SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Siri-Bhoovalaya from Computer
Science Perspective
Presented at a Bharatvani Project Workshop on
Potentials of Siri Bhoovalaya for application and research in Linguistics
and Computer Science
at
Central Institute of Indian Languages, Mysuru
on 27th September 2016
by
Anil Kumar Jain
Siri-Bhoovalaya Vak-Peeth Project
Siri-Bhoovalaya Web-Site Project
web-site: siri-bhoovalaya.org
Agenda of this Presentation
• High Level Steps for Computerisation to reveal
contents of a Chakra
• Transposition Schemes - Bandhas
• Phonetic Alphabet Coding Scheme - Ankaakshar
• Illustration of basic Steps
• Steganography to disclose multilingual contents
• Visual Crytpography - Chitra Bandha
• Research Potentials and Challenges
High Level Steps to Decipher a Chakra
1. Select Transformation functions defined as Bandhas as
applicable to the selected Chakra.
2. Transform two dimensional matrix of the Chakra into a row
vector using algorithm for the Transformation Function as
specified in Bandha.
3. Apply Mono-alphabetic Substitution to replace numerals in
row vector with respective Phonetic Alphabets.
4. Join alphabets to form words and add punctuations as per
grammar rules of the language (Kannada).
5. Derive interlaced multilingual alphabets as per defined
scheme and format these as per grammar rules of the
target language (Prakrit, Samskrit, Pali, Apabransh, Telugu,
Tamil etc. etc.)
Step-1 Transposition Scheme
Definition: In cryptography, a transposition cipher is a
method of encryption by which the positions held by
units of plaintext (which are commonly characters or
groups of characters) are shifted according to a regular
system, so that the cipher text constitutes
a permutation of the plaintext. That is, the order of the
units is changed (the plaintext is reordered).
Application: Bandhas in Siri-Bhoovalaya basically are
Transposition Schemes to convert two-dimensional
Chakra into a single dimensional string of numbers.
Step-2 Chakra-Bandha
(Implementation of one of the Transposition Schemes)
Step- 2 Navmank Bandh
Transposition with Recursion
Navmank Bandh
is applied from
Second Adhyaya
to Eighth Adhyaya
with different
sequence of Tiles
in each of these
Adhyaya.
Each tile, called
as UpChakra, is
traversed in the
same manner as
in Chakra Bandh.
Step – 3 Substitution Scheme
Definition: In cryptography, a substitution
cipher is a method of encoding by which units
of plaintext are replaced with cipher text,
according to a fixed system. The receiver
deciphers the text by performing the inverse
substitution.
Application: Phonetic Alphabets are
substituted to the string of numbers resulting
from Step-2.
Multilingual Phonetic Alphabet Encoding Scheme
Kumudendu Code Table
(for implementation of Mono-alphabetic Substitution Cipher)
Multilingual Phonetic Alphabet Classification
in
Kumudendu Code Table
Chakra Bandha Example with 5x5 matrix
Step-1 & Step-2
1 2 3 4 5
1 4 53 28 45 4
2 1 45 47 59 54
3 7 16 1 56 55
4 28 43 8 1 52
5 10 51 1 7 7
1 2 3 4 5
1 17 24 1 8 15
2 23 5 7 14 16
3 4 6 13 20 22
4 10 12 19 21 3
5 11 18 25 2 9
Example Chakra (5x5) Step-1 : Chakra-Bandha (5x5)
28 7 52 7 45 16 47 45 7 28 10 43 1 59 4 54 4 51 8 56 1 55 1 53 1
Step -2 : Result of Applying Bandha - Matrix to Vector
Step - 3 & Step - 4
Applying Substitution using Kumudendu
Code Table and applying grammar rules
Result of Step -2 Chakra-Bandh from previous
slide and results after applying Step-3 & Step-4
First Chakra in Mangal Prabhrut
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27
1 59 23 1 16 1 28 28 1 1 56 59 4 56 1 1 47 16 34 1 7 16 1 1 7 56 1 60
2 53 54 47 28 1 47 45 28 7 4 59 41 4 45 1 30 47 47 45 42 53 28 51 1 52 1 1
3 1 22 1 30 2 1 2 55 30 1 7 45 47 52 1 4 1 47 1 1 1 1 53 1 52 59 52
4 59 30 2 55 55 13 16 2 53 60 1 4 16 47 48 45 16 56 56 43 45 1 56 1 4 1 13
5 47 45 1 1 22 30 51 1 2 56 38 30 4 1 1 56 1 1 16 1 57 7 56 56 1 22 1
6 54 52 52 45 1 7 55 48 1 58 52 35 28 55 1 38 45 30 55 4 47 7 45 38 45 38 1
7 1 1 1 28 13 56 55 51 54 1 1 1 1 42 2 4 4 1 43 16 47 7 1 13 4 51 4
8 28 53 47 22 8 1 53 59 38 7 43 40 1 52 59 54 30 1 45 16 1 28 23 50 7 43 43
9 1 2 45 51 30 1 52 58 48 59 47 54 4 4 1 47 45 47 56 28 1 45 1 13 7 7 7
10 55 1 53 47 56 1 1 7 1 1 2 60 48 56 1 1 16 1 1 54 1 52 17 30 54 45 45
11 59 56 52 1 45 1 55 28 52 28 1 2 1 52 54 4 43 60 48 28 1 16 23 8 53 7 1
12 2 1 53 52 43 23 2 4 16 52 44 54 1 2 42 7 1 7 47 30 28 48 47 1 54 52 16
13 45 54 23 4 28 45 45 30 1 59 1 56 28 2 54 53 38 2 2 1 28 55 40 60 4 50 28
14 2 13 47 1 1 4 17 45 1 56 1 52 56 51 1 47 55 55 45 7 2 54 1 56 7 1 1
15 23 4 53 54 59 48 13 56 1 47 23 1 2 55 16 1 1 47 40 54 16 52 1 47 60 43 60
16 45 16 43 1 7 47 1 7 1 4 54 54 1 43 28 28 7 1 2 7 52 30 1 4 47 4 13
17 42 1 54 13 1 28 1 45 42 5 48 56 1 1 1 52 54 7 1 1 2 56 56 2 43 1 1
18 56 43 22 45 56 43 2 2 56 1 8 48 59 59 7 16 53 55 53 48 1 1 46 2 30 53 1
19 47 45 1 2 54 56 56 2 55 51 4 16 7 13 30 16 1 1 4 52 52 4 54 47 2 38 1
20 1 54 60 56 54 1 60 1 1 16 40 38 17 1 47 56 33 55 1 1 59 48 1 53 7 1 1
21 1 52 16 1 60 1 30 53 30 7 47 13 13 22 8 13 45 59 54 1 2 42 54 47 53 52 53
22 16 30 1 4 52 47 56 1 28 16 1 22 59 51 1 1 7 28 53 60 7 1 16 16 1 1 58
