Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–11 of 11 results for author: Kuriakose, J

.
  1. arXiv:2407.15390  [pdf, other

    cs.CL cs.AI

    ALLaM: Large Language Models for Arabic and English

    Authors: M Saiful Bari, Yazeed Alnumay, Norah A. Alzahrani, Nouf M. Alotaibi, Hisham A. Alyahya, Sultan AlRashed, Faisal A. Mirza, Shaykhah Z. Alsubaie, Hassan A. Alahmed, Ghadah Alabduljabbar, Raghad Alkhathran, Yousef Almushayqih, Raneem Alnajim, Salman Alsubaihi, Maryam Al Mansour, Majed Alrubaian, Ali Alammari, Zaki Alawami, Abdulmohsen Al-Thubaity, Ahmed Abdelali, Jeril Kuriakose, Abdalghani Abujabal, Nora Al-Twairesh, Areeb Alowisheq, Haidar Khan

    Abstract: We present ALLaM: Arabic Large Language Model, a series of large language models to support the ecosystem of Arabic Language Technologies (ALT). ALLaM is carefully trained considering the values of language alignment and knowledge transfer at scale. Our autoregressive decoder-only architecture models demonstrate how second-language acquisition via vocabulary expansion and pretraining on a mixture… ▽ More

    Submitted 22 July, 2024; originally announced July 2024.

  2. arXiv:2302.06227  [pdf, other

    eess.AS cs.SD

    Fast and small footprint Hybrid HMM-HiFiGAN based system for speech synthesis in Indian languages

    Authors: Sudhanshu Srivastava, Ishika Gupta, Anusha Prakash, Jom Kuriakose, Hema A. Murthy

    Abstract: Hidden-Markov-model (HMM) based text-to-speech (HTS) offers flexibility in speaking styles along with fast training and synthesis while being computationally less intense. HTS performs well even in low-resource scenarios. The primary drawback is that the voice quality is poor compared to that of E2E systems. A hybrid approach combining HMM-based feature generation and neural-network-based HiFi-GAN… ▽ More

    Submitted 13 February, 2023; originally announced February 2023.

    Comments: 5 pages, 5 figures

  3. arXiv:2212.11982  [pdf, other

    eess.AS

    HMM-based data augmentation for E2E systems for building conversational speech synthesis systems

    Authors: Ishika Gupta, Anusha Prakash, Jom Kuriakose, Hema A. Murthy

    Abstract: This paper proposes an approach to build a high-quality text-to-speech (TTS) system for technical domains using data augmentation. An end-to-end (E2E) system is trained on hidden Markov model (HMM) based synthesized speech and further fine-tuned with studio-recorded TTS data to improve the timbre of the synthesized voice. The motivation behind the work is that issues of word skips and repetitions… ▽ More

    Submitted 22 December, 2022; originally announced December 2022.

    Comments: 6 pages, 7 figures, 33 references

  4. arXiv:2211.01338  [pdf, other

    eess.AS cs.CL cs.MM cs.SD eess.IV

    Technology Pipeline for Large Scale Cross-Lingual Dubbing of Lecture Videos into Multiple Indian Languages

    Authors: Anusha Prakash, Arun Kumar, Ashish Seth, Bhagyashree Mukherjee, Ishika Gupta, Jom Kuriakose, Jordan Fernandes, K V Vikram, Mano Ranjith Kumar M, Metilda Sagaya Mary, Mohammad Wajahat, Mohana N, Mudit Batra, Navina K, Nihal John George, Nithya Ravi, Pruthwik Mishra, Sudhanshu Srivastava, Vasista Sai Lodagala, Vandan Mujadia, Kada Sai Venkata Vineeth, Vrunda Sukhadia, Dipti Sharma, Hema Murthy, Pushpak Bhattacharya , et al. (2 additional authors not shown)

    Abstract: Cross-lingual dubbing of lecture videos requires the transcription of the original audio, correction and removal of disfluencies, domain term discovery, text-to-text translation into the target language, chunking of text using target language rhythm, text-to-speech synthesis followed by isochronous lipsyncing to the original video. This task becomes challenging when the source and target languages… ▽ More

    Submitted 1 November, 2022; originally announced November 2022.

  5. arXiv:2106.01400  [pdf, other

    eess.AS cs.LG cs.SD

    Dual Script E2E framework for Multilingual and Code-Switching ASR

    Authors: Mari Ganesh Kumar, Jom Kuriakose, Anand Thyagachandran, Arun Kumar A, Ashish Seth, Lodagala Durga Prasad, Saish Jaiswal, Anusha Prakash, Hema Murthy

    Abstract: India is home to multiple languages, and training automatic speech recognition (ASR) systems for languages is challenging. Over time, each language has adopted words from other languages, such as English, leading to code-mixing. Most Indian languages also have their own unique scripts, which poses a major limitation in training multilingual and code-switching ASR systems. Inspired by results in… ▽ More

    Submitted 2 June, 2021; originally announced June 2021.

