Joy Bose | Ericsson - Academia.edu (original) (raw)

Papers by Joy Bose

Research paper thumbnail of Effect of Mindfulness and Mindful Art on Beginners and Experienced Meditators

Mindfulness meditation has been proven to be effective in treating a range of mental and physical... more Mindfulness meditation has been proven to be effective in treating a range of mental and physical conditions. Mindful Art is a type of mindfulness meditation that comprises sessions of drawing, painting and sculpturing with mindfulness for a given length of time. To date, the efficacy of mindful art has not been systematically studied. In this paper, we describe an experimental pilot study on two groups of participants, a beginner group of 21 participants and an experienced meditation group of 9 participants, who had previously practiced mindfulness meditation for more than one year. The beginner group was instructed in mindfulness sitting and moving meditation, while the experienced group was instructed in mindful art making in addition to mindfulness meditation. The instructions were delivered remotely over Tencent Conference and WeChat. The sessions were of 90 minutes duration each, twice per week, with 45 minutes of home practice daily and the length of the study was 21 days. Th...

Research paper thumbnail of Examining the effectiveness of mindfulness interventions for anxiety in young adults: a narrative synthesis

Background Anxiety disorders, such as generalized anxiety disorder and social anxiety, are a majo... more Background Anxiety disorders, such as generalized anxiety disorder and social anxiety, are a major problem among adolescents and young adults. Structured mindfulness based interventions such as Mindfulness Based Cognitive Therapy (MBCT) and Mindfulness Based Stress Reduction (MBSR) have been shown to be at least as effective as other interventions for treating anxiety, but a thorough analysis of different factors for effective treatments is missing. Objective The objective of this narrative synthesis is to synthesize mindfulness treatments for anxiety in young adults aged between 12 to 25, and examine components of those interventions that are more effective in reducing anxiety. Methods Studies were selected from 3 public databases (APA Psycinfo, Embase, Medline), as well as a manual process to augment the searches. Interventions involving Mindfulness based Cognitive Therapy (MBCT) and Mindfulness based Stress Reduction (MBSR) based studies, as well as their variants were eligible. Anxiety should be one of the measures in the study although it may not be the primary measure. After initial screening and removal of duplicates, 8 studies involving 423 participants were identified. Results Identified themes included customizations for young people, homework and follow ups, qualifications of the instructors, dropout rates, physical activity and subjective experience. Most studies showed a significant decrease in anxiety symptoms, in case of social phobia, chronic pain, stress and academic performance. However, variable scales for measuring anxiety were employed across studies, making it difficult to combine or compare them. The amount of improvement of anxiety was variable. Interventions that included mindfulness information sessions for parents and interventions with mindful physical activity such as yoga showed better results. Conclusion Recommendations are presented to enable more effective mindfulness interventions tailored for young people with anxiety.

Research paper thumbnail of Link-Adaptation for Improved Quality-of-Service in V2V Communication using Reinforcement Learning

Research paper thumbnail of Analysis of Software Engineering for Agile Machine Learning Projects

arXiv (Cornell University), Dec 16, 2019

The number of machine learning, artificial intelligence or data science related software engineer... more The number of machine learning, artificial intelligence or data science related software engineering projects using Agile methodology is increasing. However, there are very few studies on how such projects work in practice. In this paper, we analyze project issues tracking data taken from Scrum (a popular tool for Agile) for several machine learning projects. We compare this data with corresponding data from non-machine learning projects, in an attempt to analyze how machine learning projects are executed differently from normal software engineering projects. On analysis, we find that machine learning project issues use different kinds of words to describe issues, have higher number of exploratory or research oriented tasks as compared to implementation tasks, and have a higher number of issues in the product backlog after each sprint, denoting that it is more difficult to estimate the duration of machine learning project related tasks in advance. After analyzing this data, we propose a few ways in which Agile machine learning projects can be better logged and executed, given their differences with normal software engineering projects.

Research paper thumbnail of Story and Task Issue Analysis for Agile Machine Learning Projects

The usage of Agile methodology in planning and executing machine learning (ML) and data science r... more The usage of Agile methodology in planning and executing machine learning (ML) and data science related software engineering projects is increasing. However, there are very few studies using real data on how effective such planning is or guidelines on how to plan such projects. In this paper, we analyze data taken from several software projects using Scrum tools. We compare the data for data science/ML and non-ML projects, in an attempt to understand if data science and ML projects are planned or executed any differently compared to normal software engineering projects. We also perform a story classification task using machine learning to analyze story logs for agile tasks for several teams. We find there are differences in what makes a good ML story as opposed to a non ML story. After analyzing this data, we propose a few ways in which software projects, whether machine learning related or not, can be better logged and executed using Scrum tools like Jira.

Research paper thumbnail of Enhanced Alternate Action Recommender System Using Recurrent Patterns and Fault Detection System for Smart Home Users

We present a fault tolerant alternate action recommender system for smart home Internet of Things... more We present a fault tolerant alternate action recommender system for smart home Internet of Things (IoT) users to enrich the user experience with uninterrupted routines and various methods to achieve the regular routines in the smart home system. Our system takes events data from the smart home IoT devices as input, performs preprocessing using the big data handling techniques to transform it to be applicable to our system, applies our custom pattern-mining algorithm to derive the highly probable and active recurrent patterns of an individual user, ensures those frequently used devices are up and running using our fault detection monitoring system, and then finally recommends the alternate possibilities of achieving the deviated actions. Our custom fault detection system is based on various parameters of the IoT devices and context of the smart home users wherein the alternate recommendations given to the user are practical and useful in real time. We validated our system using user trial methods and various validation techniques.