23 4 53 56 1 52 2 13 52 38 30 45 7 1 30 56 16 1 1 1 30 48 56 54 54 55 28 45
24 1 47 47 1 28 22 1 47 1 1 45 46 1 1 47 53 55 52 1 1 7 43 2 1 1 1 43
25 1 4 53 1 45 43 16 55 52 4 47 55 45 22 51 56 1 38 13 30 2 28 56 13 56 28 55
26 4 16 46 1 1 16 1 1 1 1 1 47 59 4 8 38 58 1 1 48 1 7 22 1 1 1 60
27 52 4 30 56 53 52 54 1 30 52 1 16 54 7 58 1 30 54 1 56 51 53 56 57 56 4 60
Output from Chakra Bandha Applied to
first Chakra of Siri Bhoovalaya
Resultant text after manually conjoining phonetic alphabets :
Step – 5 Deriving Interlaced
Multilingual Content
Definition: Steganography is the practice of concealing
a file, message, image, or video within another file,
message, image, or video. Thus, whereas cryptography
is the practice of protecting the contents of a message
alone, steganography is concerned with concealing the
fact that a secret message is being sent, as well as
concealing the contents of the message.
Application: Multilingual contents are interlaced into
base content in Kannada and are extracted as per
corresponding schemes applicable to each of different
languages.
Step -5 Example of Multi-Lingual content
from First Adhyaya
Step – 5 : Content in Prakrit & Samskrit
from First Chakra
Step -5 : Example of Multi-lingual contents from
first Anubandh of Shrutavatar
Step – 5 : Content in Prakrit, Geervan, Telugu, Tamil
& Apabhramsh from first anubandha of Shrutavatar
Chitra Bandha / Chitra Kavya
Visual Cryptography is a cryptographic technique
which allows visual information (pictures, text, etc.)
to be encrypted in such a way that decryption
becomes the job of the person to decrypt via sight
reading.
Application: Muni Kumudendu has vividly used Chitra
Bandha to demostrate his brilliance as graphics artist
too. This is also one of justification of his using two
dimensional arrays (27x27 matrix ) as a Canvas for
Chitra Kavya.
Visual Cryptography (Chitra Bandha)
example
In following example a graphical figure is used as key to
extract the hidden message.
Superimposing the figure on Chakra at
defined position to reveal content in those
particular cells in manner as shown
Derivation of Shrutavatar Chakra
from Mangal Prabhrut Chakra
Why Muni Kumudendu is Inimitable?
• Master Mathematician who shone with brilliance in
creating intricate framework of Chakras and Bandhas.
• Eminent Scholar of religious foundations, scriptures,
practices and ancient sciences of diverse domains.
• Highly Competent Linguist with proficiency in multiple
languages prevalent in India at his time.
• Extremely genius poet who chose two-dimensional
array of numerals for his creative expressions.
• Great Composer who intertwined verses in multiple
languages into a solitary piece of magnificient work.
• Exceedingly Talented Graphics artist who could
implant poetry into multitude of shapes and figures.
Importance of further Research
• Rajendra Prasad, the first President of India,
called it one of the ‘Wonders of the World'.
Giants of Kannada literature have evinced keen
interest in this magnificent creation. Prof Suniti
Kumar Chatterjee have exclaimed that the work
deserved a doctorate by several universities.
• Dr S. Srikanta Sastri, a highly respected name in
the study of Indian history and culture, has
commented vividly on the importance this unique
work from many-fold perspectives.
Research Areas from Computer
Science Perspective
1. Development of Algorithms for different categories of
Bandhas. (Matrix to Row transformation)
2. Digitisation of all Chakras suitable for Computer processing.
3. Derivation of Chakras of other Khandas from Mangal
Prabhrut.
4. NLP (Natural Language Processing) / Computational
Linguistics implementation for language specific grammar
rules on the content derived for different languages and
translation thereof.
5. Integration of IPA (International Phonetic Alphabet) and
cross platform Speech conversion.
6. Multilingual content extraction from base content,
classification and indexing of entire content suitable for
search engines.
Major Challenges
• There exist no Credible Platform or Forum which can bring
together persons pursuing research on Siri-Bhoovalaya. There are
many islands of endeavour but no bridges to consolidate and
promote sharing amongst them.
• Teams consisting of Mathematicians, Linguistics, Subject Matter
Experts / Scholars and Computer Scientist are needed in order to
fully unearth the hidden treasure buried inside this masterpiece.
Efforts in this direction is not visible.
• Very small cross-section of individuals are not only able to
appreciate Siri-Bhoovalaya, but have not even heard of it, as there
has been very little effort for public awareness towards this
unparalleled masterpiece. It should not only be considered a matter
of pride for Kannada speaking population but must be accorded
honour as a unique World Heritage. This is more so because Muni
Kumudendu used numerals, which are universal symbols, instead of
any language specific alphabets.
Siri Bhoovalaya: A Unique Multilingual Epic Scripted in Numerals
An Inimitable Cryptographic Creation: Siri Bhoovalaya
Creativity in Cryptography: An Epic Scripted in
Numerals only

