34. arXiv:1408.1600  [pdf

    cs.SE cs.AI cs.DC

    Change Impact Analysis Based Regression Testing of Web Services

    Authors: Animesh Chaturvedi

    Abstract: Reducing the effort required to make changes in web services is one of the primary goals in web service projects maintenance and evolution. Normally, functional and non-functional testing of a web service is performed by testing the operations specified in its WSDL. The regression testing is performed by identifying the changes made thereafter to the web service code and the WSDL. In this thesis,… ▽ More

    Submitted 7 August, 2014; originally announced August 2014.

    Comments: Master of Technology Thesis, PDPM Indian Institute of Information Technology, Design and Manufacturing Jabalpur (2014)

  35. arXiv:1312.4793  [pdf, other

    cs.CR

    Cryptanalysis and Improvement of Jiang et al.'s Smart Card Based Remote User Authentication Scheme

    Authors: Dheerendra Mishra, Ankita Chaturvedi, Sourav Mukhopadhyay

    Abstract: The smart card based authentication protocols try to ensure secure and authorized communication between remote entities. In 2012, Wei et al. presented an improvement of Wu et al.'s two-factor authentication scheme for TMIS which is proven vulnerable to off-line password guessing attack by Zhu. Zhu also proposed a modified scheme to overcome with weakness of Wei et al.'s scheme, although Lee and Li… ▽ More

    Submitted 17 December, 2013; originally announced December 2013.

  36. Conditional Entropy based User Selection for Multiuser MIMO Systems

    Authors: Gaurav Gupta, A. K. Chaturvedi

    Abstract: We consider the problem of user subset selection for maximizing the sum rate of downlink multi-user MIMO systems. The brute-force search for the optimal user set becomes impractical as the total number of users in a cell increase. We propose a user selection algorithm based on conditional differential entropy. We apply the proposed algorithm on Block diagonalization scheme. Simulation results show… ▽ More

    Submitted 29 October, 2013; originally announced October 2013.

    Comments: 4 pages, 3 figures

    Journal ref: IEEE Commun. Lett. 17 8 (2013) 1628-1631

  37. User Selection in MIMO Interfering Broadcast Channels

    Authors: Gaurav Gupta, Ajit K Chaturvedi

    Abstract: Interference alignment aims to achieve maximum degrees of freedom in an interference system. For achieving Interference alignment in interfering broadcast systems a closed-form solution is proposed in [1] which is an extension of the grouping scheme in [2]. In a downlink scenario where there are a large number of users, the base station is required to select a subset of users such that the sum rat… ▽ More

    Submitted 19 June, 2014; v1 submitted 28 October, 2013; originally announced October 2013.

    Comments: 9 pages, 5 figures

    Journal ref: IEEE Trans. Commun. 62 5 (2014) 1568-1576

  38. arXiv:1205.3966  [pdf

    cs.AI cs.CV

    Neural Networks for Handwritten English Alphabet Recognition

    Authors: Yusuf Perwej, Ashish Chaturvedi

    Abstract: This paper demonstrates the use of neural networks for developing a system that can recognize hand-written English alphabets. In this system, each English alphabet is represented by binary values that are used as input to a simple feature extraction system, whose output is fed to our neural network system.

    Submitted 17 May, 2012; originally announced May 2012.

    Comments: 5 pages, 3 Figure, ISSN:0975 - 8887

    Journal ref: International Journal of Computer Applications(IJCA), April 2011, Volume 20, Number 7, Pages 1-5

  39. Machine Recognition of Hand Written Characters using Neural Networks

    Authors: Yusuf Perwej, Ashish Chaturvedi

    Abstract: Even today in Twenty First Century Handwritten communication has its own stand and most of the times, in daily life it is globally using as means of communication and recording the information like to be shared with others. Challenges in handwritten characters recognition wholly lie in the variation and distortion of handwritten characters, since different people may use different style of handwri… ▽ More

    Submitted 17 May, 2012; originally announced May 2012.

    Comments: 4 pages, 1 Figure, ISSN:0975 - 8887

    Journal ref: International Journal of Computer Applications (IJCA) ,January 2011 Volume 14, Number 2, Pages 6-9

  40. Construction of Turbo Code Interleavers from 3-Regular Hamiltonian Graphs

    Authors: Arya Mazumdar, A K Chaturvedi, Adrish Banerjee

    Abstract: In this letter we present a new construction of interleavers for turbo codes from 3-regular Hamiltonian graphs. The interleavers can be generated using a few parameters, which can be selected in such a way that the girth of the interleaver graph (IG) becomes large, inducing a high summary distance. The size of the search space for these parameters is derived. The proposed interleavers themselves… ▽ More

    Submitted 23 December, 2005; originally announced December 2005.

    Comments: This paper has been accepted for publication in IEEE Communication Letters

    Journal ref: IEEE Communications Letters, pp. 284-286, Vol. 10, Issue 4, April, 2006.

  41. On the Spread of Random Interleaver

    Authors: Arya Mazumdar, Adrish Banerjee, A K Chaturvedi

    Abstract: For a given blocklength we determine the number of interleavers which have spread equal to two. Using this, we find out the probability that a randomly chosen interleaver has spread two. We show that as blocklength increases, this probability increases but very quickly converges to the value $1-e^{-2} \approx 0.8647$. Subsequently, we determine a lower bound on the probability of an interleaver… ▽ More

    Submitted 23 October, 2005; originally announced October 2005.

    Comments: 5 pages, published in Proceedings of IEEE International Symposium on Information Theory 2005, Adelaide, Australia

    Journal ref: IEEE International Symposium on Information Theory 2005

  42. arXiv:cs/0507066  [pdf

    cs.CR cs.CY

    Authentication Schemes Using Braid Groups

    Authors: Sunder Lal, Atul Chaturvedi

    Abstract: In this paper we proposed two identification schemes based on the root problem. The proposed schemes are secure against passive attacks assuming that the root problem (RP) is hard in braid groups.

    Submitted 27 July, 2005; originally announced July 2005.

    Comments: 6 pages, 2 figures