-
Automatic Digitization and Orientation of Scanned Mesh Data for Floor Plan and 3D Model Generation
Authors:
Ritesh Sharma,
Eric Bier,
Lester Nelson,
Mahabir Bhandari,
Niraj Kunwar
Abstract:
This paper describes a novel approach for generating accurate floor plans and 3D models of building interiors using scanned mesh data. Unlike previous methods, which begin with a high resolution point cloud from a laser range-finder, our approach begins with triangle mesh data, as from a Microsoft HoloLens. It generates two types of floor plans, a "pen-and-ink" style that preserves details and a d…
▽ More
This paper describes a novel approach for generating accurate floor plans and 3D models of building interiors using scanned mesh data. Unlike previous methods, which begin with a high resolution point cloud from a laser range-finder, our approach begins with triangle mesh data, as from a Microsoft HoloLens. It generates two types of floor plans, a "pen-and-ink" style that preserves details and a drafting-style that reduces clutter. It processes the 3D model for use in applications by aligning it with coordinate axes, annotating important objects, dividing it into stories, and removing the ceiling. Its performance is evaluated on commercial and residential buildings, with experiments to assess quality and dimensional accuracy. Our approach demonstrates promising potential for automatic digitization and orientation of scanned mesh data, enabling floor plan and 3D model generation in various applications such as navigation, interior design, furniture placement, facilities management, building construction, and HVAC design.
△ Less
Submitted 14 November, 2023;
originally announced November 2023.
-
Good lambda inequalities for non-doubling measures in $\mathbb{R}^n$
Authors:
Dr Mukta Bhandari
Abstract:
We establish a good lambda inequality relating to the distribution function of Riesz potential and fractional maximal function on $\left(\mathbb{R}^n, dμ\right)$ where $μ$ is a positive Radon measure which doesn't necessarily satisfy a doubling condition. This is extended to weights $w$ in $A_{\infty}(μ)$ associated to the measure $μ$. We also derive potential inequalities as an application.
We establish a good lambda inequality relating to the distribution function of Riesz potential and fractional maximal function on $\left(\mathbb{R}^n, dμ\right)$ where $μ$ is a positive Radon measure which doesn't necessarily satisfy a doubling condition. This is extended to weights $w$ in $A_{\infty}(μ)$ associated to the measure $μ$. We also derive potential inequalities as an application.
△ Less
Submitted 20 December, 2021;
originally announced December 2021.
-
Transfer Learning Based Automatic Model Creation Tool For Resource Constraint Devices
Authors:
Karthik Bhat,
Manan Bhandari,
ChangSeok Oh,
Sujin Kim,
Jeeho Yoo
Abstract:
With the enhancement of Machine Learning, many tools are being designed to assist developers to easily create their Machine Learning models. In this paper, we propose a novel method for auto creation of such custom models for constraint devices using transfer learning without the need to write any machine learning code. We share the architecture of our automatic model creation tool and the CNN Mod…
▽ More
With the enhancement of Machine Learning, many tools are being designed to assist developers to easily create their Machine Learning models. In this paper, we propose a novel method for auto creation of such custom models for constraint devices using transfer learning without the need to write any machine learning code. We share the architecture of our automatic model creation tool and the CNN Model created by it using pretrained models such as YAMNet and MobileNetV2 as feature extractors. Finally, we demonstrate accuracy and memory footprint of the model created from the tool by creating an Automatic Image and Audio classifier and report the results of our experiments using Stanford Cars and ESC-50 dataset.
△ Less
Submitted 18 December, 2020;
originally announced December 2020.
-
Metrics also Disagree in the Low Scoring Range: Revisiting Summarization Evaluation Metrics
Authors:
Manik Bhandari,
Pranav Gour,
Atabak Ashfaq,
Pengfei Liu
Abstract:
In text summarization, evaluating the efficacy of automatic metrics without human judgments has become recently popular. One exemplar work concludes that automatic metrics strongly disagree when ranking high-scoring summaries. In this paper, we revisit their experiments and find that their observations stem from the fact that metrics disagree in ranking summaries from any narrow scoring range. We…
▽ More
In text summarization, evaluating the efficacy of automatic metrics without human judgments has become recently popular. One exemplar work concludes that automatic metrics strongly disagree when ranking high-scoring summaries. In this paper, we revisit their experiments and find that their observations stem from the fact that metrics disagree in ranking summaries from any narrow scoring range. We hypothesize that this may be because summaries are similar to each other in a narrow scoring range and are thus, difficult to rank. Apart from the width of the scoring range of summaries, we analyze three other properties that impact inter-metric agreement - Ease of Summarization, Abstractiveness, and Coverage. To encourage reproducible research, we make all our analysis code and data publicly available.