Weitere ähnliche Inhalte

Was ist angesagt?

Paging,Segmentation & Segment with Paging
Paging,Segmentation & Segment with PagingPaging,Segmentation & Segment with Paging
Paging,Segmentation & Segment with PagingMeghaj Mallick
 
String Matching (Naive,Rabin-Karp,KMP)
String Matching (Naive,Rabin-Karp,KMP)String Matching (Naive,Rabin-Karp,KMP)
String Matching (Naive,Rabin-Karp,KMP)Aditya pratap Singh
 
Elena Riva - Dal Corpo alla Parola nella Clinica dei Disturbi Alimentari
Elena Riva - Dal Corpo alla Parola nella Clinica dei Disturbi AlimentariElena Riva - Dal Corpo alla Parola nella Clinica dei Disturbi Alimentari
Elena Riva - Dal Corpo alla Parola nella Clinica dei Disturbi AlimentariIstitutoMinotauro
 
AR勉強会第4回part2
AR勉強会第4回part2AR勉強会第4回part2
AR勉強会第4回part2NishoMatsusita
 
第1回 配信講義 計算科学技術特論B(2022)
第1回 配信講義 計算科学技術特論B(2022)第1回 配信講義 計算科学技術特論B(2022)
第1回 配信講義 計算科学技術特論B(2022)RCCSRENKEI
 
2015年度先端GPGPUシミュレーション工学特論 第5回 GPUのメモリ階層の詳細 (様々なメモリの利用)
2015年度先端GPGPUシミュレーション工学特論 第5回 GPUのメモリ階層の詳細(様々なメモリの利用)2015年度先端GPGPUシミュレーション工学特論 第5回 GPUのメモリ階層の詳細(様々なメモリの利用)
2015年度先端GPGPUシミュレーション工学特論 第5回 GPUのメモリ階層の詳細 (様々なメモリの利用) 智啓 出川
 
The SHA Hashing Algorithm
The SHA Hashing AlgorithmThe SHA Hashing Algorithm
The SHA Hashing AlgorithmBob Landstrom
 