Research paper thumbnail of Semi-Supervised Method using Gaussian Random Fields for Boilerplate Removal in Web Browsers

arXiv (Cornell University), Nov 7, 2019

Boilerplate removal refers to the problem of removing noisy content from a webpage such as ads an... more Boilerplate removal refers to the problem of removing noisy content from a webpage such as ads and extracting relevant content that can be used by various services. This can be useful in several features in web browsers such as ad blocking, accessibility tools such as read out loud, translation, summarization etc. In order to create a training dataset to train a model for boilerplate detection and removal, labeling or tagging webpage data manually can be tedious and time consuming. Hence, a semi-supervised model, in which some of the webpage elements are labeled manually and labels for others are inferred based on some parameters, can be useful. In this paper we present a solution for extraction of relevant content from a webpage that relies on semi-supervised learning using Gaussian Random Fields. We first represent the webpage as a graph, with text elements as nodes and the edge weights representing similarity between nodes. After this, we label a few nodes in the graph using heuristics and label the remaining nodes by a weighted measure of similarity to the already labeled nodes. We describe the system architecture and a few preliminary results on a dataset of webpages.

Research paper thumbnail of Intelligent and Secure Autofill System in Web Browsers

Advances in intelligent systems and computing, 2021

Research paper thumbnail of An associative memory fortheon-linerecognition and predictionoftemporal sequences

Thispaperpresents thedesign ofanassociative memorywithfeedback thatiscapable ofon-line temporal s... more Thispaperpresents thedesign ofanassociative memorywithfeedback thatiscapable ofon-line temporal sequence learning. A framework foron-line sequence learning hasbeenproposed, anddifferent sequence learning models have beenanalysed according tothis framework. Thenetwork model isanassociative memorywithaseparate store forthesequence context ofasymbol. A sparse distributed memoryisusedto gainscalability. Thecontext store combines thefunctionality of aneural layer withashift register. Thesensitivity ofthemachine tothesequence context iscontrollable, resulting indifferent characteristic behaviours. Themodelcanstore andpredict on- line sequences ofvarious types andlength. Numerical simulations onthemodelhavebeencarried outtodetermine itsproperties.

Research paper thumbnail of A Generic Visualization Framework based on a Data Driven Approach for the Analytics data

There are a number of analytics dashboard related solutions available today, but currently there ... more There are a number of analytics dashboard related solutions available today, but currently there is no open standard available to integrate different dashboards. In this paper, we provide a dashboard framework to combine data from different analytics sources such as Google Analytics, Flurry, JSON and Excel files, to form a customizable user interface. Our framework uses two configuration files, one for generic meta information and the other for individual services, to configure the dashboard. In our interface, it is possible to program basic calculations based on data from different sources. It is also possible to incorporate interfaces like drag and drop to configure options. Our framework is based on the plugin architecture, which allows easy addition of new data sources. The framework and visualization tool are data driven, meaning that if the source data changes in the future, there is no need to amend the dashboard as well. Our solution can work with local data as well as remote data from AWS servers with added authentication. We present the components of our dashboard solution along with implementation details of a prototype dashboard for a web service.

Research paper thumbnail of Prediction of Throughput Degradation from Trouble Frequencies, given Environmental Unknowns

2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS)

Emergence of carrier aggregation technology to augment user throughput in LTE and 5G technologies... more Emergence of carrier aggregation technology to augment user throughput in LTE and 5G technologies also results in passive intermodulation (PIM) artifacts in frequency-division duplexing (FDD)-based radio transceivers. While it is imperative to suppress PIM distortions, in real time, the problem is more arduous. In practical scenarios, the transmission frequencies are unknown across telecom operators due to security concerns and dynamically changing set of frequencies. PIM detection and mitigation in the face of such environmental unknowns becomes a challenge. In this paper, we address this challenge and propose an automated solution to mitigate PIM in real time. We propose a binary search-based solution that is amenable to real-time implementation. We show through simulations that this search in tandem with a reinforcement learning based solution can dynamically mitigate and cancel PIM. Results show that the number of steps to converge to identify and mitigate the PIM in uplink frequency is reduced by a factor of ~200 (i.e., from 2500 ms to 12 ms) for around 200 combinations of DL PRB combinations.

Research paper thumbnail of Bokeh Effect in Images on Objects Based on User Interest

Humans pay visual attention to those objects in the visual field that they are most interested in... more Humans pay visual attention to those objects in the visual field that they are most interested in seeing. The Bokeh effect is a popular blurring effect in photography, where the object of interest is emphasized by blurring other objects. In this paper, we apply the principle of visual attention to the user's object of interest to post processing of photos taken using a smartphone. We simulate the Bokeh effect of blurring objects in the image except those that the user is interested. This adds a biologically inspired effect to the camera and gallery apps in the smartphone. We first define a hierarchy of user interests in different categories. We then create a user interest profile based on the user's demographics, apps and URLs. We build a user interest vector out of this hierarchy by using a word embedding model, and take the weighted average of the vectors of the words corresponding to the user interests. After this, we detect objects in the image and calculate the similarity of the detected objects with the user interest vector, returning a sorted list of objects the user is interested. The Bokeh effect is applied to the image to blur other objects, thus giving a realistic touch to the image. Finally, we conduct a user study to validate the effectiveness of the system.