△ Less
Submitted 8 November, 2020;
originally announced November 2020.
-
Re-evaluating Evaluation in Text Summarization
Authors:
Manik Bhandari,
Pranav Gour,
Atabak Ashfaq,
Pengfei Liu,
Graham Neubig
Abstract:
Automated evaluation metrics as a stand-in for manual evaluation are an essential part of the development of text-generation tasks such as text summarization. However, while the field has progressed, our standard metrics have not -- for nearly 20 years ROUGE has been the standard evaluation in most summarization papers. In this paper, we make an attempt to re-evaluate the evaluation method for tex…
▽ More
Automated evaluation metrics as a stand-in for manual evaluation are an essential part of the development of text-generation tasks such as text summarization. However, while the field has progressed, our standard metrics have not -- for nearly 20 years ROUGE has been the standard evaluation in most summarization papers. In this paper, we make an attempt to re-evaluate the evaluation method for text summarization: assessing the reliability of automatic metrics using top-scoring system outputs, both abstractive and extractive, on recently popular datasets for both system-level and summary-level evaluation settings. We find that conclusions about evaluation metrics on older datasets do not necessarily hold on modern datasets and systems.
△ Less
Submitted 14 October, 2020;
originally announced October 2020.
-
All Data Inclusive, Deep Learning Models to Predict Critical Events in the Medical Information Mart for Intensive Care III Database (MIMIC III)
Authors:
Anubhav Reddy Nallabasannagari,
Madhu Reddiboina,
Ryan Seltzer,
Trevor Zeffiro,
Ajay Sharma,
Mahendra Bhandari
Abstract:
Intensive care clinicians need reliable clinical practice tools to preempt unexpected critical events that might harm their patients in intensive care units (ICU), to pre-plan timely interventions, and to keep the patient's family well informed. The conventional statistical models are built by curating only a limited number of key variables, which means a vast unknown amount of potentially preciou…
▽ More
Intensive care clinicians need reliable clinical practice tools to preempt unexpected critical events that might harm their patients in intensive care units (ICU), to pre-plan timely interventions, and to keep the patient's family well informed. The conventional statistical models are built by curating only a limited number of key variables, which means a vast unknown amount of potentially precious data remains unused. Deep learning models (DLMs) can be leveraged to learn from large complex datasets and construct predictive clinical tools. This retrospective study was performed using 42,818 hospital admissions involving 35,348 patients, which is a subset of the MIMIC-III dataset. Natural language processing (NLP) techniques were applied to build DLMs to predict in-hospital mortality (IHM) and length of stay >=7 days (LOS). Over 75 million events across multiple data sources were processed, resulting in over 355 million tokens. DLMs for predicting IHM using data from all sources (AS) and chart data (CS) achieved an AUC-ROC of 0.9178 and 0.9029, respectively, and PR-AUC of 0.6251 and 0.5701, respectively. DLMs for predicting LOS using AS and CS achieved an AUC-ROC of 0.8806 and 0.8642, respectively, and PR-AUC of 0.6821 and 0.6575, respectively. The observed AUC-ROC difference between models was found to be significant for both IHM and LOS at p=0.05. The observed PR-AUC difference between the models was found to be significant for IHM and statistically insignificant for LOS at p=0.05. In this study, deep learning models were constructed using data combined from a variety of sources in Electronic Health Records (EHRs) such as chart data, input and output events, laboratory values, microbiology events, procedures, notes, and prescriptions. It is possible to predict in-hospital mortality with much better confidence and higher reliability from models built using all sources of data.
△ Less
Submitted 2 September, 2020;
originally announced September 2020.
