Anupam Basu - Academia.edu (original) (raw)
Papers by Anupam Basu
International Journal of Modeling, Simulation, and Scientific Computing, 2011
Embedded multimedia systems often run multiple time-constrained applications simultaneously. To m... more Embedded multimedia systems often run multiple time-constrained applications simultaneously. To meet the throughput constraints given in the specification, each application must be provided with enough resources by the underlying architecture, which is generally a multiprocessor system-on-chip (MPSoC). For this purpose, a mechanism for task binding and scheduling is required to provide each application with a timing guarantee, keeping in mind the available resources like processor(s) and memory bandwidth. Commonly, synchronous dataflow graphs (SDFGs) are used to model time-constrained multimedia applications. There are resource allocation strategies for SDFGs that help in formulating efficient techniques for calculating the throughput of a bounded and scheduled SDFG. The strategies are effective in terms of run-time and allocated resources. However, there is no unified modeling technique to simultaneously represent the application and the underlying architecture with resource alloca...
Proceedings Sixth International Parallel Processing Symposium
... Abstract In this paper, we propose the design of a library environment, called PAR UL (PARall... more ... Abstract In this paper, we propose the design of a library environment, called PAR UL (PARallelIJser Library), for distributed memory ... PARCLIB - A Parallel Library Based on a Replication Paradigm , Parallel and Distributed Process-ing, K Boyanaov (Editor), Elsevier Publishers ...
Parallel Computing, 1992
The notion of an elimination tree plays a very important role in the parallel algorithms for spar... more The notion of an elimination tree plays a very important role in the parallel algorithms for sparse Cholesky decomposition, symbolic factorization and in determining the mapping of columns of the matrix to processors. In this paper, we present a parallel algorithm to compute the ...
Parallel Computing, 1993
Abstract In this paper, two sorting algorithms Key Select and Superquicksort are described and th... more Abstract In this paper, two sorting algorithms Key Select and Superquicksort are described and their performance is compared with other sorting algorithms namely Parallel Simple Merge, Partial Key Select and Pipemerge [6] on a transputer based message passing multiprocessor system. For each of these algorithms the variation of performance with the number of elements to be sorted and the number of processors is studied. The performance criteria chosen are parallel execution time, speedup and processing efficiency. Experimental and analytical results reveal that the algorithm Superquicksort gives the best performance for medium sized transputer based parallel processing systems, while for multiprocessors with more than sixteen processors, the algorithm Key Select is the fastest.
In this paper, we put forward an information theoretic definition of the redundancy that is obser... more In this paper, we put forward an information theoretic definition of the redundancy that is observed across the sound inventories of the world's languages. Through rigorous statistical analysis, we find that this redundancy is an invariant property of the consonant inventories. The statistical analysis further unfolds that the vowel inventories do not exhibit any such property, which in turn points to the fact that the organizing principles of the vowel and the consonant inventories are quite different in nature.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence
ArXiv, 2020
A number of questionnaire based psychometric testing frameworks are globally for example OCEAN (F... more A number of questionnaire based psychometric testing frameworks are globally for example OCEAN (Five factor) indicator, MBTI (Myers Brigg Type Indicator) etc. However, questionnaire based psychometric tests have some known shortcomings. This work explores whether these shortcomings can be mitigated through computer-based gaming platforms for evaluating psychometric parameters. A computer based psychometric game framework called Antarjami has been developed for evaluating OCEAN (Five factor) indicators. It investigates the feasibility of extracting psychometric parameters through computer-based games, utilizing underlying improvements in the area of modern artificial intelligence. The candidates for the test are subjected to a number scenarios as part of the computer based game and their reactions/responses are used to evaluate their psychometric parameters. As part of the study, the parameters obtained from the game were compared with those evaluated using paper based tests and scor...
Lecture Notes in Computer Science, 2020
Reading of a textual content involves a complex coordination between various parts of brain respo... more Reading of a textual content involves a complex coordination between various parts of brain responsible for visual inputs, language processing, cognitive functions and motor response. In addition, psychological factors like attention and perception play a major role in understanding of the content. Many of these factors get reflected in the behaviour of eye movement, as the content is read. In this paper, we present an approach for analysing a textual content in various scales using eyegaze. The scales include (i) individual fixation characteristics, (ii) saccades and fixations within a line (iii) overall difficulty score of the content. An affordable infrared eye tracking device is used to capture the gaze characteristics in an unobtrusive manner. Two types (easy and difficult) of textual contents are designed for the experiment which are benchmarked using standard readability indices. The fixation characteristics include fixation duration, change in drift direction within a fixation and spatial area of a fixation. Using Analysis of Variance (ANOVA), the former two are found to be statistically significant in distinguishing the two types of contents. Within a line, the spatial distance between fixations and the number of switching between saccades and fixations characterize the flow during a reading where the later is found to be statistically significant. A mixture of two partial sigmoid is used as a mapping function to compute the difficulty score of a content from the significant features. For a given content, the variation of these scores among individual readers, enables us to get deeper insights into their cognitive and psychological aspects.
