Akash Singh | McGill University (original) (raw)
Papers by Akash Singh
Crowdsourcing through human-computing games is an increasingly popular practice for classifying a... more Crowdsourcing through human-computing games is an increasingly popular practice for classifying and analyzing scientific data. Early contributions such as Phylo have now been running for several years. The analysis of the performance of these systems enables us to identify patterns that contributed to their successes, but also possible pitfalls. In this paper, we review the results and user statistics collected since 2010 by our platform Phylo, which aims to engage citizens in comparative genome analysis through a casual tile matching computer game. We also identify features that allow predicting a task difficulty, which is essential for channeling them to human players with the appropriate skill level. Finally, we show how our platform has been used to quickly improve a reference alignment of Ebola virus sequences.
—Debit card or ATM card frauds had been a major sector of concern due to which Reserve Bank of In... more —Debit card or ATM card frauds had been a major sector of concern due to which Reserve Bank of India (RBI) has set new guidelines since December 1, 2013. Now you will have to enter your personal identification number (PIN) every time you swipe your card at any merchant outlet. Taking the existing state of affairs into consideration, in this paper the conventional security issues of the use of ATM and debit cards are discussed along with the feasibility of other alternatives. Then, the research paper will propose a model for secure use of the debit cards and ATM cards via Chaos function and QR code (DACQ model) that bolsters both speed and security without confounding the process or making it undesirable to users.
GNU compiler collection (GCC) is an open source project that includes both compiler as well as li... more GNU compiler collection (GCC) is an open source project that includes both compiler as well as libraries for programming languages such as C, C++, Objective C, Objective C++, Ada, Fortran and Java. This paper describes the architecture of GCC compiler briefly discussing the key architectural decisions that affected the development of GCC.
—Debit card or ATM card frauds had been a major sector of concern due to which Reserve Bank of In... more —Debit card or ATM card frauds had been a major sector of concern due to which Reserve Bank of India (RBI) has set new guidelines since December 1, 2013. Now you will have to enter your personal identification number (PIN) every time you swipe your card at any merchant outlet. Taking the existing state of affairs into consideration, in this paper the conventional security issues of the use of ATM and debit cards are discussed along with the feasibility of other alternatives. Then, the research paper will propose a model for secure use of the debit cards and ATM cards via Chaos function and QR code (DACQ model) that bolsters both speed and security without confounding the process or making it undesirable to users.
The utmost negative impact of advancement of technology is an exponential increase in security th... more The utmost negative impact of advancement of technology is an exponential increase in security threats, due to which tremendous demand for effective electronic security is increasing importantly. Since chaos fundamentals such as ergodicity and high sensitivity to initial conditions are directly connected with two basic properties of good ciphers: confusion and diffusion, so chaos has emerged as a new promising candidate for cryptography. Although significant research has been done on chaos based cryptography still there are some of problems basically speed, that restrict the application of encoding/decoding algorithms. In the proposed technique Arnold cat map & Hénnon map have been employed during permutation substitution process to design a spatial domain based chaotic cryptosystem& only single iteration have been performed to make it faster. Thorough performance, security and comparative analysis ascertains efficacy of the proposed technique.
This study provides a comprehensive architectural overview of the WSO2 IoTServer. The WSO2 IoTSer... more This study provides a comprehensive architectural overview of the WSO2 IoTServer. The WSO2 IoTServer is a device-management-server framework that serves the central management and control requirement of the increasing number of network enabled (smart) devices. The study employs the classic reverse-engineering process to gain an architectural understanding of the complete picture as to how this purpose is achieved. We begin by analyzing the static components of the project and expand towards the dynamic behavior of the system. We identify the most salient architectural decisions of the system and critically analyze its components. The study provides a detailed piece-wise description of how this project is put together. It also serves the important purpose of producing a complete architectural review of such systems related to the IoT domain. Thus, imparting valuable & important knowledge with respect to (software) systems for IoT, to its greater audience.
Drafts by Akash Singh
—This report analyses different classification methods to predict the categories of language from... more —This report analyses different classification methods to predict the categories of language from corpus letter distribution. We evaluate three different machine learning techniques to compare and contrast their suitability for the task of letter-based language classification. We performed this classification operation using Centroid-based text classification and term frequency-inverse conversation frequency (tf-idf) approach. The report explains the feature engineering methodologies used and their outputs. We experiment and evaluate the accuracy and error for four different classifiers: Na¨ıve Bayes, Logistic Regression, k-Nearest Neighbors and Support Vector Machines(SVM). We produce our findings and lessons learned with respect to each classification above. Finally, we explain and discuss the reasoning behind our design choices and the corresponding results. Source code for all the simulations can be found in the given link: https://bitbucket.org/akashsingh93/ml_nlp_proj2 /src/8df1f6cc17134b294e885f2395adaefd8a7c1a98? at=master
The goal of this project is to investigate the reproducibility of empirical results submitted to ... more The goal of this project is to investigate the reproducibility of empirical results submitted to the International Conference on Learning Representations, 2018 for the paper: " CONVOLVING DNA USING TWO-DIMENSIONAL HILBERT CURVE REPRESENTATIONS "-submission number: 377 (id=HJvvRoe0W).
We introduce a Chinese corpus suitable for goal based data-driven learning of dialogue systems. T... more We introduce a Chinese corpus suitable for goal based data-driven learning of dialogue systems. This corpus is constructed using human-human conversations on topics related to economics and economy. The corpus is web-crawled over https://tieba.baidu.com/ and is available with the source code at https://bitbucket.org/comp551proj1/proj1.
People find it confusing to determine the correct architecture for Bash. This technical write-up ... more People find it confusing to determine the correct architecture for Bash. This technical write-up clarifies the architectural doubts of Bash and also includes a brief overview of UML.
