Dipesh Gautam
University of Memphis
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Dipesh Gautam.
north american chapter of the association for computational linguistics | 2015
Rajendra Banjade; Nobal B. Niraula; Nabin Maharjan; Vasile Rus; Dan Stefanescu; Mihai C. Lintean; Dipesh Gautam
We present in this paper our system developed for SemEval 2015 Shared Task 2 (2a - English Semantic Textual Similarity, STS, and 2c - Interpretable Similarity) and the results of the submitted runs. For the English STS subtask, we used regression models combining a wide array of features including semantic similarity scores obtained from various methods. One of our runs achieved weighted mean correlation score of 0.784 for sentence similarity subtask (i.e., English STS) and was ranked tenth among 74 runs submitted by 29 teams. For the interpretable similarity pilot task, we employed a rule-based approach blended with chunk alignment labeling and scoring based on semantic similarity features. Our system for interpretable text similarity was among the top three best performing systems.
conference on intelligent text processing and computational linguistics | 2015
Rajendra Banjade; Nabin Maharjan; Nobal B. Niraula; Vasile Rus; Dipesh Gautam
Substantial amount of work has been done on measuring word-to-word relatedness which is also commonly referred as similarity. Though relatedness and similarity are closely related, they are not the same as illustrated by the words lemon and tea which are related but not similar. The relatedness takes into account a broader ranLemge of relations while similarity only considers subsumption relations to assess how two objects are similar. We present in this paper a method for measuring the semantic similarity of words as a combination of various techniques including knowledge-based and corpus-based methods that capture different aspects of similarity. Our corpus based method exploits state-of-the-art word representations. We performed experiments with a recently published significantly large dataset called Simlex-999 and achieved a significantly better correlation (ρ = 0.642, P < 0.001) with human judgment compared to the individual performance.
north american chapter of the association for computational linguistics | 2016
Rajendra Banjade; Nabin Maharjan; Dipesh Gautam; Vasile Rus
In this paper we describe our system (DTSim) submitted at SemEval-2016 Task 1: Semantic Textual Similarity (STS Core). We developed Support Vector Regression model with various features including the similarity scores calculated using alignment based methods and semantic composition based methods. The correlations between our system output and the human ratings were above 0.8 in three datasets.
north american chapter of the association for computational linguistics | 2016
Rajendra Banjade; Nabin Maharjan; Nobal B. Niraula; Dipesh Gautam; Borhan Samei; Vasile Rus
Evaluating student answers often requires contextual information, such as previous utterances in conversational tutoring systems. For example, students use coreferences and write elliptical responses, i.e. incomplete but can be interpreted in context. The DT-Grade corpus which we present in this paper consists of short constructed answers extracted from tutorial dialogues between students and an Intelligent Tutoring System and annotated for their correctness in the given context and whether the contextual information was useful. The dataset contains 900 answers (of which about 25% required contextual information to properly interpret them). We also present a baseline system developed to predict the correctness label (such as correct, correct but incomplete) in which weights for the words are assigned based on context.
artificial intelligence in education | 2018
Nabin Maharjan; Dipesh Gautam; Vasile Rus
In this paper, we present an LSTM approach to assess free short answers in tutorial dialogue contexts. A major advantage of the proposed method is that it does not require any sort of feature engineering. The method performs on par and even slightly better than existing state-of-the-art methods that rely on expert-engineered features.
Archive | 2018
Rajendra Banjade; Nabin Maharjan; Dipesh Gautam; Frank Adrasik; Arthur C. Graesser; Vasile Rus
Vector based word representation models are typically developed from very large corpora with the hope that the representations are reliable and have wide coverage, i.e. they cover, ideally, all words. However, we often encounter words in real world applications that are not available in a single vector-based model. In this paper, we present a novel Neural Network (NN) based approach for obtaining representations for words that are missing in a target model from another model, called the source model, where representations for these words are available, effectively pooling together their vocabularies and the corresponding representations. Our experiments with three different types of pre-trained models (Word2vec, GloVe, and LSA) show that the representations obtained using our transformation approach can substantially and effectively extend the word coverage of existing models. The increase in the number of unique words covered by a model varies from few to several times depending on which model vocabulary is taken as reference. The transformed word representations are also well correlated (average correlation up to 0.801 for words in Simlex-999 dataset) with the native target model representations indicating that the transformed vectors can effectively be used as substitutes of native word representations. Furthermore, an extrinsic evaluation based on a word-to-word similarity task using the Simlex-999 dataset leads to results close to those obtained using native target model representations.
international conference on information technology: new generations | 2015
Tara Baniya; Dipesh Gautam; Yoohwan Kim
The growth of Information Technology and Communication has led the world to a dramatic change. People stay connected to each other and are able to access almost every service globally. But cyberspace also opened a new platform for criminal activities because people have to provide the most private information such as user name, password, credit card information, social security number. There are a lot of malware in the web which are designed to conduct various cyber crimes, such as gaining control of the victim system, stealing private information, launching denial-of-service attacks and spamming. Even though there are some good firewalls, anyone can be the victim of cyber attack. In this paper we surveyed on various methods of cyber attacks, attempts to mitigate them, their strength and weakness. We also discuss on generic architecture of URL blacklisting that are being used by various malware detection system.
the florida ai research society | 2015
Nobal B. Niraula; Dipesh Gautam; Rajendra Banjade; Nabin Maharjan; Vasile Rus
the florida ai research society | 2016
Rajendra Banjade; Nabin Maharjan; Dipesh Gautam; Vasile Rus
the florida ai research society | 2018
Nabin Maharjan; Vasile Rus; Dipesh Gautam