Lecture Notes in Computer Science, 1990
This paper discusses an analytical model for evaluating the performance of any message passing mu... more This paper discusses an analytical model for evaluating the performance of any message passing multiprocessor achieving concurrency by domain decomposition i.e., by partitioning the data domain into sub-domains, computation on each of which is carried out on a different processor. Studies on different numerical algorithms reveal that execution of an algorithm can be modelled as repetitive cycles where a cycle consists of computation followed by communication or it may consist of computation with overlapped cowanunication.The expression for parallel execution times and speed-upg are given for different models of algorithm execution when the data domain is partitioned into sub-domains of equal size and all the processors execute the same program. The model has been validated by measurements on a parallel processing system based on four Transputers and the results reveal that the model proposed here can predict the performance with high accuracy. The model is being used in C-DAC to predict the performance of matrix algorithms for a variable number of Transputers and for different sizes of the data sub-domain assigned to each processor.
IEEE Transactions on Computers, 1971
The irredundant prime closed sets play an important role in the simplification of an incompletely... more The irredundant prime closed sets play an important role in the simplification of an incompletely specified flow table. In this note, an algebraic method for deriving the irredundant prime closed sets corresponding to any given flow table has been presented. It has been shown that the complete set of irredundant prime closed sets is obtained following the procedure suggested. Index Terms-Class set, closed set, closure condition table, cover chart, eliminability condition, flow table, implication table, maximum compatibility class, minimal cover, prime class, prime closed set, redundant and irredundant closure sets, redundant and irredundant prime closed sets.
Limited infrastructural support and lack of adequate teachers demand for a distance education sys... more Limited infrastructural support and lack of adequate teachers demand for a distance education system which can be used to augment the learning of students especially in rural areas of India and other developing countries. We propose novel technological methods to create a solution for distance education which uses existing wide spread satellite broadcast TV network. The solution has two additional components namely a content creator in the broadcast end and a low cost Home Infotainment Platform (HIP) [2] device in the user end. Apart from the video and audio, the associated metadata related to the question-answers (QA) and Electronic Program Guide (EPG) of the tutorials are also transmitted from the broadcast end. A method is proposed to embed the metadata as part of the video frame so that it is accessible in the analog input of the HIP client box. A detailed analysis on the effect of noise demonstrates the sustainability of the metadata in the analog video frame for the existing end to end TV broadcast network.
Lecture Notes in Computer Science, 2017
the source, provide a link to the Creative Commons license and indicate if changes were made. The... more the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this book are included in the book's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the book's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
… conference on natural …, 2008
In this paper, we explore certain complex network properties of the Wordnet to de-vise a suitable... more In this paper, we explore certain complex network properties of the Wordnet to de-vise a suitable technique that successfully distinguishes the emotional words from the non-emotional ones. We observe that the popular centrality based measures of complex networks are not ...
... This tendency results from faithfulness to the lexical conventions and has important role to ... more ... This tendency results from faithfulness to the lexical conventions and has important role to play in intelligibility of the speech. ... Here, we describe the various word-formationrules in Hindi, and their affect on the syllable structure. ...
... Disorders Animesh Mukherjee, Samit Bhattacharya, Prankrishna Halder & Anu... more ... Disorders Animesh Mukherjee, Samit Bhattacharya, Prankrishna Halder & Anupam Basu Indian Institute of Technology, Kharagpur-721302, India E-mail: {animeshm@ iitkgp.ac.in, samit@cse.iitkgp.ernet.in, anupam@iitkgp.ac.in} ...
... Section 4 shows how the schwa deletion algorithm so designed can be used for syllable boundar... more ... Section 4 shows how the schwa deletion algorithm so designed can be used for syllable boundary marking using some very simple rules. The problem of anusvara and chandra-bindu pronunciation is dealt with next. ... For example in priya [Ê|ɪÉ, pri.jə, beloved]. ...
... Sambit Shukla NIT, Rourkela sks.at.nit r@gmail.co m Sandeep Kumar NIT, Allahabad. mnnit.sand ... more ... Sambit Shukla NIT, Rourkela sks.at.nit r@gmail.co m Sandeep Kumar NIT, Allahabad. mnnit.sand eep@gmail. com Synny Diwakar NIT, Suratkal sunny.diwaka rnitk@gmail. comAnupam Basu IIT, Kharagpur Anupam-bas@gmail. com Abstract ...
