Skip to main content

Showing 51–90 of 90 results for author: Sahay, S

.
  1. arXiv:1905.13747  [pdf, ps, other

    cs.CR

    A Survey on the Detection of Android Malicious Apps

    Authors: Sanjay K. Sahay, Ashu Sharma

    Abstract: Android-based smart devices are exponentially growing, and due to the ubiquity of the Internet, these devices are globally connected to the different devices/networks. Its popularity, attractive features, and mobility make malware creator to put a number of malicious apps in the market to disrupt and annoy the victims. Although to identify the malicious apps, time-to-time various techniques are pr… ▽ More

    Submitted 29 May, 2019; originally announced May 2019.

    Comments: Conference paper, 11 pages

    Journal ref: Springer, Advances in Computer Communication and Computational Sciences, pp 437-446, 2019

  2. arXiv:1905.13746  [pdf, other

    cs.CR cs.LG

    An Efficient Detection of Malware by Naive Bayes Classifier Using GPGPU

    Authors: Sanjay K. Sahay, Mayank Chaudhari

    Abstract: Due to continuous increase in the number of malware (according to AV-Test institute total ~8 x 10^8 malware are already known, and every day they register ~2.5 x 10^4 malware) and files in the computational devices, it is very important to design a system which not only effectively but can also efficiently detect the new or previously unseen malware to prevent/minimize the damages. Therefore, this… ▽ More

    Submitted 29 May, 2019; originally announced May 2019.

    Comments: Conference paper, 9 pages, 4 figures

    Journal ref: Springer, Advances in Computer Communication and Computational Sciences, Vol. 924, pp. 255-262, 2019

  3. arXiv:1905.09454  [pdf

    eess.SP cs.ET

    Energy-Efficient Moderate Precision Time-Domain Mixed-signal Vector-by-Matrix Multiplier Exploiting 1T-1R Arrays

    Authors: Shubham Sahay, Mohammad Bavandpour, Mohammad Reza Mahmoodi, Dmitri Strukov

    Abstract: The emerging mobile devices in this era of internet-of-things (IoT) require a dedicated processor to enable computationally intensive applications such as neuromorphic computing and signal processing. Vector-by-matrix multiplication (VMM) is the most prominent operation in these applications. Therefore, there is a critical need for compact and ultralow-power VMM blocks to perform resource-intensiv… ▽ More

    Submitted 6 January, 2020; v1 submitted 23 May, 2019; originally announced May 2019.

  4. arXiv:1904.10500  [pdf, other

    cs.CL cs.HC cs.LG cs.SD eess.AS

    Natural Language Interactions in Autonomous Vehicles: Intent Detection and Slot Filling from Passenger Utterances

    Authors: Eda Okur, Shachi H Kumar, Saurav Sahay, Asli Arslan Esme, Lama Nachman

    Abstract: Understanding passenger intents and extracting relevant slots are important building blocks towards develo** contextual dialogue systems for natural interactions in autonomous vehicles (AV). In this work, we explored AMIE (Automated-vehicle Multi-modal In-cabin Experience), the in-cabin agent responsible for handling certain passenger-vehicle interactions. When the passengers give instructions t… ▽ More

    Submitted 23 April, 2019; originally announced April 2019.

    Comments: Accepted and presented as a full paper at 20th International Conference on Computational Linguistics and Intelligent Text Processing (CICLing 2019), April 7-13, 2019, La Rochelle, France

    Journal ref: Springer LNCS Proceedings for CICLing 2019

  5. arXiv:1904.10142  [pdf, other

    cs.CR cs.LG

    Android Malicious Application Classification Using Clustering

    Authors: Hemant Rathore, Sanjay K. Sahay, Palash Chaturvedi, Mohit Sewak

    Abstract: Android malware have been growing at an exponential pace and becomes a serious threat to mobile users. It appears that most of the anti-malware still relies on the signature-based detection system which is generally slow and often not able to detect advanced obfuscated malware. Hence time-to-time various authors have proposed different machine learning solutions to identify sophisticated malware.… ▽ More

    Submitted 21 April, 2019; originally announced April 2019.

    Comments: Springer, AISC, Volume 941, pp. 659-667, ISDA, 2018

  6. Malware Detection using Machine Learning and Deep Learning

    Authors: Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, Mohit Sewak

    Abstract: Research shows that over the last decade, malware has been growing exponentially, causing substantial financial losses to various organizations. Different anti-malware companies have been proposing solutions to defend attacks from these malware. The velocity, volume, and the complexity of malware are posing new challenges to the anti-malware community. Current state-of-the-art research shows that… ▽ More

    Submitted 4 April, 2019; originally announced April 2019.