-
On the Polarizing Behavior and Scaling Exponent of Polar Codes with Product Kernels
Authors:
Manan Bhandari,
Ishan Bansal,
V. Lalitha
Abstract:
Polar codes, introduced by Arikan, achieve the capacity of arbitrary binary-input discrete memoryless channel $W$ under successive cancellation decoding. Any such channel having capacity $I(W)$ and for any coding scheme allowing transmission at rate $R$, scaling exponent is a parameter which characterizes how fast gap to capacity decreases as a function of code length $N$ for a fixed probability o…
▽ More
Polar codes, introduced by Arikan, achieve the capacity of arbitrary binary-input discrete memoryless channel $W$ under successive cancellation decoding. Any such channel having capacity $I(W)$ and for any coding scheme allowing transmission at rate $R$, scaling exponent is a parameter which characterizes how fast gap to capacity decreases as a function of code length $N$ for a fixed probability of error. The relation between them is given by $N\geqslant α/(I(W)-R)^μ$. Scaling exponent for kernels of small size up to $L=8$ have been exhaustively found. In this paper, we consider product kernels $T_{L}$ obtained by taking Kronecker product of component kernels. We derive the properties of polarizing product kernels relating to number of product kernels, self duality and partial distances in terms of the respective properties of the smaller component kernels. Subsequently, polarization behavior of component kernel $T_{l}$ is used to calculate scaling exponent of $T_{L}=T_{2}\otimes T_{l}$. Using this method, we show that $μ(T_{2}\otimes T_{5})=3.942.$ Further, we employ a heuristic approach to construct good kernel of $L=14$ from kernel having size $l=8$ having best $μ$ and find $μ(T_{2}\otimes T_{7})=3.485.$
△ Less
Submitted 4 February, 2020; v1 submitted 18 April, 2019;
originally announced April 2019.
-
Confidence-based Graph Convolutional Networks for Semi-Supervised Learning
Authors:
Shikhar Vashishth,
Prateek Yadav,
Manik Bhandari,
Partha Talukdar
Abstract:
Predicting properties of nodes in a graph is an important problem with applications in a variety of domains. Graph-based Semi-Supervised Learning (SSL) methods aim to address this problem by labeling a small subset of the nodes as seeds and then utilizing the graph structure to predict label scores for the rest of the nodes in the graph. Recently, Graph Convolutional Networks (GCNs) have achieved…
▽ More
Predicting properties of nodes in a graph is an important problem with applications in a variety of domains. Graph-based Semi-Supervised Learning (SSL) methods aim to address this problem by labeling a small subset of the nodes as seeds and then utilizing the graph structure to predict label scores for the rest of the nodes in the graph. Recently, Graph Convolutional Networks (GCNs) have achieved impressive performance on the graph-based SSL task. In addition to label scores, it is also desirable to have confidence scores associated with them. Unfortunately, confidence estimation in the context of GCN has not been previously explored. We fill this important gap in this paper and propose ConfGCN, which estimates labels scores along with their confidences jointly in GCN-based setting. ConfGCN uses these estimated confidences to determine the influence of one node on another during neighborhood aggregation, thereby acquiring anisotropic capabilities. Through extensive analysis and experiments on standard benchmarks, we find that ConfGCN is able to outperform state-of-the-art baselines. We have made ConfGCN's source code available to encourage reproducible research.
△ Less
Submitted 11 February, 2019; v1 submitted 24 January, 2019;
originally announced January 2019.
-
Incorporating Syntactic and Semantic Information in Word Embeddings using Graph Convolutional Networks
Authors:
Shikhar Vashishth,
Manik Bhandari,
Prateek Yadav,
Piyush Rai,
Chiranjib Bhattacharyya,
Partha Talukdar
Abstract:
Word embeddings have been widely adopted across several NLP applications. Most existing word embedding methods utilize sequential context of a word to learn its embedding. While there have been some attempts at utilizing syntactic context of a word, such methods result in an explosion of the vocabulary size. In this paper, we overcome this problem by proposing SynGCN, a flexible Graph Convolution…
▽ More
Word embeddings have been widely adopted across several NLP applications. Most existing word embedding methods utilize sequential context of a word to learn its embedding. While there have been some attempts at utilizing syntactic context of a word, such methods result in an explosion of the vocabulary size. In this paper, we overcome this problem by proposing SynGCN, a flexible Graph Convolution based method for learning word embeddings. SynGCN utilizes the dependency context of a word without increasing the vocabulary size. Word embeddings learned by SynGCN outperform existing methods on various intrinsic and extrinsic tasks and provide an advantage when used with ELMo. We also propose SemGCN, an effective framework for incorporating diverse semantic knowledge for further enhancing learned word representations. We make the source code of both models available to encourage reproducible research.