Convex Hull Algorithm Analysis
Convex Hull Algorithm AnalysisConvex Hull Algorithm Analysis
Convex Hull Algorithm AnalysisRex Yuan
 
SHA-3, Keccak & Sponge function
SHA-3, Keccak & Sponge functionSHA-3, Keccak & Sponge function
SHA-3, Keccak & Sponge functionGennaro Caccavale
 
파이썬 확률과 통계 기초 이해하기
파이썬 확률과 통계 기초 이해하기파이썬 확률과 통계 기초 이해하기
파이썬 확률과 통계 기초 이해하기Yong Joon Moon
 
数値計算結果のPythonによる後処理について(1次元データのピーク値およびその位置の推定)
数値計算結果のPythonによる後処理について(1次元データのピーク値およびその位置の推定)数値計算結果のPythonによる後処理について(1次元データのピーク値およびその位置の推定)
数値計算結果のPythonによる後処理について(1次元データのピーク値およびその位置の推定)智啓 出川
 
4-ma’ruza. Qat'imas mantiq nazariyasi.pptx
4-ma’ruza. Qat'imas mantiq nazariyasi.pptx4-ma’ruza. Qat'imas mantiq nazariyasi.pptx
4-ma’ruza. Qat'imas mantiq nazariyasi.pptxSuperSuper8
 
第14回 配信講義 計算科学技術特論B(2022)
第14回 配信講義 計算科学技術特論B(2022)第14回 配信講義 計算科学技術特論B(2022)
第14回 配信講義 計算科学技術特論B(2022)RCCSRENKEI
 

Was ist angesagt? (20)

Paging,Segmentation & Segment with Paging
Paging,Segmentation & Segment with PagingPaging,Segmentation & Segment with Paging
Paging,Segmentation & Segment with Paging
 
Hash Function
Hash Function Hash Function
Hash Function
 
String Matching (Naive,Rabin-Karp,KMP)
String Matching (Naive,Rabin-Karp,KMP)String Matching (Naive,Rabin-Karp,KMP)
String Matching (Naive,Rabin-Karp,KMP)
 
Elena Riva - Dal Corpo alla Parola nella Clinica dei Disturbi Alimentari
Elena Riva - Dal Corpo alla Parola nella Clinica dei Disturbi AlimentariElena Riva - Dal Corpo alla Parola nella Clinica dei Disturbi Alimentari
Elena Riva - Dal Corpo alla Parola nella Clinica dei Disturbi Alimentari
 
Computer Graphics - clipping
Computer Graphics - clippingComputer Graphics - clipping
Computer Graphics - clipping
 
AR勉強会第4回part2
AR勉強会第4回part2AR勉強会第4回part2
AR勉強会第4回part2
 
第1回 配信講義 計算科学技術特論B(2022)
第1回 配信講義 計算科学技術特論B(2022)第1回 配信講義 計算科学技術特論B(2022)
第1回 配信講義 計算科学技術特論B(2022)
 
Ch03
Ch03Ch03
Ch03
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
2015年度先端GPGPUシミュレーション工学特論 第5回 GPUのメモリ階層の詳細 (様々なメモリの利用)
2015年度先端GPGPUシミュレーション工学特論 第5回 GPUのメモリ階層の詳細(様々なメモリの利用)2015年度先端GPGPUシミュレーション工学特論 第5回 GPUのメモリ階層の詳細(様々なメモリの利用)
2015年度先端GPGPUシミュレーション工学特論 第5回 GPUのメモリ階層の詳細 (様々なメモリの利用)
 
The SHA Hashing Algorithm
The SHA Hashing AlgorithmThe SHA Hashing Algorithm
The SHA Hashing Algorithm
 
Convex Hull Algorithm Analysis
Convex Hull Algorithm AnalysisConvex Hull Algorithm Analysis
Convex Hull Algorithm Analysis
 
SHA-3, Keccak & Sponge function
SHA-3, Keccak & Sponge functionSHA-3, Keccak & Sponge function
SHA-3, Keccak & Sponge function
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
 
파이썬 확률과 통계 기초 이해하기
파이썬 확률과 통계 기초 이해하기파이썬 확률과 통계 기초 이해하기
파이썬 확률과 통계 기초 이해하기
 
数値計算結果のPythonによる後処理について(1次元データのピーク値およびその位置の推定)
数値計算結果のPythonによる後処理について(1次元データのピーク値およびその位置の推定)数値計算結果のPythonによる後処理について(1次元データのピーク値およびその位置の推定)
数値計算結果のPythonによる後処理について(1次元データのピーク値およびその位置の推定)
 
Sha3
Sha3Sha3
Sha3
 
4-ma’ruza. Qat'imas mantiq nazariyasi.pptx
4-ma’ruza. Qat'imas mantiq nazariyasi.pptx4-ma’ruza. Qat'imas mantiq nazariyasi.pptx
4-ma’ruza. Qat'imas mantiq nazariyasi.pptx
 