    Comments: 11 Pages and 3 Figures

    Journal ref: Springer, LNCS, Vol. 11297, pp. 402-411, International Conference on Big Data Analytics, 2018

  7. arXiv:1904.02122  [pdf, other

    cs.CR cs.LG

    Group-wise classification approach to improve Android malicious apps detection accuracy

    Authors: Ashu Sharma, Sanjay K. Sahay

    Abstract: In the fast-growing smart devices, Android is the most popular OS, and due to its attractive features, mobility, ease of use, these devices hold sensitive information such as personal data, browsing history, shop** history, financial details, etc. Therefore, any security gap in these devices means that the information stored or accessing the smart devices are at high risk of being breached by th… ▽ More

    Submitted 3 April, 2019; originally announced April 2019.

    Comments: 9 pages, 20 Figures

    Journal ref: International Journal of Network Security, Vol. 21, No. 3, pp. 409-417, 2019

  8. arXiv:1903.02966  [pdf

    cs.CR cs.LG

    Detection of Advanced Malware by Machine Learning Techniques

    Authors: Sanjay Sharma, C. Rama Krishna, Sanjay K. Sahay

    Abstract: In today's digital world most of the anti-malware tools are signature based which is ineffective to detect advanced unknown malware viz. metamorphic malware. In this paper, we study the frequency of opcode occurrence to detect unknown malware by using machine learning technique. For the purpose, we have used kaggle Microsoft malware classification challenge dataset. The top 20 features obtained fr… ▽ More

    Submitted 7 March, 2019; originally announced March 2019.

    Comments: Conference Paper, 7 Pages

    Journal ref: Springer, Advances in Intelligent Systems and Computing, Vol. 742, pp. 332-342, 2018

  9. arXiv:1901.04899  [pdf, ps, other

    cs.CL

    Conversational Intent Understanding for Passengers in Autonomous Vehicles

    Authors: Eda Okur, Shachi H Kumar, Saurav Sahay, Asli Arslan Esme, Lama Nachman

    Abstract: Understanding passenger intents and extracting relevant slots are important building blocks towards develo** a contextual dialogue system responsible for handling certain vehicle-passenger interactions in autonomous vehicles (AV). When the passengers give instructions to AMIE (Automated-vehicle Multimodal In-cabin Experience), the agent should parse such commands properly and trigger the appropr… ▽ More

    Submitted 13 December, 2018; originally announced January 2019.

  10. arXiv:1812.08407  [pdf, other

    cs.CL

    Context, Attention and Audio Feature Explorations for Audio Visual Scene-Aware Dialog

    Authors: Shachi H Kumar, Eda Okur, Saurav Sahay, Juan Jose Alvarado Leanos, Jonathan Huang, Lama Nachman

    Abstract: With the recent advancements in AI, Intelligent Virtual Assistants (IVA) have become a ubiquitous part of every home. Going forward, we are witnessing a confluence of vision, speech and dialog system technologies that are enabling the IVAs to learn audio-visual groundings of utterances and have conversations with users about the objects, activities and events surrounding them. As a part of the 7th… ▽ More

    Submitted 20 December, 2018; originally announced December 2018.

    Comments: 7 pages, 2 figures, DSTC7 workshop at AAAI 2019

  11. A Behavioral Compact Model of 3D NAND Flash Memory

    Authors: Shubham Sahay, Dmitri Strukov

    Abstract: We present a behavioral compact model of 3D NAND flash memory for integrated circuits and system-level applications. This model is easy to implement, computationally efficient, fast, accurate and effectively accounts for the different parasitic capacitance coupling effects applicable to the 3D geometry of the vertical channel Macaroni body charge-trap flash memory. The model parameter extraction m… ▽ More

    Submitted 1 December, 2018; originally announced December 2018.

    Comments: 4 pages, 5 figures

    Journal ref: IEEE Electron Device Letters ( Volume: 40 , Issue: 4 , April 2019 )

  12. Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: Recently, Deep Learning has been showing promising results in various Artificial Intelligence applications like image recognition, natural language processing, language modeling, neural machine translation, etc. Although, in general, it is computationally more expensive as compared to classical machine learning techniques, their results are found to be more effective in some cases. Therefore, in t… ▽ More

    Submitted 16 September, 2018; originally announced September 2018.