△ Less
Submitted 20 July, 2019; v1 submitted 12 September, 2018;
originally announced September 2018.
-
Another Proof of Darboux's Theorem
Authors:
Mukta Bhandari
Abstract:
We know that a continuous function on a closed interval satisfies the Intermediate Value Property. Likewise, the derivative function of a differentiable function on a closed interval satisfies the IVP property which is known as the Darboux theorem in any real analysis course. Most of the proofs found in the literature use the Extreme Value Property of a continuous function. In this paper, I am goi…
▽ More
We know that a continuous function on a closed interval satisfies the Intermediate Value Property. Likewise, the derivative function of a differentiable function on a closed interval satisfies the IVP property which is known as the Darboux theorem in any real analysis course. Most of the proofs found in the literature use the Extreme Value Property of a continuous function. In this paper, I am going to present a simple and elegant proof of the Darboux theorem using the Intermediate Value Theorem and the Rolles theorem
△ Less
Submitted 11 January, 2016;
originally announced January 2016.
-
Grover's algorithm based multi-qubit secret sharing scheme
Authors:
Arti Chamoli,
C. M. Bhandari
Abstract:
Some of the secret sharing schemes having unique quantum features like parallelism and entanglement are supposed to be relatively secure. Different schemes proposed by various researchers over the years have features which could be specific to the nature and need of a situation. Following Hsu's proposed scheme we propose a secret sharing scheme using Grover's search algorithm for a four qubit sy…
▽ More
Some of the secret sharing schemes having unique quantum features like parallelism and entanglement are supposed to be relatively secure. Different schemes proposed by various researchers over the years have features which could be specific to the nature and need of a situation. Following Hsu's proposed scheme we propose a secret sharing scheme using Grover's search algorithm for a four qubit system with several marked states. Further, the scheme has been generalised to an n-qubit syatem.
△ Less
Submitted 6 July, 2007;
originally announced July 2007.
-
Secure Direct Communication based on Ping-pong Protocol
Authors:
Arti Chamoli,
C. M. Bhandari
Abstract:
Communication security with quantum key distribution has been one of the important features of quantum information theory. A novel concept of secured direct communication has been the next step forward without the need to establish any shared secret key. The present paper is based on the ping-pong protocol with three particle GHZ state as the initial state where the receiver can simultaneously r…
▽ More
Communication security with quantum key distribution has been one of the important features of quantum information theory. A novel concept of secured direct communication has been the next step forward without the need to establish any shared secret key. The present paper is based on the ping-pong protocol with three particle GHZ state as the initial state where the receiver can simultaneously receive information from two parties. Possible eavesdropping on the travelling particle has been examined.
△ Less
Submitted 6 July, 2007;
originally announced July 2007.
-
Entanglement Teleportation by Qutrits
Authors:
Arti Chamoli,
C. M. Bhandari
Abstract:
Quantum entanglement, like othre resources, is now coonsidered to be a resource which can be produced, concentrated if required, transported and consumed. After its inception [1] in 1933, various schemes of quantum state teleportation have been proposed using different types of channels. Not restricting to qubit based systems, qutrit states and channels have also been of considerable interest. I…
▽ More
Quantum entanglement, like othre resources, is now coonsidered to be a resource which can be produced, concentrated if required, transported and consumed. After its inception [1] in 1933, various schemes of quantum state teleportation have been proposed using different types of channels. Not restricting to qubit based systems, qutrit states and channels have also been of considerable interest. In the present paper we investigate the teleportation of an unknown single qutrit state as well as two qutrit state through a three qutrit quantum channel along with the required operations to recover the state. This is further generalized to the case of teleportation of n-qutrit system.