第14回 配信講義 計算科学技術特論B(2022)
第14回 配信講義 計算科学技術特論B(2022)第14回 配信講義 計算科学技術特論B(2022)
第14回 配信講義 計算科学技術特論B(2022)
 
Daa unit 5
Daa unit 5Daa unit 5
Daa unit 5
 

Ähnlich wie Siri Bhoovalaya from Computer Science Perspective

Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...
Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...
Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...Anil Jain
 
"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
"Introduction to Siribhūvalaya" - Talk at Jain Academy of ScholarsAnil Jain
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Time series analysis : Refresher and Innovations
Time series analysis : Refresher and InnovationsTime series analysis : Refresher and Innovations
Time series analysis : Refresher and InnovationsQuantUniversity
 
Automated Evaluator for Bharatanatyam (Nritta)
Automated Evaluator for Bharatanatyam (Nritta)Automated Evaluator for Bharatanatyam (Nritta)
Automated Evaluator for Bharatanatyam (Nritta)Renu Hiremath
 
Comparison result-of-songket-motives-retrieval-through-sketching-technique-wi...
Comparison result-of-songket-motives-retrieval-through-sketching-technique-wi...Comparison result-of-songket-motives-retrieval-through-sketching-technique-wi...
Comparison result-of-songket-motives-retrieval-through-sketching-technique-wi...UKM
 
Analysis Of Image Compression Methods Based On Transform And Fractal Coding
Analysis Of Image Compression Methods Based On Transform And Fractal CodingAnalysis Of Image Compression Methods Based On Transform And Fractal Coding
Analysis Of Image Compression Methods Based On Transform And Fractal CodingJim Webb
 
Deep learning Tutorial - Part II
Deep learning Tutorial - Part IIDeep learning Tutorial - Part II
Deep learning Tutorial - Part IIQuantUniversity
 
Statistical Machine Translation for Language Localisation
Statistical Machine Translation for Language LocalisationStatistical Machine Translation for Language Localisation
Statistical Machine Translation for Language LocalisationAchchuthan Yogarajah
 
Paper id 71201925
Paper id 71201925Paper id 71201925
Paper id 71201925IJRAT
 
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...Raj Kumar Thenua
 
Deep learning with Keras
Deep learning with KerasDeep learning with Keras
Deep learning with KerasQuantUniversity
 
Paper id 24201433
Paper id 24201433Paper id 24201433
Paper id 24201433IJRAT
 

Ähnlich wie Siri Bhoovalaya from Computer Science Perspective (20)

Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...
Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...
Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...
 
"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
 
edc_adaptivity
edc_adaptivityedc_adaptivity
edc_adaptivity
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Time series analysis : Refresher and Innovations
Time series analysis : Refresher and InnovationsTime series analysis : Refresher and Innovations
Time series analysis : Refresher and Innovations
 
Automated Evaluator for Bharatanatyam (Nritta)
Automated Evaluator for Bharatanatyam (Nritta)Automated Evaluator for Bharatanatyam (Nritta)
Automated Evaluator for Bharatanatyam (Nritta)
 
Comparison result-of-songket-motives-retrieval-through-sketching-technique-wi...
Comparison result-of-songket-motives-retrieval-through-sketching-technique-wi...Comparison result-of-songket-motives-retrieval-through-sketching-technique-wi...
Comparison result-of-songket-motives-retrieval-through-sketching-technique-wi...
 
Eo4301852855
Eo4301852855Eo4301852855
Eo4301852855
 
Analysis Of Image Compression Methods Based On Transform And Fractal Coding
Analysis Of Image Compression Methods Based On Transform And Fractal CodingAnalysis Of Image Compression Methods Based On Transform And Fractal Coding
Analysis Of Image Compression Methods Based On Transform And Fractal Coding
 
Deep learning Tutorial - Part II
Deep learning Tutorial - Part IIDeep learning Tutorial - Part II
Deep learning Tutorial - Part II
 
K means report
K means reportK means report
K means report
 
thesis
thesisthesis
thesis
 
thesis
thesisthesis
thesis
 
Statistical Machine Translation for Language Localisation
Statistical Machine Translation for Language LocalisationStatistical Machine Translation for Language Localisation
Statistical Machine Translation for Language Localisation
 
Poscat seminar 10
Poscat seminar 10Poscat seminar 10
Poscat seminar 10
 
Paper id 71201925
Paper id 71201925Paper id 71201925
Paper id 71201925
 
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
 
Deep learning with Keras
Deep learning with KerasDeep learning with Keras
Deep learning with Keras
 
