-
How effective is Multi-source pivoting for Translation of Low Resource Indian Languages?
Authors:
Pranav Gaikwad,
Meet Doshi,
Raj Dabre,
Pushpak Bhattacharyya
Abstract:
Machine Translation (MT) between linguistically dissimilar languages is challenging, especially due to the scarcity of parallel corpora. Prior works suggest that pivoting through a high-resource language can help translation into a related low-resource language. However, existing works tend to discard the source sentence when pivoting. Taking the case of English to Indian language MT, this paper e…
▽ More
Machine Translation (MT) between linguistically dissimilar languages is challenging, especially due to the scarcity of parallel corpora. Prior works suggest that pivoting through a high-resource language can help translation into a related low-resource language. However, existing works tend to discard the source sentence when pivoting. Taking the case of English to Indian language MT, this paper explores the 'multi-source translation' approach with pivoting, using both source and pivot sentences to improve translation. We conducted extensive experiments with various multi-source techniques for translating English to Konkani, Manipuri, Sanskrit, and Bodo, using Hindi, Marathi, and Bengali as pivot languages. We find that multi-source pivoting yields marginal improvements over the state-of-the-art, contrary to previous claims, but these improvements can be enhanced with synthetic target language data. We believe multi-source pivoting is a promising direction for Low-resource translation.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
Automatic Hardware Trojan Insertion using Machine Learning
Authors:
Jonathan Cruz,
Pravin Gaikwad,
Abhishek Nair,
Prabuddha Chakraborty,
Swarup Bhunia
Abstract:
Due to the current horizontal business model that promotes increasing reliance on untrusted third-party Intellectual Properties (IPs), CAD tools, and design facilities, hardware Trojan attacks have become a serious threat to the semiconductor industry. Development of effective countermeasures against hardware Trojan attacks requires: (1) fast and reliable exploration of the viable Trojan attack sp…
▽ More
Due to the current horizontal business model that promotes increasing reliance on untrusted third-party Intellectual Properties (IPs), CAD tools, and design facilities, hardware Trojan attacks have become a serious threat to the semiconductor industry. Development of effective countermeasures against hardware Trojan attacks requires: (1) fast and reliable exploration of the viable Trojan attack space for a given design and (2) a suite of high-quality Trojan-inserted benchmarks that meet specific standards. The latter has become essential for the development and evaluation of design/verification solutions to achieve quantifiable assurance against Trojan attacks. While existing static benchmarks provide a baseline for comparing different countermeasures, they only enumerate a limited number of handcrafted Trojans from the complete Trojan design space. To accomplish these dual objectives, in this paper, we present MIMIC, a novel AI-guided framework for automatic Trojan insertion, which can create a large population of valid Trojans for a given design by mimicking the properties of a small set of known Trojans. While there exist tools to automatically insert Trojan instances using fixed Trojan templates, they cannot analyze known Trojan attacks for creating new instances that accurately capture the threat model. MIMIC works in two major steps: (1) it analyzes structural and functional features of existing Trojan populations in a multi-dimensional space to train machine learning models and generate a large number of "virtual Trojans" of the given design, (2) next, it binds them into the design by matching their functional/structural properties with suitable nets of the internal logic structure. We have developed a complete tool flow for MIMIC, extensively evaluated the framework by exploring several use-cases, and quantified its effectiveness to demonstrate highly promising results.
△ Less
Submitted 18 April, 2022;
originally announced April 2022.
-
Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing
Authors:
Pravin Gaikwad,
Jonathan Cruz,
Prabuddha Chakraborty,
Swarup Bhunia,
Tamzidul Hoque
Abstract:
System-on-chip (SoC) developers increasingly rely on pre-verified hardware intellectual property (IP) blocks acquired from untrusted third-party vendors. These IPs might contain hidden malicious functionalities or hardware Trojans to compromise the security of the fabricated SoCs. Recently, supervised machine learning (ML) techniques have shown promising capability in identifying nets of potential…
▽ More
System-on-chip (SoC) developers increasingly rely on pre-verified hardware intellectual property (IP) blocks acquired from untrusted third-party vendors. These IPs might contain hidden malicious functionalities or hardware Trojans to compromise the security of the fabricated SoCs. Recently, supervised machine learning (ML) techniques have shown promising capability in identifying nets of potential Trojans in third party IPs (3PIPs). However, they bring several major challenges. First, they do not guide us to an optimal choice of features that reliably covers diverse classes of Trojans. Second, they require multiple Trojan-free/trusted designs to insert known Trojans and generate a trained model. Even if a set of trusted designs are available for training, the suspect IP could be inherently very different from the set of trusted designs, which may negatively impact the verification outcome. Third, these techniques only identify a set of suspect Trojan nets that require manual intervention to understand the potential threat. In this paper, we present VIPR, a systematic machine learning (ML) based trust verification solution for 3PIPs that eliminates the need for trusted designs for training. We present a comprehensive framework, associated algorithms, and a tool flow for obtaining an optimal set of features, training a targeted machine learning model, detecting suspect nets, and identifying Trojan circuitry from the suspect nets. We evaluate the framework on several Trust-Hub Trojan benchmarks and provide a comparative analysis of detection performance across different trained models, selection of features, and post-processing techniques. The proposed post-processing algorithms reduce false positives by up to 92.85%.