Research paper thumbnail of Effect of Mindfulness and Mindful Art on Beginners and Experienced Meditators

Arxiv, 2023

Mindfulness meditation has been proven to be effective in treating a range of mental and physical... more Mindfulness meditation has been proven to be effective in treating a range of mental and physical conditions. Mindful Art is a type of mindfulness meditation that comprises sessions of free drawing with mindfulness for a given length of time. To date, the efficacy of mindful art has not been systematically studied. In this paper, we describe an experimental pilot study on two groups of participants, a beginner group of 21 participants and an experienced meditation group of 9 participants, who had previously practiced mindfulness meditation for one year. The beginner group was instructed in mindfulness sitting and walking meditation, while the experienced group was instructed in mindful drawing in addition to mindfulness meditation. The instructions were delivered remotely over WeChat, the sessions were of 2 hours duration each and the length of the study was 21 days. The blood pressure, pulse rate and breathing rates, as well as the subjective degree of relaxation were recorded at every session. At the end of the study, the experienced group reported higher degrees of improvement in breath rate and relaxation, while the beginner group reported a greater degree of improvement in breath rate and relaxation, although their scores were lower on average than the experienced group.

Research paper thumbnail of A Privacy Preserving Approach for Home Ownership Prediction

2019 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), 2019

Web service providers have access to private user data such as preferences and behaviors of users... more Web service providers have access to private user data such as preferences and behaviors of users, which is used to provide customized or improved services and make predictions. Privacy restrictions such as General Data Protection Regulation (GDPR) mean that such user data should not be traceable back to the original user i.e. the user's privacy should not be compromised. In this paper, we propose a system for predicting home ownership using machine learning, i.e. whether the user is likely to be a homeowner or a renter, on the basis of the user's demographic data, in a way that preserves the user's privacy while making the predictions. Our system uses differential private data perturbation along with homomorphic encryption of the Term Frequency-Inverse Document Frequency (TF-IDF) vectors as the privacy preservation technique to mask the real identities of the users whose home ownership data is predicted. Our trained model is used for prediction on a sample dataset of a few thousand users. We get an accuracy of 69% in the prediction, which is around 4% lower than the algorithm performance without the privacy preservation. This shows that it is feasible to implement privacy preservation techniques on demographic prediction without compromising on the prediction accuracy.

Research paper thumbnail of Auto generation of diagnostic assessments and their quality evaluation

A good diagnostic assessment is one that can (i) discriminate between students of different abili... more A good diagnostic assessment is one that can (i) discriminate between students of different abilities for a given skill set, (ii) be consistent with ground truth data and (iii) achieve this with as few assessment questions as possible. In this paper, we explore a method to meet these objectives. This is achieved by selecting questions from a question database and assembling them to create a diagnostic test paper according to a given configurable policy. We consider policies based on multiple attributes of the questions such as discrimination ability and behavioral parameters, as well as a baseline policy. We develop metrics to evaluate the policies and perform the evaluation using historical student attempt data on assessments conducted on an online learning platform, as well as on a pilot test on the platform administered to a subset of users. We are able to estimate student abilities 40% better with a diagnostic test as compared to baseline policy, with questions derived from a la...

Research paper thumbnail of Security Mechanism for Packaged Web Applications

2017 IEEE International Conference on Web Services (ICWS), 2017

OAuth is an open security standard that enables users to provide specific and time bound rights t... more OAuth is an open security standard that enables users to provide specific and time bound rights to an application to access protected user resources, stored on some external resource server, without needing them to share their credentials, with the application. Using OAuth, a client application gets one access token for further use through an HTTP redirect response from the resource server once the user authenticates the resource access. Unlike websites, for locally installed packaged web applications the main security challenge is to handle the redirect response appropriately. This paper proposes a novel method to execute OAuth flow from such applications with the help of web runtime framework that manages the life cycle of these applications. We compare our approach with other two approaches for OAuth flow handling proposed in the literature. Experimenting with different categories of packaged web applications, we found our approach blocking all illegal OAuth flow executions. Our approach also gives better OAuth response handling time and power consumption performance.

Research paper thumbnail of Intelligent Web Push Architecture with Push Flow Control and Push Continuity

2016 IEEE International Conference on Web Services (ICWS), 2016

In this paper we present a Smart Push system with feedback enabled flow control suitable for web ... more In this paper we present a Smart Push system with feedback enabled flow control suitable for web enabled mobile and IoT devices. Our push architecture incorporates a gateway client and gateway server component. The flow of the web push notifications is controlled so that they are delivered to the device when the user is most likely to open them. We present an overview and implementation details of the Smart Push system with enhanced web push features, and describe the algorithm running on the gateway server to enable the push flow control. This architecture also provides flexibility for users to move seamlessly across different geographies and mobile operating systems like Android and Tizen without any changes at the content provider's applications servers. We also present results of an experiment performed on multiple users to measure the effectiveness of the system to perform flow control of the notifications to ensure that more of them are clicked.

Research paper thumbnail of Enhancing the scalability of SPDY clients for testing with limited network resources

2015 Annual IEEE India Conference (INDICON), 2015

Currently there are many tools available to generate HTTP loads to test and benchmark the perform... more Currently there are many tools available to generate HTTP loads to test and benchmark the performance of hosted web services such as Amazon Web Service. However, none of these tools currently supports SPDY protocol with a number of concurrent client requests. SPDY over HTTP is recently becoming more popular for web service providers, hence it is desirable to develop tools to benchmark the performance of SPDY enabled servers or clients. In this paper we describe methods by which we can use SPDY network resources optimally for testing purposes, producing more number of network requests with less number of clients. We demonstrate the horizontal scalability of currently supported SPDY network analysis tools and how to overcome their system limitations such as the 64K limit on connections. We also study the tradeoff between the number of threads and the number of processes while generating network loads for testing. Our enhancements include modifications to the spdycat tool to generate the loads for a higher number of users. Our experimental setup consists of cluster of ATS instances hosted on AWS on the backend of the load balancer, and successfully simulate one million active users with two requests per user.