Neural networks
Neural networksNeural networks
Neural networks
 
Paper id 24201433
Paper id 24201433Paper id 24201433
Paper id 24201433
 

Mehr von Anil Jain

Symposium on Jainism and Mathematics - presentation : 2020
Symposium on  Jainism and Mathematics  - presentation : 2020 Symposium on  Jainism and Mathematics  - presentation : 2020
Symposium on Jainism and Mathematics - presentation : 2020 Anil Jain
 
Siri bhoovalaya workshop-session-3
Siri bhoovalaya workshop-session-3Siri bhoovalaya workshop-session-3
Siri bhoovalaya workshop-session-3Anil Jain
 
Siri bhoovalaya workshop-session-2
Siri bhoovalaya workshop-session-2Siri bhoovalaya workshop-session-2
Siri bhoovalaya workshop-session-2Anil Jain
 
Some Structural Aspects of Siri-Bhoovalaya
Some Structural Aspects of Siri-BhoovalayaSome Structural Aspects of Siri-Bhoovalaya
Some Structural Aspects of Siri-BhoovalayaAnil Jain
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Anil Jain
 
An inimitable cryptographic creation : Siri Bhoovalaya
An inimitable cryptographic creation : Siri BhoovalayaAn inimitable cryptographic creation : Siri Bhoovalaya
An inimitable cryptographic creation : Siri BhoovalayaAnil Jain
 

Mehr von Anil Jain (6)

Symposium on Jainism and Mathematics - presentation : 2020
Symposium on  Jainism and Mathematics  - presentation : 2020 Symposium on  Jainism and Mathematics  - presentation : 2020
Symposium on Jainism and Mathematics - presentation : 2020
 
Siri bhoovalaya workshop-session-3
Siri bhoovalaya workshop-session-3Siri bhoovalaya workshop-session-3
Siri bhoovalaya workshop-session-3
 
Siri bhoovalaya workshop-session-2
Siri bhoovalaya workshop-session-2Siri bhoovalaya workshop-session-2
Siri bhoovalaya workshop-session-2
 
Some Structural Aspects of Siri-Bhoovalaya
Some Structural Aspects of Siri-BhoovalayaSome Structural Aspects of Siri-Bhoovalaya
Some Structural Aspects of Siri-Bhoovalaya
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
An inimitable cryptographic creation : Siri Bhoovalaya
An inimitable cryptographic creation : Siri BhoovalayaAn inimitable cryptographic creation : Siri Bhoovalaya
An inimitable cryptographic creation : Siri Bhoovalaya
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Kürzlich hochgeladen (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Siri Bhoovalaya from Computer Science Perspective