△ Less
Submitted 29 November, 2021;
originally announced November 2021.
-
Financial Data Analysis Using Expert Bayesian Framework For Bankruptcy Prediction
Authors:
Amir Mukeri,
Habibullah Shaikh,
Dr. D. P. Gaikwad
Abstract:
In recent years, bankruptcy forecasting has gained lot of attention from researchers as well as practitioners in the field of financial risk management. For bankruptcy prediction, various approaches proposed in the past and currently in practice relies on accounting ratios and using statistical modeling or machine learning methods. These models have had varying degrees of successes. Models such as…
▽ More
In recent years, bankruptcy forecasting has gained lot of attention from researchers as well as practitioners in the field of financial risk management. For bankruptcy prediction, various approaches proposed in the past and currently in practice relies on accounting ratios and using statistical modeling or machine learning methods. These models have had varying degrees of successes. Models such as Linear Discriminant Analysis or Artificial Neural Network employ discriminative classification techniques. They lack explicit provision to include prior expert knowledge. In this paper, we propose another route of generative modeling using Expert Bayesian framework. The biggest advantage of the proposed framework is an explicit inclusion of expert judgment in the modeling process. Also the proposed methodology provides a way to quantify uncertainty in prediction. As a result the model built using Bayesian framework is highly flexible, interpretable and intuitive in nature. The proposed approach is well suited for highly regulated or safety critical applications such as in finance or in medical diagnosis. In such cases accuracy in the prediction is not the only concern for decision makers. Decision makers and other stakeholders are also interested in uncertainty in the prediction as well as interpretability of the model. We empirically demonstrate these benefits of proposed framework on real world dataset using Stan, a probabilistic programming language. We found that the proposed model is either comparable or superior to the other existing methods. Also resulting model has much less False Positive Rate compared to many existing state of the art methods. The corresponding R code for the experiments is available at Github repository.
△ Less
Submitted 30 October, 2020; v1 submitted 19 October, 2020;
originally announced October 2020.
-
State Space Analysis of Memristor Based Series and Parallel RLCM Circuits
Authors:
T. D. Dongale,
P. K. Gaikwad,
R. K. Kamat
Abstract:
The present paper investigates state space analysis of memristor based series and parallel RLCM circuits. The stability analysis is carried out with the help of eigenvalues formulation method, pole-zero plot and transient response of system. The state space analysis is successfully applied and eigenvalues of the two circuits are calculated. It is found that the, system follows negative real part o…
▽ More
The present paper investigates state space analysis of memristor based series and parallel RLCM circuits. The stability analysis is carried out with the help of eigenvalues formulation method, pole-zero plot and transient response of system. The state space analysis is successfully applied and eigenvalues of the two circuits are calculated. It is found that the, system follows negative real part of eigenvalues. The result clearly shows that addition of memristor in circuits will not alter the stability of system. It is found that systems poles located at left hand side of the S plane, which indicates stable performance of system. It clearly evident that eigenvalues has negative real part hence two systems are internally stable.
△ Less
Submitted 13 February, 2016;
originally announced February 2016.
-
Time and Frequency Domain Investigation of Selected Memristor based Analog Circuits
Authors:
G. S. Patil,
S. R. Ghatage,
P. K. Gaikwad,
R. K. Kamat,
T. D. Dongale
Abstract:
In this paper, we investigate few memristor-based analog circuits namely the phase shift oscillator, integrator, and differentiator which have been explored numerously using the traditional lumped components. We use LTspice-IV platform for simulation of the above-said circuits. The investigation resorts to the nonlinear dopant drift model of memristor and the window function portrayed in the liter…
▽ More
In this paper, we investigate few memristor-based analog circuits namely the phase shift oscillator, integrator, and differentiator which have been explored numerously using the traditional lumped components. We use LTspice-IV platform for simulation of the above-said circuits. The investigation resorts to the nonlinear dopant drift model of memristor and the window function portrayed in the literature for nonlinearity realization. The results of our investigations depict good agreement with the conventional lumped component based phase shift oscillator, integrator, and differentiator circuits. The results are evident to showcase the potential of the memristor as a promising candidate for the next generation analog circuits.