Research paper thumbnail of IoT2Vec: Identification of Similar IoT Devices via Activity Footprints

2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2018

We consider a smart home or smart office environment with a number of IoT devices connected and p... more We consider a smart home or smart office environment with a number of IoT devices connected and passing data between one another. The footprints of the data transferred can provide valuable information about the devices, which can be used to (a) identify the IoT devices and (b) in case of failure, to identify the correct replacements for these devices. In this paper, we generate the embeddings for IoT devices in a smart home using Word2Vec, and explore the possibility of having a similar concept for IoT devices, aka IoT2Vec. These embeddings can be used in a number of ways, such as to find similar devices in an IoT device store, or as a signature of each type of IoT device. We show results of a feasibility study on the CASAS dataset of IoT device activity logs, using our method to identify the patterns in embeddings of various types of IoT devices in a household.

Research paper thumbnail of Relevancy Ranking of User Recommendations of Services Based on Browsing Patterns

2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)

There are a number of inbound web services, which recommend content to users. However, there is n... more There are a number of inbound web services, which recommend content to users. However, there is no way for such services to prioritize their recommendations as per the users' interests. Here we are not interested in generating new recommendations, but rather organizing and prioritizing existing recommendations in order to increase the click rate. Since users have different patterns of browsing that also change frequently, it is good to have a system that prioritizes recommendations based on the current browsing patterns of individual users. In this paper we present such a system. We first generate the clusters of article topics using URLs from the users' browsing history, which is then used to generate the relevancy scores of the recommendation services based on entropy. The relevancy scores are then fed to the service providers, which use them to prioritize their recommendations by ranking them based on the relevancy scores. We test the model using the browsing history for 10 users, and validate the model by calculating the correlation of the generated relevancy scores with the users' manually provided topic preferences. We further use collaborative filtering to benchmark the usefulness of our ranking systems.

Research paper thumbnail of Effect of Mindfulness and Mindful Art on Beginners and Experienced Meditators

Mindfulness meditation has been proven to be effective in treating a range of mental and physical... more Mindfulness meditation has been proven to be effective in treating a range of mental and physical conditions. Mindful Art is a type of mindfulness meditation that comprises sessions of drawing, painting and sculpturing with mindfulness for a given length of time. To date, the efficacy of mindful art has not been systematically studied. In this paper, we describe an experimental pilot study on two groups of participants, a beginner group of 21 participants and an experienced meditation group of 9 participants, who had previously practiced mindfulness meditation for more than one year. The beginner group was instructed in mindfulness sitting and moving meditation, while the experienced group was instructed in mindful art making in addition to mindfulness meditation. The instructions were delivered remotely over Tencent Conference and WeChat. The sessions were of 90 minutes duration each, twice per week, with 45 minutes of home practice daily and the length of the study was 21 days. Th...

Research paper thumbnail of Examining the effectiveness of mindfulness interventions for anxiety in young adults: a narrative synthesis

Background Anxiety disorders, such as generalized anxiety disorder and social anxiety, are a majo... more Background Anxiety disorders, such as generalized anxiety disorder and social anxiety, are a major problem among adolescents and young adults. Structured mindfulness based interventions such as Mindfulness Based Cognitive Therapy (MBCT) and Mindfulness Based Stress Reduction (MBSR) have been shown to be at least as effective as other interventions for treating anxiety, but a thorough analysis of different factors for effective treatments is missing. Objective The objective of this narrative synthesis is to synthesize mindfulness treatments for anxiety in young adults aged between 12 to 25, and examine components of those interventions that are more effective in reducing anxiety. Methods Studies were selected from 3 public databases (APA Psycinfo, Embase, Medline), as well as a manual process to augment the searches. Interventions involving Mindfulness based Cognitive Therapy (MBCT) and Mindfulness based Stress Reduction (MBSR) based studies, as well as their variants were eligible. Anxiety should be one of the measures in the study although it may not be the primary measure. After initial screening and removal of duplicates, 8 studies involving 423 participants were identified. Results Identified themes included customizations for young people, homework and follow ups, qualifications of the instructors, dropout rates, physical activity and subjective experience. Most studies showed a significant decrease in anxiety symptoms, in case of social phobia, chronic pain, stress and academic performance. However, variable scales for measuring anxiety were employed across studies, making it difficult to combine or compare them. The amount of improvement of anxiety was variable. Interventions that included mindfulness information sessions for parents and interventions with mindful physical activity such as yoga showed better results. Conclusion Recommendations are presented to enable more effective mindfulness interventions tailored for young people with anxiety.

Research paper thumbnail of Link-Adaptation for Improved Quality-of-Service in V2V Communication using Reinforcement Learning

Research paper thumbnail of Analysis of Software Engineering for Agile Machine Learning Projects

arXiv (Cornell University), Dec 16, 2019

The number of machine learning, artificial intelligence or data science related software engineer... more The number of machine learning, artificial intelligence or data science related software engineering projects using Agile methodology is increasing. However, there are very few studies on how such projects work in practice. In this paper, we analyze project issues tracking data taken from Scrum (a popular tool for Agile) for several machine learning projects. We compare this data with corresponding data from non-machine learning projects, in an attempt to analyze how machine learning projects are executed differently from normal software engineering projects. On analysis, we find that machine learning project issues use different kinds of words to describe issues, have higher number of exploratory or research oriented tasks as compared to implementation tasks, and have a higher number of issues in the product backlog after each sprint, denoting that it is more difficult to estimate the duration of machine learning project related tasks in advance. After analyzing this data, we propose a few ways in which Agile machine learning projects can be better logged and executed, given their differences with normal software engineering projects.