    Comments: 11 Pages, 1 figure

    Journal ref: IEEE, pp. 293-296, 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2018

  13. arXiv:1809.05888  [pdf, other

    cs.CR cs.AI cs.LG

    An investigation of a deep learning based malware detection system

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: We investigate a Deep Learning based system for malware detection. In the investigation, we experiment with different combination of Deep Learning architectures including Auto-Encoders, and Deep Neural Networks with varying layers over Malicia malware dataset on which earlier studies have obtained an accuracy of (98%) with an acceptable False Positive Rates (1.07%). But these results were done usi… ▽ More

    Submitted 16 September, 2018; originally announced September 2018.

    Comments: 13 Pages, 4 figures

    Journal ref: ACM, pp. 26, Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES), 27-30 Aug., 2018, University of Hamburg, Germany

  14. arXiv:1806.02923  [pdf, other

    cs.CL

    Multimodal Relational Tensor Network for Sentiment and Emotion Classification

    Authors: Saurav Sahay, Shachi H Kumar, Rui Xia, Jonathan Huang, Lama Nachman

    Abstract: Understanding Affect from video segments has brought researchers from the language, audio and video domains together. Most of the current multimodal research in this area deals with various techniques to fuse the modalities, and mostly treat the segments of a video independently. Motivated by the work of (Zadeh et al., 2017) and (Poria et al., 2017), we present our architecture, Relational Tensor… ▽ More

    Submitted 7 June, 2018; originally announced June 2018.

  15. arXiv:1802.08611  [pdf, other

    cs.CR cs.AI

    An investigation of the classifiers to detect android malicious apps

    Authors: Ashu Sharma, Sanjay K. Sahay

    Abstract: Android devices are growing exponentially and are connected through the internet accessing billion of online websites. The popularity of these devices encourages malware developer to penetrate the market with malicious apps to annoy and disrupt the victim. Although, for the detection of malicious apps different approaches are discussed. However, proposed approaches are not suffice to detect the ad… ▽ More

    Submitted 23 February, 2018; originally announced February 2018.

    Comments: 8 Pages, 8 Figures

    Journal ref: Springer, Information and Communication Technology, 625, p. 207 - 217, 2017

  16. Low Cost Autonomous Navigation and Control of a Mechanically Balanced Bicycle with Dual Locomotion Mode

    Authors: Ayush Pandey, Subhamoy Mahajan, Adarsh Kosta, Dhananjay Yadav, Vikas Pandey, Saurav Sahay, Siddharth Jha, Shubh Agarwal, Aashay Bhise, Raushan Kumar, Aniket Bhushan, Vraj Parikh, Ankit Lohani, Saurabh Dash, Himanshu Choudhary, Rahul Kumar, Anurag Sharma, Arnab Mondal, Chendika Karthik Sai, P N Vamshi

    Abstract: On the lines of the huge and varied efforts in the field of automation with respect to technology development and innovation of vehicles to make them run autonomously, this paper presents an innovation to a bicycle. A normal daily use bicycle was modified at low cost such that it runs autonomously, while maintaining its original form i.e. the manual drive. Hence, a bicycle which could be normally… ▽ More

    Submitted 1 November, 2016; originally announced November 2016.

    Comments: Published in the International Transportation Electrification Conference (ITEC) in 2015 organized by IEEE Industrial Application Society (IAS) and SAE India in Chennai, India

    Journal ref: ITEC India, Publication Year : 2015. Pages 1 - 10

  17. A Communication Efficient and Scalable Distributed Data Mining for the Astronomical Data

    Authors: Aruna Govada, Sanjay K. Sahay

    Abstract: In 2020, ~60PB of archived data will be accessible to the astronomers. But to analyze such a paramount data will be a challenging task. This is basically due to the computational model used to download the data from complex geographically distributed archives to a central site and then analyzing it in the local systems. Because the data has to be downloaded to the central site, the network BW limi… ▽ More

    Submitted 23 June, 2016; originally announced June 2016.

    Comments: Accepted in Astronomy and Computing, 2016, 20 Pages, 19 Figures

    Journal ref: Elsevier, Astronomy and Computing, Vol. 16, pp. 166 - 174, 2016

  18. arXiv:1606.07336  [pdf, other

    cs.DC

    Covariance estimation for vertically partitioned data in a distributed environment

    Authors: Aruna Govada, Sanjay K. Sahay

    Abstract: The major sources of abundant data are constantly expanding with the available data collection methodologies in various applications - medical, insurance, scientific, bio-informatics and business. These data sets may be distributed geographically, rich in size and as well as dimensions also. To analyze these data sets to find out the hidden patterns, it is required to down- load the data to a cent… ▽ More

    Submitted 23 June, 2016; originally announced June 2016.

