Skip to main content

Showing 1–12 of 12 results for author: Das, J K

.
  1. arXiv:2406.17574  [pdf, other

    cs.CL

    Beyond Text-to-SQL for IoT Defense: A Comprehensive Framework for Querying and Classifying IoT Threats

    Authors: Ryan Pavlich, Nima Ebadi, Richard Tarbell, Billy Linares, Adrian Tan, Rachael Humphreys, Jayanta Kumar Das, Rambod Ghandiparsi, Hannah Haley, Jerris George, Rocky Slavin, Kim-Kwang Raymond Choo, Glenn Dietrich, Anthony Rios

    Abstract: Recognizing the promise of natural language interfaces to databases, prior studies have emphasized the development of text-to-SQL systems. While substantial progress has been made in this field, existing research has concentrated on generating SQL statements from text queries. The broader challenge, however, lies in inferring new information about the returned data. Our research makes two major co… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

  2. arXiv:2402.03735  [pdf, other

    cs.SE

    Investigating the Utility of ChatGPT in the Issue Tracking System: An Exploratory Study

    Authors: Joy Krishan Das, Saikat Mondal, Chanchal K. Roy

    Abstract: Issue tracking systems serve as the primary tool for incorporating external users and customizing a software project to meet the users' requirements. However, the limited number of contributors and the challenge of identifying the best approach for each issue often impede effective resolution. Recently, an increasing number of developers are turning to AI tools like ChatGPT to enhance problem-solv… ▽ More

    Submitted 6 February, 2024; originally announced February 2024.

    Comments: Accepted in MSR 2024

  3. Analyzing Host-Viral Interactome of SARS-CoV-2 for Identifying Vulnerable Host Proteins during COVID-19 Pathogenesis

    Authors: Jayanta Kumar Das, Swarup Roy, Pietro Hiram Guzzi

    Abstract: The development of therapeutic targets for COVID-19 treatment is based on the understanding of the molecular mechanism of pathogenesis. The identification of genes and proteins involved in the infection mechanism is the key to shed out light into the complex molecular mechanisms. The combined effort of many laboratories distributed throughout the world has produced the accumulation of both protein… ▽ More

    Submitted 5 February, 2021; originally announced February 2021.

  4. arXiv:2006.13741  [pdf, ps, other

    nlin.CG cs.DM math.DS

    Relationship of Two Discrete Dynamical Models: One-dimensional Cellular Automata and Integral Value Transformations

    Authors: Sreeya Ghosh, Sudhakar Sahoo, Sk. Sarif Hassan, Jayanta Kumar Das, Pabitra Pal Choudhury

    Abstract: Cellular Automaton (CA) and an Integral Value Transformation (IVT) are two well established mathematical models which evolve in discrete time steps. Theoretically, studies on CA suggest that CA is capable of producing a great variety of evolution patterns. However computation of non-linear CA or higher dimensional CA maybe complex, whereas IVTs can be manipulated easily. The main purpose of this p… ▽ More

    Submitted 30 June, 2020; v1 submitted 24 June, 2020; originally announced June 2020.

    Comments: 20 Pages

  5. arXiv:1709.05205  [pdf, other

    math.DS

    Two Dimensional Discrete Dynamics of Integral Value Transformations

    Authors: Jayanta Kumar Das, Sudhakar Sahoo, Sk. Sarif Hassan, Pabitra Pal Choudhury

    Abstract: A notion of dimension preservative map, \textit{Integral Value Transformations} (IVTs) is defined over $\mathbb{N}^k$ using the set of $p$-adic functions. Thereafter, two dimensional \textit{Integral Value Transformations} (IVTs) is systematically analyzed over $\mathbb{N} \times \mathbb{N}$ using pair of two variable Boolean functions. The dynamics of IVTs over… ▽ More

    Submitted 28 January, 2020; v1 submitted 25 August, 2017; originally announced September 2017.

    Comments: 18 pages, 13 figures, 8 tables

  6. arXiv:1605.03283  [pdf

    cs.DC

    Implementation of the open source virtualization technologies in cloud computing

    Authors: Mohammad Mamun Or Rashid, M. Masud Rana, Jugal Krishna Das

    Abstract: The Virtualization and Cloud Computing is a recent buzzword in the digital world. Cloud computing provide IT as a service to the users on demand basis. This service has greater flexibility, availability, reliability and scalability with utility computing model. This new concept of computing has an immense potential in it to be used in the field of e-governance and in the overall IT development per… ▽ More

    Submitted 11 May, 2016; originally announced May 2016.