  • 1. Siri-Bhoovalaya from Computer Science Perspective Presented at a Bharatvani Project Workshop on Potentials of Siri Bhoovalaya for application and research in Linguistics and Computer Science at Central Institute of Indian Languages, Mysuru on 27th September 2016 by Anil Kumar Jain Siri-Bhoovalaya Vak-Peeth Project Siri-Bhoovalaya Web-Site Project web-site: siri-bhoovalaya.org
  • 2. Agenda of this Presentation • High Level Steps for Computerisation to reveal contents of a Chakra • Transposition Schemes - Bandhas • Phonetic Alphabet Coding Scheme - Ankaakshar • Illustration of basic Steps • Steganography to disclose multilingual contents • Visual Crytpography - Chitra Bandha • Research Potentials and Challenges
  • 3. High Level Steps to Decipher a Chakra 1. Select Transformation functions defined as Bandhas as applicable to the selected Chakra. 2. Transform two dimensional matrix of the Chakra into a row vector using algorithm for the Transformation Function as specified in Bandha. 3. Apply Mono-alphabetic Substitution to replace numerals in row vector with respective Phonetic Alphabets. 4. Join alphabets to form words and add punctuations as per grammar rules of the language (Kannada). 5. Derive interlaced multilingual alphabets as per defined scheme and format these as per grammar rules of the target language (Prakrit, Samskrit, Pali, Apabransh, Telugu, Tamil etc. etc.)
  • 4. Step-1 Transposition Scheme Definition: In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the cipher text constitutes a permutation of the plaintext. That is, the order of the units is changed (the plaintext is reordered). Application: Bandhas in Siri-Bhoovalaya basically are Transposition Schemes to convert two-dimensional Chakra into a single dimensional string of numbers.
  • 5. Step-2 Chakra-Bandha (Implementation of one of the Transposition Schemes)
  • 6. Step- 2 Navmank Bandh Transposition with Recursion Navmank Bandh is applied from Second Adhyaya to Eighth Adhyaya with different sequence of Tiles in each of these Adhyaya. Each tile, called as UpChakra, is traversed in the same manner as in Chakra Bandh.
  • 7. Step – 3 Substitution Scheme Definition: In cryptography, a substitution cipher is a method of encoding by which units of plaintext are replaced with cipher text, according to a fixed system. The receiver deciphers the text by performing the inverse substitution. Application: Phonetic Alphabets are substituted to the string of numbers resulting from Step-2.
  • 8. Multilingual Phonetic Alphabet Encoding Scheme Kumudendu Code Table (for implementation of Mono-alphabetic Substitution Cipher)
  • 9. Multilingual Phonetic Alphabet Classification in Kumudendu Code Table
  • 10. Chakra Bandha Example with 5x5 matrix Step-1 & Step-2 1 2 3 4 5 1 4 53 28 45 4 2 1 45 47 59 54 3 7 16 1 56 55 4 28 43 8 1 52 5 10 51 1 7 7 1 2 3 4 5 1 17 24 1 8 15 2 23 5 7 14 16 3 4 6 13 20 22 4 10 12 19 21 3 5 11 18 25 2 9 Example Chakra (5x5) Step-1 : Chakra-Bandha (5x5) 28 7 52 7 45 16 47 45 7 28 10 43 1 59 4 54 4 51 8 56 1 55 1 53 1 Step -2 : Result of Applying Bandha - Matrix to Vector
  • 11. Step - 3 & Step - 4 Applying Substitution using Kumudendu Code Table and applying grammar rules Result of Step -2 Chakra-Bandh from previous slide and results after applying Step-3 & Step-4
  • 12. First Chakra in Mangal Prabhrut 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 1 59 23 1 16 1 28 28 1 1 56 59 4 56 1 1 47 16 34 1 7 16 1 1 7 56 1 60 2 53 54 47 28 1 47 45 28 7 4 59 41 4 45 1 30 47 47 45 42 53 28 51 1 52 1 1 3 1 22 1 30 2 1 2 55 30 1 7 45 47 52 1 4 1 47 1 1 1 1 53 1 52 59 52 4 59 30 2 55 55 13 16 2 53 60 1 4 16 47 48 45 16 56 56 43 45 1 56 1 4 1 13 5 47 45 1 1 22 30 51 1 2 56 38 30 4 1 1 56 1 1 16 1 57 7 56 56 1 22 1 6 54 52 52 45 1 7 55 48 1 58 52 35 28 55 1 38 45 30 55 4 47 7 45 38 45 38 1 7 1 1 1 28 13 56 55 51 54 1 1 1 1 42 2 4 4 1 43 16 47 7 1 13 4 51 4 8 28 53 47 22 8 1 53 59 38 7 43 40 1 52 59 54 30 1 45 16 1 28 23 50 7 43 43 9 1 2 45 51 30 1 52 58 48 59 47 54 4 4 1 47 45 47 56 28 1 45 1 13 7 7 7 10 55 1 53 47 56 1 1 7 1 1 2 60 48 56 1 1 16 1 1 54 1 52 17 30 54 45 45 11 59 56 52 1 45 1 55 28 52 28 1 2 1 52 54 4 43 60 48 28 1 16 23 8 53 7 1 12 2 1 53 52 43 23 2 4 16 52 44 54 1 2 42 7 1 7 47 30 28 48 47 1 54 52 16 13 45 54 23 4 28 45 45 30 1 59 1 56 28 2 54 53 38 2 2 1 28 55 40 60 4 50 28 14 2 13 47 1 1 4 17 45 1 56 1 52 56 51 1 47 55 55 45 7 2 54 1 56 7 1 1 15 23 4 53 54 59 48 13 56 1 47 23 1 2 55 16 1 1 47 40 54 16 52 1 47 60 43 60 16 45 16 43 1 7 47 1 7 1 4 54 54 1 43 28 28 7 1 2 7 52 30 1 4 47 4 13 17 42 1 54 13 1 28 1 45 42 5 48 56 1 1 1 52 54 7 1 1 2 56 56 2 43 1 1 18 56 43 22 45 56 43 2 2 56 1 8 48 59 59 7 16 53 55 53 48 1 1 46 2 30 53 1 19 47 45 1 2 54 56 56 2 55 51 4 16 7 13 30 16 1 1 4 52 52 4 54 47 2 38 1 20 1 54 60 56 54 1 60 1 1 16 40 38 17 1 47 56 33 55 1 1 59 48 1 53 7 1 1 21 1 52 16 1 60 1 30 53 30 7 47 13 13 22 8 13 45 59 54 1 2 42 54 47 53 52 53 22 16 30 1 4 52 47 56 1 28 16 1 22 59 51 1 1 7 28 53 60 7 1 16 16 1 1 58 23 4 53 56 1 52 2 13 52 38 30 45 7 1 30 56 16 1 1 1 30 48 56 54 54 55 28 45 24 1 47 47 1 28 22 1 47 1 1 45 46 1 1 47 53 55 52 1 1 7 43 2 1 1 1 43 25 1 4 53 1 45 43 16 55 52 4 47 55 45 22 51 56 1 38 13 30 2 28 56 13 56 28 55 26 4 16 46 1 1 16 1 1 1 1 1 47 59 4 8 38 58 1 1 48 1 7 22 1 1 1 60 27 52 4 30 56 53 52 54 1 30 52 1 16 54 7 58 1 30 54 1 56 51 53 56 57 56 4 60