△ Less
Submitted 30 March, 2017; v1 submitted 6 February, 2016;
originally announced February 2016.
-
Investigating Reliability Aspects of Memristor based RRAM with Reference to Write Voltage and Frequency
Authors:
T. D. Dongale,
K. V. Khot,
S. V. Mohite,
N. K. Desai,
S. S. Shinde,
A. V. Moholkar,
K. Y. Rajpure,
P. N. Bhosale,
P. S. Patil,
P. K. Gaikwad,
R. K. Kamat
Abstract:
In this paper, we report the effect of write voltage and frequency on memristor based Resistive Random Access Memory (RRAM). The above said parameters have been investigated on the linear drift model of memristor. With a variation of write voltage from 0.2V to 1.2V and a subsequent frequency modulation from 1, 2, 4, 10, 100 and 200 Hz the corresponding effects on memory window, Low Resistance Stat…
▽ More
In this paper, we report the effect of write voltage and frequency on memristor based Resistive Random Access Memory (RRAM). The above said parameters have been investigated on the linear drift model of memristor. With a variation of write voltage from 0.2V to 1.2V and a subsequent frequency modulation from 1, 2, 4, 10, 100 and 200 Hz the corresponding effects on memory window, Low Resistance State (LRS) and High Resistance State (HRS) have been reported. Thus the lifetime (τ) reliability analysis of memristor based RRAM is carried out using above results. It is found that, the HRS is independent of write voltage, whereas LRS shows dependency on write voltage and frequency. The simulation results showcase that the memristor possess higher memory window and lifetime (τ) in the higher voltage with lower frequency region, which has been attributed to the fewer data losses in the memory architecture.
△ Less
Submitted 5 February, 2016;
originally announced February 2016.
-
TiO2 based Nanostructured Memristor for RRAM and Neuromorphic Applications: A Simulation Approach
Authors:
T. D. Dongale,
P. J. Patil,
N. K. Desai,
P. P. Chougule,
S. M. Kumbhar,
P. P. Waifalkar,
P. B. Patil,
R. S. Vhatkar,
M. V. Takale,
P. K. Gaikwad,
R. K. Kamat
Abstract:
We report simulation of nanostructured memristor device using piecewise linear and nonlinear window functions for RRAM and neuromorphic applications. The linear drift model of memristor has been exploited for the simulation purpose with the linear and non-linear window function as the mathematical and scripting basis. The results evidences that the piecewise linear window function can aptly simula…
▽ More
We report simulation of nanostructured memristor device using piecewise linear and nonlinear window functions for RRAM and neuromorphic applications. The linear drift model of memristor has been exploited for the simulation purpose with the linear and non-linear window function as the mathematical and scripting basis. The results evidences that the piecewise linear window function can aptly simulate the memristor characteristics pertaining to RRAM application. However, the nonlinear window function could exhibit the nonlinear phenomenon in simulation only at the lower magnitude of control parameter. This has motivated us to propose a new nonlinear window function for emulating the simulation model of the memristor. Interestingly, the proposed window function is scalable up to f(x)=1 and exhibits the nonlinear behavior at higher magnitude of control parameter. Moreover, the simulation results of proposed nonlinear window function are encouraging and reveals the smooth nonlinear change from LRS to HRS and vice versa and therefore useful for the neuromorphic applications.
△ Less
Submitted 25 January, 2016;
originally announced January 2016.
-
Handy Annotations within Oracle 10g
Authors:
Mrs. Dhanamma Jagli,
Ms. Priyanka Gaikwad,
Ms. Shubhangi Gunjal,
Mr. Chaitanya Bilaware
Abstract:
This paper describes practical observations during the Database system Lab. Oracle 10g DBMS is used in the data base system lab and performed SQL queries based many concepts like Data Definition Language Commands (DDL), Data Modification Language Commands ((DML), Views, Integrity Constraints, Aggregate functions, Joins and Abstract type . While performing practical during the lab session, many pro…
▽ More
This paper describes practical observations during the Database system Lab. Oracle 10g DBMS is used in the data base system lab and performed SQL queries based many concepts like Data Definition Language Commands (DDL), Data Modification Language Commands ((DML), Views, Integrity Constraints, Aggregate functions, Joins and Abstract type . While performing practical during the lab session, many problems occurred, in order to solve them many text books and websites referred but could not obtain expected help from them. Even though by spending much time in the database labs with Oracle 10g, tried in numerous ways, as a final point expected output is achieved. This paper describes annotations which were experimentally proved in the Database lab.
△ Less
Submitted 9 October, 2013;
originally announced October 2013.