Research paper thumbnail of Story and Task Issue Analysis for Agile Machine Learning Projects

The usage of Agile methodology in planning and executing machine learning (ML) and data science r... more The usage of Agile methodology in planning and executing machine learning (ML) and data science related software engineering projects is increasing. However, there are very few studies using real data on how effective such planning is or guidelines on how to plan such projects. In this paper, we analyze data taken from several software projects using Scrum tools. We compare the data for data science/ML and non-ML projects, in an attempt to understand if data science and ML projects are planned or executed any differently compared to normal software engineering projects. We also perform a story classification task using machine learning to analyze story logs for agile tasks for several teams. We find there are differences in what makes a good ML story as opposed to a non ML story. After analyzing this data, we propose a few ways in which software projects, whether machine learning related or not, can be better logged and executed using Scrum tools like Jira.

Research paper thumbnail of Enhanced Alternate Action Recommender System Using Recurrent Patterns and Fault Detection System for Smart Home Users

We present a fault tolerant alternate action recommender system for smart home Internet of Things... more We present a fault tolerant alternate action recommender system for smart home Internet of Things (IoT) users to enrich the user experience with uninterrupted routines and various methods to achieve the regular routines in the smart home system. Our system takes events data from the smart home IoT devices as input, performs preprocessing using the big data handling techniques to transform it to be applicable to our system, applies our custom pattern-mining algorithm to derive the highly probable and active recurrent patterns of an individual user, ensures those frequently used devices are up and running using our fault detection monitoring system, and then finally recommends the alternate possibilities of achieving the deviated actions. Our custom fault detection system is based on various parameters of the IoT devices and context of the smart home users wherein the alternate recommendations given to the user are practical and useful in real time. We validated our system using user trial methods and various validation techniques.

Research paper thumbnail of Semi-Supervised Method using Gaussian Random Fields for Boilerplate Removal in Web Browsers

arXiv (Cornell University), Nov 7, 2019

Boilerplate removal refers to the problem of removing noisy content from a webpage such as ads an... more Boilerplate removal refers to the problem of removing noisy content from a webpage such as ads and extracting relevant content that can be used by various services. This can be useful in several features in web browsers such as ad blocking, accessibility tools such as read out loud, translation, summarization etc. In order to create a training dataset to train a model for boilerplate detection and removal, labeling or tagging webpage data manually can be tedious and time consuming. Hence, a semi-supervised model, in which some of the webpage elements are labeled manually and labels for others are inferred based on some parameters, can be useful. In this paper we present a solution for extraction of relevant content from a webpage that relies on semi-supervised learning using Gaussian Random Fields. We first represent the webpage as a graph, with text elements as nodes and the edge weights representing similarity between nodes. After this, we label a few nodes in the graph using heuristics and label the remaining nodes by a weighted measure of similarity to the already labeled nodes. We describe the system architecture and a few preliminary results on a dataset of webpages.

Research paper thumbnail of Intelligent and Secure Autofill System in Web Browsers

Advances in intelligent systems and computing, 2021

Research paper thumbnail of An associative memory fortheon-linerecognition and predictionoftemporal sequences

Thispaperpresents thedesign ofanassociative memorywithfeedback thatiscapable ofon-line temporal s... more Thispaperpresents thedesign ofanassociative memorywithfeedback thatiscapable ofon-line temporal sequence learning. A framework foron-line sequence learning hasbeenproposed, anddifferent sequence learning models have beenanalysed according tothis framework. Thenetwork model isanassociative memorywithaseparate store forthesequence context ofasymbol. A sparse distributed memoryisusedto gainscalability. Thecontext store combines thefunctionality of aneural layer withashift register. Thesensitivity ofthemachine tothesequence context iscontrollable, resulting indifferent characteristic behaviours. Themodelcanstore andpredict on- line sequences ofvarious types andlength. Numerical simulations onthemodelhavebeencarried outtodetermine itsproperties.

Research paper thumbnail of A Generic Visualization Framework based on a Data Driven Approach for the Analytics data

There are a number of analytics dashboard related solutions available today, but currently there ... more There are a number of analytics dashboard related solutions available today, but currently there is no open standard available to integrate different dashboards. In this paper, we provide a dashboard framework to combine data from different analytics sources such as Google Analytics, Flurry, JSON and Excel files, to form a customizable user interface. Our framework uses two configuration files, one for generic meta information and the other for individual services, to configure the dashboard. In our interface, it is possible to program basic calculations based on data from different sources. It is also possible to incorporate interfaces like drag and drop to configure options. Our framework is based on the plugin architecture, which allows easy addition of new data sources. The framework and visualization tool are data driven, meaning that if the source data changes in the future, there is no need to amend the dashboard as well. Our solution can work with local data as well as remote data from AWS servers with added authentication. We present the components of our dashboard solution along with implementation details of a prototype dashboard for a web service.