  • 13. Output from Chakra Bandha Applied to first Chakra of Siri Bhoovalaya Resultant text after manually conjoining phonetic alphabets :
  • 14. Step – 5 Deriving Interlaced Multilingual Content Definition: Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. Thus, whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message. Application: Multilingual contents are interlaced into base content in Kannada and are extracted as per corresponding schemes applicable to each of different languages.
  • 15. Step -5 Example of Multi-Lingual content from First Adhyaya
  • 16. Step – 5 : Content in Prakrit & Samskrit from First Chakra
  • 17. Step -5 : Example of Multi-lingual contents from first Anubandh of Shrutavatar
  • 18. Step – 5 : Content in Prakrit, Geervan, Telugu, Tamil & Apabhramsh from first anubandha of Shrutavatar
  • 19. Chitra Bandha / Chitra Kavya Visual Cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption becomes the job of the person to decrypt via sight reading. Application: Muni Kumudendu has vividly used Chitra Bandha to demostrate his brilliance as graphics artist too. This is also one of justification of his using two dimensional arrays (27x27 matrix ) as a Canvas for Chitra Kavya.
  • 20. Visual Cryptography (Chitra Bandha) example In following example a graphical figure is used as key to extract the hidden message.
  • 21. Superimposing the figure on Chakra at defined position to reveal content in those particular cells in manner as shown
  • 22. Derivation of Shrutavatar Chakra from Mangal Prabhrut Chakra
  • 23. Why Muni Kumudendu is Inimitable? • Master Mathematician who shone with brilliance in creating intricate framework of Chakras and Bandhas. • Eminent Scholar of religious foundations, scriptures, practices and ancient sciences of diverse domains. • Highly Competent Linguist with proficiency in multiple languages prevalent in India at his time. • Extremely genius poet who chose two-dimensional array of numerals for his creative expressions. • Great Composer who intertwined verses in multiple languages into a solitary piece of magnificient work. • Exceedingly Talented Graphics artist who could implant poetry into multitude of shapes and figures.
  • 24. Importance of further Research • Rajendra Prasad, the first President of India, called it one of the ‘Wonders of the World'. Giants of Kannada literature have evinced keen interest in this magnificent creation. Prof Suniti Kumar Chatterjee have exclaimed that the work deserved a doctorate by several universities. • Dr S. Srikanta Sastri, a highly respected name in the study of Indian history and culture, has commented vividly on the importance this unique work from many-fold perspectives.
  • 25. Research Areas from Computer Science Perspective 1. Development of Algorithms for different categories of Bandhas. (Matrix to Row transformation) 2. Digitisation of all Chakras suitable for Computer processing. 3. Derivation of Chakras of other Khandas from Mangal Prabhrut. 4. NLP (Natural Language Processing) / Computational Linguistics implementation for language specific grammar rules on the content derived for different languages and translation thereof. 5. Integration of IPA (International Phonetic Alphabet) and cross platform Speech conversion. 6. Multilingual content extraction from base content, classification and indexing of entire content suitable for search engines.
  • 26. Major Challenges • There exist no Credible Platform or Forum which can bring together persons pursuing research on Siri-Bhoovalaya. There are many islands of endeavour but no bridges to consolidate and promote sharing amongst them. • Teams consisting of Mathematicians, Linguistics, Subject Matter Experts / Scholars and Computer Scientist are needed in order to fully unearth the hidden treasure buried inside this masterpiece. Efforts in this direction is not visible. • Very small cross-section of individuals are not only able to appreciate Siri-Bhoovalaya, but have not even heard of it, as there has been very little effort for public awareness towards this unparalleled masterpiece. It should not only be considered a matter of pride for Kannada speaking population but must be accorded honour as a unique World Heritage. This is more so because Muni Kumudendu used numerals, which are universal symbols, instead of any language specific alphabets.
  • 27. Siri Bhoovalaya: A Unique Multilingual Epic Scripted in Numerals
  • 28. An Inimitable Cryptographic Creation: Siri Bhoovalaya
  • 29. Creativity in Cryptography: An Epic Scripted in Numerals only