1 code implementation • ICON 2021 • Adwait Ratnaparkhi, Atul Kumar
This paper applies contextualized word embedding models to a long-standing problem in the natural language parsing community, namely prepositional phrase attachment.
1 code implementation • 10 Jul 2023 • Debeshee Das, Noble Saji Mathews, Alex Mathai, Srikanth Tamilselvam, Kranthi Sedamaki, Sridhar Chimalakonda, Atul Kumar
To overcome this barrier, we propose our tool COMEX - a framework that allows researchers and developers to create and combine multiple code-views which can be used by machine learning (ML) models for various SE tasks.
no code implementations • 12 Sep 2022 • Diksha Sharma, Parvinder Singh, Atul Kumar
In this work, we analyse and classify sentiments of textual data using a new quantum kernel based on linear and full entangled circuits as hyperparameters for controlling the correlation among words.
no code implementations • 14 Apr 2022 • Qiaohan Zhang, Ivo Bizon, Atul Kumar, Ana Belen Martinez, Marwa Chafii, Gerhard Fettweis
In this paper, we analytically model this interference, and propose an interference cancellation method based on the idea of segmentation of the received signal.
1 code implementation • 10 Feb 2021 • Rupam Bhattacharyya, Sheo Rama, Atul Kumar, Indrajit Banerjee
As an extension to our earlier work on the dynamic associations of pandemic growth, exchange rate, and stock market indices in the context of India, we look at the same question with respect to the BRICS nations.
no code implementations • 23 Jun 2020 • Indrajit Banerjee, Atul Kumar, Rupam Bhattacharyya
Since March 25, 2020, India had been under a nation-wide lockdown announced as a response to the spread of SARS-CoV-2 and COVID-19 and has resorted to a process of 'unlocking' the lockdown over the past couple of months.
no code implementations • 11 Jul 2017 • Atul Kumar, Sameep Mehta
Machine learning based system are increasingly being used for sensitive tasks such as security surveillance, guiding autonomous vehicle, taking investment decisions, detecting and blocking network intrusion and malware etc.
no code implementations • 11 May 2017 • Eric Battenberg, Rewon Child, Adam Coates, Christopher Fougner, Yashesh Gaur, Jiaji Huang, Heewoo Jun, Ajay Kannan, Markus Kliegl, Atul Kumar, Hairong Liu, Vinay Rao, Sanjeev Satheesh, David Seetapun, Anuroop Sriram, Zhenyao Zhu
Replacing hand-engineered pipelines with end-to-end deep learning systems has enabled strong results in applications like speech and object recognition.