Munjal University

Gurgaon, India

Munjal University

Gurgaon, India
SEARCH FILTERS
Time filter
Source Type

Singh S.,Munjal University | Siddiqui T.J.,Allahabad University
Proceedings of the 2016 International Conference on Asian Language Processing, IALP 2016 | Year: 2017

This paper describes about the development and details of a linguistic resource, Sense Annotated Hindi Corpus. Word Sense Disambiguation (WSD) is an important task in Natural Language Processing. Sense annotated Hindi Corpus was developed for Lexical Sample WSD task for Hindi language. It consists of 60 polysemous Hindi nouns. The sense inventory for sense annotated Hindi corpus was derived from Hindi Wordnet. It is available at Technology Development for Indian languages (TDIL) portal. © 2016 IEEE.


Banerjee R.,Munjal University | Bera B.K.,Indian Statistical Institute | Ghosh D.,Indian Statistical Institute | Dana S.K.,Jadavpur University
European Physical Journal: Special Topics | Year: 2017

We report enhancing of complete synchronization in identical chaotic oscillators when their interaction is mediated by a mismatched oscillator. The identical oscillators now interact indirectly through the intermediate relay oscillator. The induced heterogeneity in the intermediate oscillator plays a constructive role in reducing the critical coupling for a transition to complete synchronization. A common lag synchronization emerges between the mismatched relay oscillator and its neighboring identical oscillators that leads to this enhancing effect. We present examples of one-dimensional open array, a ring, a star network and a two-dimensional lattice of dynamical systems to demonstrate how this enhancing effect occurs. The paradigmatic Rössler oscillator is used as a dynamical unit, in our numerical experiment, for different networks to reveal the enhancing phenomenon. © 2017, EDP Sciences and Springer-Verlag GmbH Germany.


A magnetic field-temperature vortex phase diagram has been proposed for MgB2 on the basis of magnetoresistance studies performed on an in-situ prepared stainless steel sheathed MgB2 tapes. Thermally activated flux flow (TAFF) behavior is analyzed using Arrhenius relation. Low dissipative part of magnetoresistance with temperature is well described by vortex glass theory. Above critical region, the resistive behavior is influenced by fluctuation conductivity. In addition, a considerable vortex liquid region below HC2 is also observed but TAFF region is found to be quite narrow. © 2017 Elsevier Ltd


Mishra A.,Indraprastha Institute of Information Technology | Sharma R.,Munjal University
ENASE 2017 - Proceedings of the 12th International Conference on Evaluation of Novel Approaches to Software Engineering | Year: 2017

Requirements gathered during early phase of requirements engineering are informal and vague. These informal requirements are analyzed with the goal of detecting three major problems in requirements -Ambiguity, inconsistency, and incompleteness in order to arrive at correct and formal set of requirements. These problems are quite intertwined, with one problem leading to another. Incompleteness in requirements, however, is considered to be a principal reason for poor quality of requirements, and is the most difficult issue to address. There are multiple views around defining and detecting incompleteness in requirements. In this paper, we present an approach towards handling incompleteness in informal requirements considering individual requirements statement expressed in natural language as an atomic requirement. Our approach is based on enriching frame-based structured representation using FrameNet database that, in turn, can prove useful in identifying potential missing information from requirements. We also report our observations from the evaluation study conducted with a case study. © 2017 by SCITEPRESS - Science and Technology Publications, Lda. All Rights Reserved.


Kalluri V.,Munjal University | Kodali R.,National Institute of Technology Jamshedpur
Proceedings of the International Conference on Industrial Engineering and Operations Management | Year: 2016

Developing new products is a complex and risky decision making process which involves a search of the environment for opportunities, the generation of project options, and the evaluation by different experts of multiple attributes, both qualitative and quantitative. To perceive and to measure effectively the capability of new product development (NPD) remains a real challenging task for business managers. The present study aims to improve the accuracy of decision-making in evaluating performance of innovative product development (IPD) practices under uncertainty. To provide fresh insight to fill some of the knowledge gaps in this area with particular focus on evaluating IPD performance from an organization perspective combined Analytical Hierarchy Process (AHP) and Performance Value Analysis (PVA) methodology is proposed. In this method, the AHP and PVA algorithms are combined where AHP is used to prioritize the elements and then using the prioritization value of elements along with key performance indices for each element, the performance of the system was evaluated by using PVA. To demonstrate the methodology to evaluate the organization's IPD practices performance against the benchmarking organizations, the case study is considered. © IEOM Society International. © IEOM Society International.


Sharma R.,Munjal University
CEUR Workshop Proceedings | Year: 2016

In this paper, we present our system addressing Task 1 of CL-SciSumm Shared Task at BIRNDL 2016. Our system makes use of lexical and syntactic dependency cues, and applies rule-based approach to extract text spans in the Reference Paper that accurately reflect the citances. Further, we make use of lexical cues to identify discourse facets of the paper to which cited text belongs. The lexical and syntactic cues are obtained on pre-processed text of the citances, and the reference paper. We report our results obtained for development set using our system for identifying reference scope of citances in this paper.