Crowdsourcing through human-computing games is an increasingly popular practice for classifying a... more Crowdsourcing through human-computing games is an increasingly popular practice for classifying and analyzing scientific data. Early contributions such as Phylo have now been running for several years. The analysis of the performance of these systems enables us to identify patterns that contributed to their successes, but also possible pitfalls. In this paper, we review the results and user statistics collected since 2010 by our platform Phylo, which aims to engage citizens in comparative genome analysis through a casual tile matching computer game. We also identify features that allow predicting a task difficulty, which is essential for channeling them to human players with the appropriate skill level. Finally, we show how our platform has been used to quickly improve a reference alignment of Ebola virus sequences.
—Debit card or ATM card frauds had been a major sector of concern due to which Reserve Bank of In... more —Debit card or ATM card frauds had been a major sector of concern due to which Reserve Bank of India (RBI) has set new guidelines since December 1, 2013. Now you will have to enter your personal identification number (PIN) every time you swipe your card at any merchant outlet. Taking the existing state of affairs into consideration, in this paper the conventional security issues of the use of ATM and debit cards are discussed along with the feasibility of other alternatives. Then, the research paper will propose a model for secure use of the debit cards and ATM cards via Chaos function and QR code (DACQ model) that bolsters both speed and security without confounding the process or making it undesirable to users.
GNU compiler collection (GCC) is an open source project that includes both compiler as well as li... more GNU compiler collection (GCC) is an open source project that includes both compiler as well as libraries for programming languages such as C, C++, Objective C, Objective C++, Ada, Fortran and Java. This paper describes the architecture of GCC compiler briefly discussing the key architectural decisions that affected the development of GCC.
—Debit card or ATM card frauds had been a major sector of concern due to which Reserve Bank of In... more —Debit card or ATM card frauds had been a major sector of concern due to which Reserve Bank of India (RBI) has set new guidelines since December 1, 2013. Now you will have to enter your personal identification number (PIN) every time you swipe your card at any merchant outlet. Taking the existing state of affairs into consideration, in this paper the conventional security issues of the use of ATM and debit cards are discussed along with the feasibility of other alternatives. Then, the research paper will propose a model for secure use of the debit cards and ATM cards via Chaos function and QR code (DACQ model) that bolsters both speed and security without confounding the process or making it undesirable to users.
The utmost negative impact of advancement of technology is an exponential increase in security th... more The utmost negative impact of advancement of technology is an exponential increase in security threats, due to which tremendous demand for effective electronic security is increasing importantly. Since chaos fundamentals such as ergodicity and high sensitivity to initial conditions are directly connected with two basic properties of good ciphers: confusion and diffusion, so chaos has emerged as a new promising candidate for cryptography. Although significant research has been done on chaos based cryptography still there are some of problems basically speed, that restrict the application of encoding/decoding algorithms. In the proposed technique Arnold cat map & Hénnon map have been employed during permutation substitution process to design a spatial domain based chaotic cryptosystem& only single iteration have been performed to make it faster. Thorough performance, security and comparative analysis ascertains efficacy of the proposed technique.
This study provides a comprehensive architectural overview of the WSO2 IoTServer. The WSO2 IoTSer... more This study provides a comprehensive architectural overview of the WSO2 IoTServer. The WSO2 IoTServer is a device-management-server framework that serves the central management and control requirement of the increasing number of network enabled (smart) devices. The study employs the classic reverse-engineering process to gain an architectural understanding of the complete picture as to how this purpose is achieved. We begin by analyzing the static components of the project and expand towards the dynamic behavior of the system. We identify the most salient architectural decisions of the system and critically analyze its components. The study provides a detailed piece-wise description of how this project is put together. It also serves the important purpose of producing a complete architectural review of such systems related to the IoT domain. Thus, imparting valuable & important knowledge with respect to (software) systems for IoT, to its greater audience.
—This report analyses different classification methods to predict the categories of language from... more —This report analyses different classification methods to predict the categories of language from corpus letter distribution. We evaluate three different machine learning techniques to compare and contrast their suitability for the task of letter-based language classification. We performed this classification operation using Centroid-based text classification and term frequency-inverse conversation frequency (tf-idf) approach. The report explains the feature engineering methodologies used and their outputs. We experiment and evaluate the accuracy and error for four different classifiers: Na¨ıve Bayes, Logistic Regression, k-Nearest Neighbors and Support Vector Machines(SVM). We produce our findings and lessons learned with respect to each classification above. Finally, we explain and discuss the reasoning behind our design choices and the corresponding results. Source code for all the simulations can be found in the given link: https://bitbucket.org/akashsingh93/ml_nlp_proj2 /src/8df1f6cc17134b294e885f2395adaefd8a7c1a98? at=master
The goal of this project is to investigate the reproducibility of empirical results submitted to ... more The goal of this project is to investigate the reproducibility of empirical results submitted to the International Conference on Learning Representations, 2018 for the paper: " CONVOLVING DNA USING TWO-DIMENSIONAL HILBERT CURVE REPRESENTATIONS "-submission number: 377 (id=HJvvRoe0W).
We introduce a Chinese corpus suitable for goal based data-driven learning of dialogue systems. T... more We introduce a Chinese corpus suitable for goal based data-driven learning of dialogue systems. This corpus is constructed using human-human conversations on topics related to economics and economy. The corpus is web-crawled over https://tieba.baidu.com/ and is available with the source code at https://bitbucket.org/comp551proj1/proj1.
People find it confusing to determine the correct architecture for Bash. This technical write-up ... more People find it confusing to determine the correct architecture for Bash. This technical write-up clarifies the architectural doubts of Bash and also includes a brief overview of UML.