This paper describes our work on building Part-of-Speech (POS) tagger for Bengali. We have use Hi... more This paper describes our work on building Part-of-Speech (POS) tagger for Bengali. We have use Hidden Markov Model (HMM) and Maximum Entropy (ME) based stochastic taggers. Bengali is a morphologically rich language and our taggers make use of morphological and contextual information of the words. Since only a small labeled training set is available (45,000 words), simple stochastic approach does not yield very good results. In this work, we have studied the effect of using a morphological analyzer to improve the performance of the tagger. We find that the use of morphology helps improve the accuracy of the tagger especially when less amount of tagged corpora are available.
The population with severe speech and motor impairments (SSMI) depend solely on the Augmentative ... more The population with severe speech and motor impairments (SSMI) depend solely on the Augmentative and Alternative Communication Techniques (AAC) for their education and communication needs. Unfortunately, the AAC tools are expensive with respect to the Indian people and the language being English is not usable by the majority of the population. Also, the AAC technique being essentially icon-driven, the icons need to socioculturally relevant to the Indian population. In this paper, we present an overview of one education tool and a communication tool that caters to the multilingual need. We also present an access switch mechanism and a corresponding GUI tuned to the access mechanism, for replacing the mouse, which requires finer motor control-an ability absent in most of the people with SSMI. The proposed systems are indigenous and affordable as well.
Morphological synthesis is an essential part of any natural language generation system. bengali i... more Morphological synthesis is an essential part of any natural language generation system. bengali is a highly inflectional language with more than 160 different inflected forms for verbs and 36 different forms for nouns, and 24 different forms for pronouns. Moreover, the choice and ordering of suffixes for nouns and structural changes in verb morphology are dependent on the type (animate/inanimate etc) and syllable structure of the root respectively. We describe here a rulebased approach for Bengali morphological synthesis. For nouns and pronouns, the synthesis engine selects the appropriate suffixes, determines the ordering among them, and concatenates them according to the rules. The verb roots have been classified under 19 categories based on the syllable structure. An FSM is used to recognize the category of the root. Thereafter, a simple algorithm generates the inflected form of the verb based on suffix table and rule tables for the classes.
International Journal of Modeling, Simulation, and Scientific Computing, 2011
Embedded multimedia systems often run multiple time-constrained applications simultaneously. To m... more Embedded multimedia systems often run multiple time-constrained applications simultaneously. To meet the throughput constraints given in the specification, each application must be provided with enough resources by the underlying architecture, which is generally a multiprocessor system-on-chip (MPSoC). For this purpose, a mechanism for task binding and scheduling is required to provide each application with a timing guarantee, keeping in mind the available resources like processor(s) and memory bandwidth. Commonly, synchronous dataflow graphs (SDFGs) are used to model time-constrained multimedia applications. There are resource allocation strategies for SDFGs that help in formulating efficient techniques for calculating the throughput of a bounded and scheduled SDFG. The strategies are effective in terms of run-time and allocated resources. However, there is no unified modeling technique to simultaneously represent the application and the underlying architecture with resource alloca...
Proceedings Sixth International Parallel Processing Symposium
... Abstract In this paper, we propose the design of a library environment, called PAR UL (PARall... more ... Abstract In this paper, we propose the design of a library environment, called PAR UL (PARallelIJser Library), for distributed memory ... PARCLIB - A Parallel Library Based on a Replication Paradigm , Parallel and Distributed Process-ing, K Boyanaov (Editor), Elsevier Publishers ...
Parallel Computing, 1992
The notion of an elimination tree plays a very important role in the parallel algorithms for spar... more The notion of an elimination tree plays a very important role in the parallel algorithms for sparse Cholesky decomposition, symbolic factorization and in determining the mapping of columns of the matrix to processors. In this paper, we present a parallel algorithm to compute the ...
Parallel Computing, 1993
Abstract In this paper, two sorting algorithms Key Select and Superquicksort are described and th... more Abstract In this paper, two sorting algorithms Key Select and Superquicksort are described and their performance is compared with other sorting algorithms namely Parallel Simple Merge, Partial Key Select and Pipemerge [6] on a transputer based message passing multiprocessor system. For each of these algorithms the variation of performance with the number of elements to be sorted and the number of processors is studied. The performance criteria chosen are parallel execution time, speedup and processing efficiency. Experimental and analytical results reveal that the algorithm Superquicksort gives the best performance for medium sized transputer based parallel processing systems, while for multiprocessors with more than sixteen processors, the algorithm Key Select is the fastest.