    Comments: 19 pages

  7. arXiv:1601.04249  [pdf, other

    cs.OH

    Multi-Number CVT-XOR Arithmetic Operations in any Base System and its Significant Properties

    Authors: Jayanta Kumar Das, Pabitra Pal Choudhury, Sudhakar Sahoo

    Abstract: Carry Value Transformation (CVT) is a model of discrete dynamical system which is one special case of Integral Value Transformations (IVTs). Earlier in [5] it has been proved that sum of two non-negative integers is equal to the sum of their CVT and XOR values in any base system. In the present study, this phenomenon is extended to perform CVT and XOR operations for many non-negative integers in a… ▽ More

    Submitted 30 November, 2015; originally announced January 2016.

    Comments: Pages-4, Tables-4, Figure-2

  8. arXiv:1512.00745  [pdf

    q-bio.OT

    Understanding of Genetic Code Degeneracy and New Way of Classifying of Protein Family: A Mathematical Approach

    Authors: Jayanta Kumar Das, Atrayee Majumder, Pabitra Pal Choudhury

    Abstract: The genetic code is the set of rules by which information encoded in genetic material (DNA or RNA sequences) is translated into proteins (amino acid sequences) by living cells. The code defines a map** between tri-nucleotide sequences, called codons, and amino acids. Since there are 20 amino acids and 64 possible tri-nucleotide sequences, more than one among these 64 triplets can code for a sing… ▽ More

    Submitted 30 November, 2015; originally announced December 2015.

    Comments: pages-5, Tables-6

  9. arXiv:1506.01544  [pdf, other

    cs.DM

    Carry Value Transformation (CVT) - Exclusive OR (XOR) Tree and Its Significant Properties

    Authors: Jayanta Kumar Das, Pabitra Pal Choudhury, Sudhakar Sahoo

    Abstract: CVT and XOR are two binary operations together used to calculate the sum of two non-negative integers on using a recursive mechanism. In this present study the convergence behaviors of this recursive mechanism has been captured through a tree like structure named as CVT-XOR Tree. We have analyzed how to identify the parent nodes, leaf nodes and internal nodes in the CVT-XOR Tree. We also provide t… ▽ More

    Submitted 4 June, 2015; originally announced June 2015.

    Comments: Pages: 5, Figure: 9

  10. arXiv:1409.7136  [pdf, other

    eess.SY

    Analysis of Boolean Functions based on Interaction Graphs and their influence in System Biology

    Authors: Jayanta Kumar Das, Ranjeet Kumar Rout, Pabitra Pal Choudhury

    Abstract: Interaction graphs provide an important qualitative modeling approach for System Biology. This paper presents a novel approach for construction of interaction graph with the help of Boolean function decomposition. Each decomposition part (Consisting of 2-bits) of the Boolean functions has some important significance. In the dynamics of a biological system, each variable or node is nothing but gene… ▽ More

    Submitted 24 September, 2014; originally announced September 2014.

    Comments: 11 pages, 6 figures

  11. arXiv:1409.4237  [pdf

    eess.SY

    On Analysis And Generation Of Biologically Important Boolean Functions

    Authors: Camellia Ray, Jayanta Kumar Das, Pabitra Pal Choudhury

    Abstract: Boolean networks are used to model biological networks such as gene regulatory networks. Often Boolean networks show very chaotic behavior which is sensitive to any small perturbations.In order to reduce the chaotic behavior and to attain stability in the gene regulatory network,nested canalizing functions(NCF)are best suited NCF and its variants have a wide range of applications in system biology… ▽ More

    Submitted 12 September, 2014; originally announced September 2014.

    Comments: 11 pages, 7 figures. arXiv admin note: text overlap with arXiv:1405.2271

  12. arXiv:1405.2271  [pdf

    eess.SY cs.CE

    On Analysis and Generation of some Biologically Important Boolean Functions

    Authors: Camellia Ray, Jayanta Kumar Das, Pabitra Pal Choudhury

    Abstract: Boolean networks are used to model biological networks such as gene regulatory networks. Often Boolean networks show very chaotic behaviour which is sensitive to any small perturbations. In order to reduce the chaotic behaviour and to attain stability in the gene regulatory network, nested Canalizing Functions (NCFs) are best suited. NCFs and its variants have a wide range of applications in syste… ▽ More

    Submitted 12 September, 2014; v1 submitted 9 May, 2014; originally announced May 2014.

    Comments: 11 pages