    Comments: Proceedings, 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2016

    Journal ref: Springer, Studies in Computational Intelligence, Vol. 653, pp 151-164, 2016

  19. arXiv:1606.06909  [pdf

    cs.CR

    Improving the detection accuracy of unknown malware by partitioning the executables in groups

    Authors: Ashu Sharma, Sanjay K. Sahay, Abhishek Kumar

    Abstract: Detection of unknown malware with high accuracy is always a challenging task. Therefore, in this paper, we study the classification of unknown malware by two methods. In the first/regular method, similar to other authors [17][16][20] approaches we select the features by taking all dataset in one group and in the second method, we select the features by partitioning the dataset in the range of file… ▽ More

    Submitted 22 June, 2016; originally announced June 2016.

    Comments: Proceedings 9th ICACCT, 2015, 8 Pages, 7 Figures

    Journal ref: Springer, Advances in Intelligent System and Computing, Vol. 452, pp. 421 - 431, 2016

  20. arXiv:1606.06908  [pdf

    cs.CR cs.AI

    Grou** the executables to detect malware with high accuracy

    Authors: Sanjay K. Sahay, Ashu Sharma

    Abstract: The metamorphic malware variants with the same malicious behavior (family), can obfuscate themselves to look different from each other. This variation in structure leads to a huge signature database for traditional signature matching techniques to detect them. In order to effective and efficient detection of malware in large amounts of executables, we need to partition these files into groups whic… ▽ More

    Submitted 22 June, 2016; originally announced June 2016.

    Comments: 8 Pages, 13 Figures. arXiv admin note: text overlap with arXiv:1606.06897

    Journal ref: Elsevier, Procedia Computer Science, Vol. 78, pp. 667 - 674, 2016

  21. arXiv:1606.06897  [pdf

    cs.CR cs.AI

    An effective approach for classification of advanced malware with high accuracy

    Authors: Ashu Sharma, Sanjay K. Sahay

    Abstract: Combating malware is very important for software/systems security, but to prevent the software/systems from the advanced malware, viz. metamorphic malware is a challenging task, as it changes the structure/code after each infection. Therefore in this paper, we present a novel approach to detect the advanced malware with high accuracy by analyzing the occurrence of opcodes (features) by grou** th… ▽ More

    Submitted 22 June, 2016; originally announced June 2016.

    Comments: 15 Pages, 14 figures

    Journal ref: International Journal of Security and Its Applications, Vol. 10, No. 4, pp.249-266, 2016

  22. A Novel Approach to Distributed Multi-Class SVM

    Authors: Aruna Govada, Shree Ranjani, Aditi Viswanathan, S. K. Sahay

    Abstract: With data sizes constantly expanding, and with classical machine learning algorithms that analyze such data requiring larger and larger amounts of computation time and storage space, the need to distribute computation and memory requirements among several computers has become apparent. Although substantial work has been done in develo** distributed binary SVM algorithms and multi-class SVM algor… ▽ More

    Submitted 7 December, 2015; originally announced December 2015.

    Comments: 8 Pages

    Journal ref: Transactions on Machine Learning and Artificial Intelligence, Vol. 2, No. 5, p. 72, 2014

  23. Hybrid Approach for Inductive Semi Supervised Learning using Label Propagation and Support Vector Machine

    Authors: Aruna Govada, Pravin Joshi, Sahil Mittal, Sanjay K Sahay

    Abstract: Semi supervised learning methods have gained importance in today's world because of large expenses and time involved in labeling the unlabeled data by human experts. The proposed hybrid approach uses SVM and Label Propagation to label the unlabeled data. In the process, at each step SVM is trained to minimize the error and thus improve the prediction quality. Experiments are conducted by using SVM… ▽ More

    Submitted 2 December, 2015; originally announced December 2015.

    Comments: Presented in the 11th International Conference, MLDM, Germany, July 20 - 21, 2015. Springer, Machine Learning and Data Mining in Pattern Recognition, LNAI Vol. 9166, p. 199-213, 2015

  24. Distributed Multi Class SVM for Large Data Sets

    Authors: Aruna Govada, Bhavul Gauri, S. K. Sahay

    Abstract: Data mining algorithms are originally designed by assuming the data is available at one centralized site.These algorithms also assume that the whole data is fit into main memory while running the algorithm. But in today's scenario the data has to be handled is distributed even geographically. Bringing the data into a centralized site is a bottleneck in terms of the bandwidth when compared with the… ▽ More

    Submitted 2 December, 2015; originally announced December 2015.