In this paper, we put forward an information theoretic definition of the redundancy that is obser... more In this paper, we put forward an information theoretic definition of the redundancy that is observed across the sound inventories of the world's languages. Through rigorous statistical analysis, we find that this redundancy is an invariant property of the consonant inventories. The statistical analysis further unfolds that the vowel inventories do not exhibit any such property, which in turn points to the fact that the organizing principles of the vowel and the consonant inventories are quite different in nature.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence
ArXiv, 2020
A number of questionnaire based psychometric testing frameworks are globally for example OCEAN (F... more A number of questionnaire based psychometric testing frameworks are globally for example OCEAN (Five factor) indicator, MBTI (Myers Brigg Type Indicator) etc. However, questionnaire based psychometric tests have some known shortcomings. This work explores whether these shortcomings can be mitigated through computer-based gaming platforms for evaluating psychometric parameters. A computer based psychometric game framework called Antarjami has been developed for evaluating OCEAN (Five factor) indicators. It investigates the feasibility of extracting psychometric parameters through computer-based games, utilizing underlying improvements in the area of modern artificial intelligence. The candidates for the test are subjected to a number scenarios as part of the computer based game and their reactions/responses are used to evaluate their psychometric parameters. As part of the study, the parameters obtained from the game were compared with those evaluated using paper based tests and scor...
Lecture Notes in Computer Science, 2020
Reading of a textual content involves a complex coordination between various parts of brain respo... more Reading of a textual content involves a complex coordination between various parts of brain responsible for visual inputs, language processing, cognitive functions and motor response. In addition, psychological factors like attention and perception play a major role in understanding of the content. Many of these factors get reflected in the behaviour of eye movement, as the content is read. In this paper, we present an approach for analysing a textual content in various scales using eyegaze. The scales include (i) individual fixation characteristics, (ii) saccades and fixations within a line (iii) overall difficulty score of the content. An affordable infrared eye tracking device is used to capture the gaze characteristics in an unobtrusive manner. Two types (easy and difficult) of textual contents are designed for the experiment which are benchmarked using standard readability indices. The fixation characteristics include fixation duration, change in drift direction within a fixation and spatial area of a fixation. Using Analysis of Variance (ANOVA), the former two are found to be statistically significant in distinguishing the two types of contents. Within a line, the spatial distance between fixations and the number of switching between saccades and fixations characterize the flow during a reading where the later is found to be statistically significant. A mixture of two partial sigmoid is used as a mapping function to compute the difficulty score of a content from the significant features. For a given content, the variation of these scores among individual readers, enables us to get deeper insights into their cognitive and psychological aspects.
Lecture Notes in Computer Science, 1990
This paper discusses an analytical model for evaluating the performance of any message passing mu... more This paper discusses an analytical model for evaluating the performance of any message passing multiprocessor achieving concurrency by domain decomposition i.e., by partitioning the data domain into sub-domains, computation on each of which is carried out on a different processor. Studies on different numerical algorithms reveal that execution of an algorithm can be modelled as repetitive cycles where a cycle consists of computation followed by communication or it may consist of computation with overlapped cowanunication.The expression for parallel execution times and speed-upg are given for different models of algorithm execution when the data domain is partitioned into sub-domains of equal size and all the processors execute the same program. The model has been validated by measurements on a parallel processing system based on four Transputers and the results reveal that the model proposed here can predict the performance with high accuracy. The model is being used in C-DAC to predict the performance of matrix algorithms for a variable number of Transputers and for different sizes of the data sub-domain assigned to each processor.
IEEE Transactions on Computers, 1971
The irredundant prime closed sets play an important role in the simplification of an incompletely... more The irredundant prime closed sets play an important role in the simplification of an incompletely specified flow table. In this note, an algebraic method for deriving the irredundant prime closed sets corresponding to any given flow table has been presented. It has been shown that the complete set of irredundant prime closed sets is obtained following the procedure suggested. Index Terms-Class set, closed set, closure condition table, cover chart, eliminability condition, flow table, implication table, maximum compatibility class, minimal cover, prime class, prime closed set, redundant and irredundant closure sets, redundant and irredundant prime closed sets.