Research paper thumbnail of Prediction of Throughput Degradation from Trouble Frequencies, given Environmental Unknowns

2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS)

Emergence of carrier aggregation technology to augment user throughput in LTE and 5G technologies... more Emergence of carrier aggregation technology to augment user throughput in LTE and 5G technologies also results in passive intermodulation (PIM) artifacts in frequency-division duplexing (FDD)-based radio transceivers. While it is imperative to suppress PIM distortions, in real time, the problem is more arduous. In practical scenarios, the transmission frequencies are unknown across telecom operators due to security concerns and dynamically changing set of frequencies. PIM detection and mitigation in the face of such environmental unknowns becomes a challenge. In this paper, we address this challenge and propose an automated solution to mitigate PIM in real time. We propose a binary search-based solution that is amenable to real-time implementation. We show through simulations that this search in tandem with a reinforcement learning based solution can dynamically mitigate and cancel PIM. Results show that the number of steps to converge to identify and mitigate the PIM in uplink frequency is reduced by a factor of ~200 (i.e., from 2500 ms to 12 ms) for around 200 combinations of DL PRB combinations.

Research paper thumbnail of Bokeh Effect in Images on Objects Based on User Interest

Humans pay visual attention to those objects in the visual field that they are most interested in... more Humans pay visual attention to those objects in the visual field that they are most interested in seeing. The Bokeh effect is a popular blurring effect in photography, where the object of interest is emphasized by blurring other objects. In this paper, we apply the principle of visual attention to the user's object of interest to post processing of photos taken using a smartphone. We simulate the Bokeh effect of blurring objects in the image except those that the user is interested. This adds a biologically inspired effect to the camera and gallery apps in the smartphone. We first define a hierarchy of user interests in different categories. We then create a user interest profile based on the user's demographics, apps and URLs. We build a user interest vector out of this hierarchy by using a word embedding model, and take the weighted average of the vectors of the words corresponding to the user interests. After this, we detect objects in the image and calculate the similarity of the detected objects with the user interest vector, returning a sorted list of objects the user is interested. The Bokeh effect is applied to the image to blur other objects, thus giving a realistic touch to the image. Finally, we conduct a user study to validate the effectiveness of the system.

Research paper thumbnail of Effect of Mindfulness and Mindful Art on Beginners and Experienced Meditators

Arxiv, 2023

Mindfulness meditation has been proven to be effective in treating a range of mental and physical... more Mindfulness meditation has been proven to be effective in treating a range of mental and physical conditions. Mindful Art is a type of mindfulness meditation that comprises sessions of free drawing with mindfulness for a given length of time. To date, the efficacy of mindful art has not been systematically studied. In this paper, we describe an experimental pilot study on two groups of participants, a beginner group of 21 participants and an experienced meditation group of 9 participants, who had previously practiced mindfulness meditation for one year. The beginner group was instructed in mindfulness sitting and walking meditation, while the experienced group was instructed in mindful drawing in addition to mindfulness meditation. The instructions were delivered remotely over WeChat, the sessions were of 2 hours duration each and the length of the study was 21 days. The blood pressure, pulse rate and breathing rates, as well as the subjective degree of relaxation were recorded at every session. At the end of the study, the experienced group reported higher degrees of improvement in breath rate and relaxation, while the beginner group reported a greater degree of improvement in breath rate and relaxation, although their scores were lower on average than the experienced group.

Research paper thumbnail of A Privacy Preserving Approach for Home Ownership Prediction

2019 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), 2019

Web service providers have access to private user data such as preferences and behaviors of users... more Web service providers have access to private user data such as preferences and behaviors of users, which is used to provide customized or improved services and make predictions. Privacy restrictions such as General Data Protection Regulation (GDPR) mean that such user data should not be traceable back to the original user i.e. the user's privacy should not be compromised. In this paper, we propose a system for predicting home ownership using machine learning, i.e. whether the user is likely to be a homeowner or a renter, on the basis of the user's demographic data, in a way that preserves the user's privacy while making the predictions. Our system uses differential private data perturbation along with homomorphic encryption of the Term Frequency-Inverse Document Frequency (TF-IDF) vectors as the privacy preservation technique to mask the real identities of the users whose home ownership data is predicted. Our trained model is used for prediction on a sample dataset of a few thousand users. We get an accuracy of 69% in the prediction, which is around 4% lower than the algorithm performance without the privacy preservation. This shows that it is feasible to implement privacy preservation techniques on demographic prediction without compromising on the prediction accuracy.

Research paper thumbnail of Auto generation of diagnostic assessments and their quality evaluation

A good diagnostic assessment is one that can (i) discriminate between students of different abili... more A good diagnostic assessment is one that can (i) discriminate between students of different abilities for a given skill set, (ii) be consistent with ground truth data and (iii) achieve this with as few assessment questions as possible. In this paper, we explore a method to meet these objectives. This is achieved by selecting questions from a question database and assembling them to create a diagnostic test paper according to a given configurable policy. We consider policies based on multiple attributes of the questions such as discrimination ability and behavioral parameters, as well as a baseline policy. We develop metrics to evaluate the policies and perform the evaluation using historical student attempt data on assessments conducted on an online learning platform, as well as on a pilot test on the platform administered to a subset of users. We are able to estimate student abilities 40% better with a diagnostic test as compared to baseline policy, with questions derived from a la...