    Comments: Accepted for publication at Interspeech 2021

  6. arXiv:2103.03215  [pdf, other

    eess.AS cs.SD

    Front-end Diarization for Percussion Separation in Taniavartanam of Carnatic Music Concerts

    Authors: Nauman Dawalatabad, Jilt Sebastian, Jom Kuriakose, C. Chandra Sekhar, Shrikanth Narayanan, Hema A. Murthy

    Abstract: Instrument separation in an ensemble is a challenging task. In this work, we address the problem of separating the percussive voices in the taniavartanam segments of Carnatic music. In taniavartanam, a number of percussive instruments play together or in tandem. Separation of instruments in regions where only one percussion is present leads to interference and artifacts at the output, as source se… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

  7. arXiv:1807.05962  [pdf, other

    cs.CL

    Theme-weighted Ranking of Keywords from Text Documents using Phrase Embeddings

    Authors: Debanjan Mahata, John Kuriakose, Rajiv Ratn Shah, Roger Zimmermann, John R. Talburt

    Abstract: Keyword extraction is a fundamental task in natural language processing that facilitates mapping of documents to a concise set of representative single and multi-word phrases. Keywords from text documents are primarily extracted using supervised and unsupervised approaches. In this paper, we present an unsupervised technique that uses a combination of theme-weighted personalized PageRank algorithm… ▽ More

    Submitted 16 July, 2018; originally announced July 2018.

    Comments: preprint for paper accepted in Proceedings of 1st IEEE International Conference on Multimedia Information Processing and Retrieval

  8. arXiv:1412.2857  [pdf

    cs.CR

    Analysis of Maximum Likelihood and Mahalanobis Distance for Identifying Cheating Anchor Nodes

    Authors: Jeril Kuriakose, Amruth V., Sandesh A. G., Jampu Venkata Naveenbabu, Mohammed Shahid, Ashish Shetty

    Abstract: Malicious anchor nodes will constantly hinder genuine and appropriate localization. Discovering the malicious or vulnerable anchor node is an essential problem in wireless sensor networks (WSNs). In wireless sensor networks, anchor nodes are the nodes that know its current location. Neighboring nodes or non-anchor nodes calculate its location (or its location reference) with the help of anchor nod… ▽ More

    Submitted 9 December, 2014; originally announced December 2014.

    Comments: 10 pages, 13 pages, conference

  9. arXiv:1411.5465  [pdf

    cs.CR

    Identifying Cheating Anchor Nodes using Maximum Likelihood and Mahalanobis Distance

    Authors: Jeril Kuriakose, V. Amruth, Swathy Nandhini, V. Abhilash

    Abstract: Malicious anchor nodes will constantly hinder genuine and appropriate localization. Discovering the malicious or vulnerable anchor node is an essential problem in Wireless Sensor Networks (WSNs). In wireless sensor networks, anchor nodes are the nodes that know its current location. Neighbouring nodes or non-anchor nodes calculate its location (or its location reference) with the help of anchor no… ▽ More

    Submitted 20 November, 2014; originally announced November 2014.

    Comments: 12 pages, 18 figures, IJSP. arXiv admin note: substantial text overlap with arXiv:1411.4437

  10. arXiv:1411.4437  [pdf

    cs.NI cs.CR

    Sequestration of Malevolent Anchor Nodes in Wireless Sensor Networks using Mahalanobis Distance

    Authors: Jeril Kuriakose, V. Amruth, Swathy Nandhini, V. Abhilash

    Abstract: Discovering the malicious or vulnerable anchor node is an essential problem in wireless sensor networks (WSNs). In wireless sensor networks, anchor nodes are the nodes that know its current location. Neighbouring nodes or non-anchor nodes calculate its location coordinate (or location reference) with the help of anchor nodes. Ingenuous localization is not possible in the presence of a cheating anc… ▽ More

    Submitted 17 November, 2014; originally announced November 2014.

    Comments: 9 pages, 9 figures, ICC conference proceedings

  11. arXiv:1410.8713  [pdf

    cs.NI

    Localization in Wireless Sensor Networks: A Survey

    Authors: Jeril Kuriakose, Sandeep Joshi, V. I. George

    Abstract: Localization is widely used in Wireless Sensor Networks (WSNs) to identify the current location of the sensor odes. A WSN consist of thousands of nodes that make the installation of GPS on each sensor node expensive and moreover GPS may not provide exact localization results in an indoor environment. Manually configuring location reference on each sensor node is also not possible for dense network… ▽ More

    Submitted 31 October, 2014; originally announced October 2014.

    Comments: 3 papes, 3 figures, conference proceedings