Limited infrastructural support and lack of adequate teachers demand for a distance education sys... more Limited infrastructural support and lack of adequate teachers demand for a distance education system which can be used to augment the learning of students especially in rural areas of India and other developing countries. We propose novel technological methods to create a solution for distance education which uses existing wide spread satellite broadcast TV network. The solution has two additional components namely a content creator in the broadcast end and a low cost Home Infotainment Platform (HIP) [2] device in the user end. Apart from the video and audio, the associated metadata related to the question-answers (QA) and Electronic Program Guide (EPG) of the tutorials are also transmitted from the broadcast end. A method is proposed to embed the metadata as part of the video frame so that it is accessible in the analog input of the HIP client box. A detailed analysis on the effect of noise demonstrates the sustainability of the metadata in the analog video frame for the existing end to end TV broadcast network.
Lecture Notes in Computer Science, 2017
the source, provide a link to the Creative Commons license and indicate if changes were made. The... more the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this book are included in the book's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the book's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
… conference on natural …, 2008
In this paper, we explore certain complex network properties of the Wordnet to de-vise a suitable... more In this paper, we explore certain complex network properties of the Wordnet to de-vise a suitable technique that successfully distinguishes the emotional words from the non-emotional ones. We observe that the popular centrality based measures of complex networks are not ...
... This tendency results from faithfulness to the lexical conventions and has important role to ... more ... This tendency results from faithfulness to the lexical conventions and has important role to play in intelligibility of the speech. ... Here, we describe the various word-formationrules in Hindi, and their affect on the syllable structure. ...
... Disorders Animesh Mukherjee, Samit Bhattacharya, Prankrishna Halder & Anu... more ... Disorders Animesh Mukherjee, Samit Bhattacharya, Prankrishna Halder & Anupam Basu Indian Institute of Technology, Kharagpur-721302, India E-mail: {animeshm@ iitkgp.ac.in, samit@cse.iitkgp.ernet.in, anupam@iitkgp.ac.in} ...
... Section 4 shows how the schwa deletion algorithm so designed can be used for syllable boundar... more ... Section 4 shows how the schwa deletion algorithm so designed can be used for syllable boundary marking using some very simple rules. The problem of anusvara and chandra-bindu pronunciation is dealt with next. ... For example in priya [Ê|ɪÉ, pri.jə, beloved]. ...
... Sambit Shukla NIT, Rourkela sks.at.nit r@gmail.co m Sandeep Kumar NIT, Allahabad. mnnit.sand ... more ... Sambit Shukla NIT, Rourkela sks.at.nit r@gmail.co m Sandeep Kumar NIT, Allahabad. mnnit.sand eep@gmail. com Synny Diwakar NIT, Suratkal sunny.diwaka rnitk@gmail. comAnupam Basu IIT, Kharagpur Anupam-bas@gmail. com Abstract ...
This paper describes our work on building Part-of-Speech (POS) tagger for Bengali. We have use Hi... more This paper describes our work on building Part-of-Speech (POS) tagger for Bengali. We have use Hidden Markov Model (HMM) and Maximum Entropy (ME) based stochastic taggers. Bengali is a morphologically rich language and our taggers make use of morphological and contextual information of the words. Since only a small labeled training set is available (45,000 words), simple stochastic approach does not yield very good results. In this work, we have studied the effect of using a morphological analyzer to improve the performance of the tagger. We find that the use of morphology helps improve the accuracy of the tagger especially when less amount of tagged corpora are available.
The population with severe speech and motor impairments (SSMI) depend solely on the Augmentative ... more The population with severe speech and motor impairments (SSMI) depend solely on the Augmentative and Alternative Communication Techniques (AAC) for their education and communication needs. Unfortunately, the AAC tools are expensive with respect to the Indian people and the language being English is not usable by the majority of the population. Also, the AAC technique being essentially icon-driven, the icons need to socioculturally relevant to the Indian population. In this paper, we present an overview of one education tool and a communication tool that caters to the multilingual need. We also present an access switch mechanism and a corresponding GUI tuned to the access mechanism, for replacing the mouse, which requires finer motor control-an ability absent in most of the people with SSMI. The proposed systems are indigenous and affordable as well.
Morphological synthesis is an essential part of any natural language generation system. bengali i... more Morphological synthesis is an essential part of any natural language generation system. bengali is a highly inflectional language with more than 160 different inflected forms for verbs and 36 different forms for nouns, and 24 different forms for pronouns. Moreover, the choice and ordering of suffixes for nouns and structural changes in verb morphology are dependent on the type (animate/inanimate etc) and syllable structure of the root respectively. We describe here a rulebased approach for Bengali morphological synthesis. For nouns and pronouns, the synthesis engine selects the appropriate suffixes, determines the ordering among them, and concatenates them according to the rules. The verb roots have been classified under 19 categories based on the syllable structure. An FSM is used to recognize the category of the root. Thereafter, a simple algorithm generates the inflected form of the verb based on suffix table and rule tables for the classes.