Research paper thumbnail of Security Mechanism for Packaged Web Applications

2017 IEEE International Conference on Web Services (ICWS), 2017

OAuth is an open security standard that enables users to provide specific and time bound rights t... more OAuth is an open security standard that enables users to provide specific and time bound rights to an application to access protected user resources, stored on some external resource server, without needing them to share their credentials, with the application. Using OAuth, a client application gets one access token for further use through an HTTP redirect response from the resource server once the user authenticates the resource access. Unlike websites, for locally installed packaged web applications the main security challenge is to handle the redirect response appropriately. This paper proposes a novel method to execute OAuth flow from such applications with the help of web runtime framework that manages the life cycle of these applications. We compare our approach with other two approaches for OAuth flow handling proposed in the literature. Experimenting with different categories of packaged web applications, we found our approach blocking all illegal OAuth flow executions. Our approach also gives better OAuth response handling time and power consumption performance.

Research paper thumbnail of Intelligent Web Push Architecture with Push Flow Control and Push Continuity

2016 IEEE International Conference on Web Services (ICWS), 2016

In this paper we present a Smart Push system with feedback enabled flow control suitable for web ... more In this paper we present a Smart Push system with feedback enabled flow control suitable for web enabled mobile and IoT devices. Our push architecture incorporates a gateway client and gateway server component. The flow of the web push notifications is controlled so that they are delivered to the device when the user is most likely to open them. We present an overview and implementation details of the Smart Push system with enhanced web push features, and describe the algorithm running on the gateway server to enable the push flow control. This architecture also provides flexibility for users to move seamlessly across different geographies and mobile operating systems like Android and Tizen without any changes at the content provider's applications servers. We also present results of an experiment performed on multiple users to measure the effectiveness of the system to perform flow control of the notifications to ensure that more of them are clicked.

Research paper thumbnail of Enhancing the scalability of SPDY clients for testing with limited network resources

2015 Annual IEEE India Conference (INDICON), 2015

Currently there are many tools available to generate HTTP loads to test and benchmark the perform... more Currently there are many tools available to generate HTTP loads to test and benchmark the performance of hosted web services such as Amazon Web Service. However, none of these tools currently supports SPDY protocol with a number of concurrent client requests. SPDY over HTTP is recently becoming more popular for web service providers, hence it is desirable to develop tools to benchmark the performance of SPDY enabled servers or clients. In this paper we describe methods by which we can use SPDY network resources optimally for testing purposes, producing more number of network requests with less number of clients. We demonstrate the horizontal scalability of currently supported SPDY network analysis tools and how to overcome their system limitations such as the 64K limit on connections. We also study the tradeoff between the number of threads and the number of processes while generating network loads for testing. Our enhancements include modifications to the spdycat tool to generate the loads for a higher number of users. Our experimental setup consists of cluster of ATS instances hosted on AWS on the backend of the load balancer, and successfully simulate one million active users with two requests per user.

Research paper thumbnail of IoT2Vec: Identification of Similar IoT Devices via Activity Footprints

2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2018

We consider a smart home or smart office environment with a number of IoT devices connected and p... more We consider a smart home or smart office environment with a number of IoT devices connected and passing data between one another. The footprints of the data transferred can provide valuable information about the devices, which can be used to (a) identify the IoT devices and (b) in case of failure, to identify the correct replacements for these devices. In this paper, we generate the embeddings for IoT devices in a smart home using Word2Vec, and explore the possibility of having a similar concept for IoT devices, aka IoT2Vec. These embeddings can be used in a number of ways, such as to find similar devices in an IoT device store, or as a signature of each type of IoT device. We show results of a feasibility study on the CASAS dataset of IoT device activity logs, using our method to identify the patterns in embeddings of various types of IoT devices in a household.

Research paper thumbnail of Relevancy Ranking of User Recommendations of Services Based on Browsing Patterns

2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)

There are a number of inbound web services, which recommend content to users. However, there is n... more There are a number of inbound web services, which recommend content to users. However, there is no way for such services to prioritize their recommendations as per the users' interests. Here we are not interested in generating new recommendations, but rather organizing and prioritizing existing recommendations in order to increase the click rate. Since users have different patterns of browsing that also change frequently, it is good to have a system that prioritizes recommendations based on the current browsing patterns of individual users. In this paper we present such a system. We first generate the clusters of article topics using URLs from the users' browsing history, which is then used to generate the relevancy scores of the recommendation services based on entropy. The relevancy scores are then fed to the service providers, which use them to prioritize their recommendations by ranking them based on the relevancy scores. We test the model using the browsing history for 10 users, and validate the model by calculating the correlation of the generated relevancy scores with the users' manually provided topic preferences. We further use collaborative filtering to benchmark the usefulness of our ranking systems.

Research paper thumbnail of Relevancy Ranking (ICMLA 2017)

There are a number of inbound web services, which recommend content to users. However, there is n... more There are a number of inbound web services, which recommend content to users. However, there is no way for such services to prioritize their recommendations as per the users' interests. Here we are not interested in generating new recommendations, but rather organizing and

Research paper thumbnail of Bias Discovery Word Vectors (ICMLA 2017)

Given the ongoing controversy over biased news, it would be useful to have a system that can dete... more Given the ongoing controversy over biased news, it would be useful to have a system that can detect the extent of bias in online news articles and indicate it to the user in real time. In this paper we provide such a system. Here we measure bias in a given sentence or article as the word vector similarity with a corpus of biased words. We compute the word vector similarity of each of the sentences with the words taken from a Wikipedia Neutral Point of View (NPOV) corpus, measured using the word2vec tool, where our model is trained using Wikipedia articles. We then compute the bias score, which indicates how much that article uses biased words. This is implemented as a web browser extension, which queries an online server running our bias detection algorithm. Finally, we validate the accuracy of our bias detection by comparing bias rankings of a variety of articles from various sources. We get lower bias scores for Wikipedia articles than for news articles, which is lower than that for opinion articles.