Trivedi S.K.,Munjal University | Dey S.,Information Systems Management Institute
ACM International Conference Proceeding Series | Year: 2016

Classification of the spam from bunch of the email files is a challenging research area in text mining domain. However, machine learning based approaches are widely experimented in the literature with enormous success. For excellent learning of the classifiers, few numbers of informative features are important. This researh presents a comparative study between various supervised feature selection methods such as Document Frequency (DF), Chi-Squared ( 2 x), Information Gain (IG), Gain Ratio (GR), Relief F (RF), and One R (OR). Two corpuses (Enron and SpamAssassin) are selected for this study where enron is main corpus and spamAssassin is used for validation of the results. Bayesian Classifier is taken to classify the given corpuses with the help of features selected by above feature selection techniques. Results of this study shows that RF is the excellent feature selection technique amongst other in terms of classification accuracy and false positive rate whereas DF and 2 xwere not so effective methods. Bayesian classifier has proven its worth in this study in terms of good performance accuracy and low false positives. © 2016 ACM.


Awasthi M.K.,University of Petroleum and Energy Studies | Asthana R.,Munjal University | Agrawal G.S.,Manglayatan University
International Journal of Heat and Mass Transfer | Year: 2014

We study the linear Kelvin-Helmholtz instability of the interface between two viscous and incompressible fluids, when the phases are enclosed between two horizontal cylindrical surfaces coaxial with the interface in presence of mass and heat transfer across the interface. Here we use an irrotational theory known as viscous correction for the viscous potential flow theory; in which the discontinuities in the irrotational tangential velocity and shear stress are eliminated in the global energy balance by taking viscous contributions to the irrotational pressure. Both asymmetric and axisymmetric disturbances have been studied and stability criterion is given in terms of a critical value of relative velocity. It has been shown that the irrotational viscous flow with viscous correction gives rise to exactly the same dispersion relation as obtained by the dissipation method in which the viscous effect is accounted for by evaluating viscous dissipation using the irrotational flow. It has been observed that heat and mass transfer has destabilizing effect while irrotational shearing stresses stabilize the system. © 2014 Elsevier Ltd. All rights reserved.


Gupta S.,Munjal University | Gabrani G.,Munjal University
Proceedings of 2016 SAI Computing Conference, SAI 2016 | Year: 2016

The Grid environment is highly dynamic in nature where a variety of users from all over the world try to access the resources that are again distributed all over. Both the users and resources are highly varied. The users can be both valid and invalid, can have single job or multiple jobs, and can have jobs that can have different processing requirements, may be an old loyal user or may be a new one. Similarly the resources can have different characteristics like the processing speed, number of processing elements each resource has, whether the resources have joined or left the grid and so on. In such an environment if an un-authorized user is allowed to access the resource, there is a security threat to the grid. Even if one unauthorized user is allowed to access the grid; the whole grid becomes susceptible to many security threats. So resources should only be available to authorized users. Moreover, as number of users and their jobs increases, they face a lot of competition amongst themselves to get access to the resources. In order to solve the conflicts the resources must be allocated to the users by some arbitration mechanism. In this paper we propose a grid framework that focusses on solving these two major problems namely authentication and arbitration by means of using a robust authentication mechanism and by assigning priority to users and their jobs. In order to achieve secure resource allocation to valid user jobs for maximum resource utilization along with minimizing waiting time and elapsed time of jobs, a secure resource allocation scheme using ECC algorithm with two-level priority has been proposed. The results have been compared with a non-priority based system and our proposed system shows substantial improvement in both waiting time and elapsed time of jobs with better resource utilization. © 2016 IEEE.


Gabrani G.,Munjal University | Saini N.,Munjal University
2016 Symposium on Colossal Data Analysis and Networking, CDAN 2016 | Year: 2016

Software effort estimation is a complicated task being carried out by software developers as very little information is available to them in the early phases of software development. The information collected about various attributes of software needs to be subjective, which otherwise can lead to uncertainty. Inaccurate software effort estimation can be disastrous as both underestimation and overestimation may result in schedule overruns and incorrect estimation of budget. This paper focuses on the comparative study of various non-algorithmic techniques used for estimating the software effort by empirical evaluation of five different evolutionary learning algorithms. The accuracy of these algorithms is found out and the behavior of these algorithms is analyzed with respect to the size and the type of data. All the five techniques are applied on three different datasets and various paramenters such as MMRE, PRED(25), PRED(50), PRED(75) are calculated. The proposed results are compared to other machine learning methods like SVR, ANFIS etc. The results show that evolutionary learning algorithms give more accurate results than machine learning algorithms. © 2016 IEEE.

Loading Munjal University collaborators
Loading Munjal University collaborators