△ Less
Submitted 24 February, 2007;
originally announced February 2007.
-
Evolution of Entanglement in Groverian Search Algorithm: n-qudit System
Authors:
Arti Chamoli,
C. M. Bhandari
Abstract:
Entanglement plays a crucial role in quantum processes particularly those pertaining to quantum information and computation. An analytical expression for an entanglement measure defined in terms of success rate of Grover's search algorithm has been obtained for qutrit systems with real coefficients and the calculated results agree well with the conventional entropy based measure. The entanglemen…
▽ More
Entanglement plays a crucial role in quantum processes particularly those pertaining to quantum information and computation. An analytical expression for an entanglement measure defined in terms of success rate of Grover's search algorithm has been obtained for qutrit systems with real coefficients and the calculated results agree well with the conventional entropy based measure. The entanglement measure is further generalised for qudit (d-level) systems with real coefficients.
△ Less
Submitted 24 February, 2007;
originally announced February 2007.
-
Success Rate and Entanglement Evolution in Search Algorithm
Authors:
Arti Chamoli,
C. M. Bhandari
Abstract:
Evolution of entanglement with the processing of quantum algorithms affects the outcome of the algorithm. Particularly, the performance of Grover's search algorithm gets worsened if the initial state of the algorithm is an entangled one. Biham et al [14] have shown that the success probability of search algorithm can be seen as an operational measure of entanglement. Following the same line of t…
▽ More
Evolution of entanglement with the processing of quantum algorithms affects the outcome of the algorithm. Particularly, the performance of Grover's search algorithm gets worsened if the initial state of the algorithm is an entangled one. Biham et al [14] have shown that the success probability of search algorithm can be seen as an operational measure of entanglement. Following the same line of thought, analytical expressions for entanglement measure for three and five qubit system have been derived, which reveals that entanglement measure based on Grover's search algorithm is valid for any state with real coefficients for even number of qubits.
△ Less
Submitted 24 February, 2007;
originally announced February 2007.
-
Groverian entanglement measure and evolution of entanglement in search algorithm for n(=3 and 5)-qubit systems with real coefficients
Authors:
Arti Chamoli,
C. M. Bhandari
Abstract:
Evolution of entanglement with the proceeding of quantum algorithms affects the outcome of the algorithm. Particularly, the performance of Grover's search algorithm gets worsened if the initial state of the algorithm is an entangled one. The success probability of search can be seen as an operational measure of entanglement. This paper demonstrates an entanglement measure based on the performanc…
▽ More
Evolution of entanglement with the proceeding of quantum algorithms affects the outcome of the algorithm. Particularly, the performance of Grover's search algorithm gets worsened if the initial state of the algorithm is an entangled one. The success probability of search can be seen as an operational measure of entanglement. This paper demonstrates an entanglement measure based on the performance of Grover's search algorithm for three and five qubit systems. We also show that although the overall pattern shows growth of entanglement, its rise to a maximum and then consequent decay, the presence of local fluctuation within each iterative step is likely.
△ Less
Submitted 4 May, 2007; v1 submitted 8 September, 2006;
originally announced September 2006.
-
Evolution Of Entanglement In Groverian Search Algorithm: Two-Qutrit System
Authors:
Arti Chamoli,
C. M. Bhandari
Abstract:
Entanglement plays a crucial role in quantum processes particularly those pertaining to quantum information and computation. An analytical expression for entanglement measure defined in terms of success rate of Grover's search algorithm has been obtained for a two-qutrit system and the calculated results agree well with the conventional entropy based measure. Qutrit system are of special interes…
▽ More
Entanglement plays a crucial role in quantum processes particularly those pertaining to quantum information and computation. An analytical expression for entanglement measure defined in terms of success rate of Grover's search algorithm has been obtained for a two-qutrit system and the calculated results agree well with the conventional entropy based measure. Qutrit system are of special interest because the Hilbert space dimensionality (for a given number of qudits-d-dimensional system)is optimal for d=3 and this may be of significance in the enhancement of computing power.
△ Less
Submitted 2 September, 2006;
originally announced September 2006.