Research paper thumbnail of Flexible Dashboard (INDICON 2017)

There are a number of analytics dashboard related solutions available today, but currently there ... more There are a number of analytics dashboard related solutions available today, but currently there is no open standard available to integrate different dashboards. In this paper, we provide a dashboard framework to combine data from different analytics sources such as Google Analytics, Flurry, JSON and Excel files, to form a customizable user interface. Our framework uses two configuration files, one for generic meta information and the other for individual services, to configure the dashboard. In our interface, it is possible to program basic calculations based on data from different sources. It is also possible to incorporate interfaces like drag and drop to configure options. Our framework is based on the plugin architecture, which allows easy addition of new data sources. The framework and visualization tool are data driven, meaning that if the source data changes in the future, there is no need to amend the dashboard as well. Our solution can work with local data as well as remote data from AWS servers with added authentication. We present the components of our dashboard solution along with implementation details of a prototype dashboard for a web service.

Research paper thumbnail of INTEGRATED WEB OF THINGS INTERFACE FOR IOT ENVIRONMENT

Research paper thumbnail of Framework to Improve the Web Application Launch Time Framework to Improve the Web Application Launch Time

Too many applications on smartphones consume memory and slow down the performance of the device. ... more Too many applications on smartphones consume memory and slow down the performance of the device. Hence we need web applications which are lightweight and consume less memory on the mobile. Web Applications use the Browser engine and take a lot of time to launch compared to a native application, especially upon device boot up or if the browser is not already running in the background. In this paper, we propose an intelligent framework to launch web applications as fast as native applications. The framework considers the user's usage of web applications and pre-launches the preferred web applications, thus enhancing the launch time performance. We provide the architecture and implementation details of the framework. We then analyze results of an experiment on various web applications to measure the effectiveness of the framework for fast launch of web applications after the device boots Background

Research paper thumbnail of A Hybrid Web Rendering Framework On Cloud IEEE International Conference on Web Services (ICWS

Research paper thumbnail of A Seamless Push Service with Flow Control for Embedded Devices

Push Notification Service is an essential

Research paper thumbnail of Hands Free Web Browser (IJCNN 2015)

Research paper thumbnail of Sequence Machine (IJCNN 2005)

Research paper thumbnail of Flow using a network of spiking neurons (WIRN 2005)

We examine issues involving the transmission of information by spike trains through networks made... more We examine issues involving the transmission of information by spike trains through networks made of real time Asynchronous spiking neurons. For our convenience we use a spiking model that has an intrinsic delay between an input and output spike. We look at issues involving transmission of a desired average level of stable spiking activity over many layers, and show how feedback reset

Research paper thumbnail of Sequence Learning using Spiking Neurons (ICANN 2005)

Address Decoder (Kanerva) Data Memory (CMM) Address Data Output Associative memory is a version o... more Address Decoder (Kanerva) Data Memory (CMM) Address Data Output Associative memory is a version of Kanerva's SDM (Kanerva 88) as used by Furber (Furber 04)

Research paper thumbnail of Encryption in mobile devices using sensors (SAS 2013)

Research paper thumbnail of Segregating Data by Tabs (APWiMob 2014)

Research paper thumbnail of Web of Things Interface for IoT (CONECCT 2015 Poster)

Research paper thumbnail of Smart Meetup (INDICON 2014)

Research paper thumbnail of TV Remote Control via Wearable Smartwatch (INDICON 2014)

Research paper thumbnail of Dynamic Browser Menus (IACC 2015)

Research paper thumbnail of Unified Push Notifications Service (CONECCT 2015)

Research paper thumbnail of Fingerprint Authentication System (SEWAD 2014)

Research paper thumbnail of Responsive and Adaptive Rendering on Web Browsers (INDICON 2014)

Research paper thumbnail of Examining the effectiveness of mindfulness interventions for anxiety in young adults: a narrative synthesis

MSc Dissertation, KCL, 2023

Background Anxiety disorders, such as generalized anxiety disorder and social anxiety, are a majo... more Background Anxiety disorders, such as generalized anxiety disorder and social anxiety, are a major problem among adolescents and young adults. Structured mindfulness based interventions such as Mindfulness Based Cognitive Therapy (MBCT) and Mindfulness Based Stress Reduction (MBSR) have been shown to be at least as effective as other interventions for treating anxiety, but a thorough analysis of different factors for effective treatments is missing. Objective The objective of this narrative synthesis is to synthesize mindfulness treatments for anxiety in young adults aged between 12 to 25, and examine components of those interventions that are more effective in reducing anxiety. Methods Studies were selected from 3 public databases (APA Psycinfo, Embase, Medline), as well as a manual process to augment the searches. Interventions involving Mindfulness based Cognitive Therapy (MBCT) and Mindfulness based Stress Reduction (MBSR) based studies, as well as their variants were eligible. Anxiety should be one of the measures in the study although it may not be the primary measure. After initial screening and removal of duplicates, 8 studies involving 423 participants were identified. Results Identified themes included customizations for young people, homework and follow ups, qualifications of the instructors, dropout rates, physical activity and subjective experience. Most studies showed a significant decrease in anxiety symptoms, in case of social phobia, chronic pain, stress and academic performance. However, variable scales for measuring anxiety were employed across studies, making it difficult to combine or compare them. The amount of improvement of anxiety was variable. Interventions that included mindfulness information sessions for parents and interventions with mindful physical activity such as yoga showed better results. Conclusion Recommendations are presented to enable more effective mindfulness interventions tailored for young people with anxiety.