    Comments: Presente in the WCI, Kochi, India, 2015

    Journal ref: ACM Digital Library, Proceeding WCI '15 Proceedings of the Third International Symposium on Women in Computing and Informatics, PP. 54-58, 2015

  25. Centroid Based Binary Tree Structured SVM for Multi Classification

    Authors: Aruna Govada, Bhavul Gauri, S. K. Sahay

    Abstract: Support Vector Machines (SVMs) were primarily designed for 2-class classification. But they have been extended for N-class classification also based on the requirement of multiclasses in the practical applications. Although N-class classification using SVM has considerable research attention, getting minimum number of classifiers at the time of training and testing is still a continuing research.… ▽ More

    Submitted 2 December, 2015; originally announced December 2015.

    Comments: Presented in ICACCI, Kochi, India, 2015

    Journal ref: IEEE Xplore, Advances in Computing, Communications and Informatics (ICACCI), p.258 - 262, 2015

  26. Automated Document Indexing via Intelligent Hierarchical Clustering: A Novel Approach

    Authors: Rajendra Kumar Roul, Shubham Rohan Asthana, Sanjay Kumar Sahay

    Abstract: With the rising quantity of textual data available in electronic format, the need to organize it become a highly challenging task. In the present paper, we explore a document organization framework that exploits an intelligent hierarchical clustering algorithm to generate an index over a set of documents. The framework has been designed to be scalable and accurate even with large corpora. The adva… ▽ More

    Submitted 1 April, 2015; originally announced April 2015.

    Comments: 6 Pages, 3 Figures. IEEE Xplore, ICHPCA-2014

  27. arXiv:1503.08463  [pdf

    cs.IR

    A Novel Modified Apriori Approach for Web Document Clustering

    Authors: Rajendra Kumar Roul, Saransh Varshneya, Ashu Kalra, Sanjay Kumar Sahay

    Abstract: The traditional apriori algorithm can be used for clustering the web documents based on the association technique of data mining. But this algorithm has several limitations due to repeated database scans and its weak association rule analysis. In modern world of large databases, efficiency of traditional apriori algorithm would reduce manifolds. In this paper, we proposed a new modified apriori ap… ▽ More

    Submitted 29 March, 2015; originally announced March 2015.

    Comments: 11 Pages, 5 Figures

    Journal ref: Springer, Smart Innovation Systems and Technologies, Vol. 33, 2015, p. 159-171; Proceedings of the ICCIDM, Dec. 2014

  28. Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey

    Authors: Ashu Sharma, S. K. Sahay

    Abstract: Malwares are big threat to digital world and evolving with high complexity. It can penetrate networks, steal confidential information from computers, bring down servers and can cripple infrastructures etc. To combat the threat/attacks from the malwares, anti- malwares have been developed. The existing anti-malwares are mostly based on the assumption that the malware structure does not changes appr… ▽ More

    Submitted 2 December, 2015; v1 submitted 27 June, 2014; originally announced June 2014.

    Comments: 5 Pages

    Journal ref: International Journal of Computer Applications, 2014, Vol. 90, No. 2, p. 7

  29. arXiv:1406.5617  [pdf

    cs.IR

    Web Document Clustering and Ranking using Tf-Idf based Apriori Approach

    Authors: R. K. Roul, O. R. Devanand, S. K. Sahay

    Abstract: The dynamic web has increased exponentially over the past few years with more than thousands of documents related to a subject available to the user now. Most of the web documents are unstructured and not in an organized manner and hence user facing more difficult to find relevant documents. A more useful and efficient mechanism is combining clustering with ranking, where clustering can group the… ▽ More

    Submitted 21 June, 2014; originally announced June 2014.

    Comments: 5 Pages

    Journal ref: IJCA Proceedings on ICACEA, No. 2, p. 34 (2014)

  30. arXiv:1406.5616  [pdf

    cs.IR

    An Effective Approach for Web Document Classification using the Concept of Association Analysis of Data Mining

    Authors: R. K. Roul, S. K. Sahay

    Abstract: Exponential growth of the web increased the importance of web document classification and data mining. To get the exact information, in the form of knowing what classes a web document belongs to, is expensive. Automatic classification of web document is of great use to search engines which provides this information at a low cost. In this paper, we propose an approach for classifying the web docume… ▽ More

    Submitted 21 June, 2014; originally announced June 2014.

    Comments: 9 Pages

    Journal ref: IJCSET, 2012, Vol. 3, No. 10, p. 483

  31. arXiv:1211.1107  [pdf

    cs.IR

    An effective web document clustering for information retrieval

    Authors: R. K. Roul, S. K. Sahay

    Abstract: The size of web has increased exponentially over the past few years with thousands of documents related to a subject available to the user. With this much amount of information available, it is not possible to take the full advantage of the World Wide Web without having a proper framework to search through the available data. This requisite organization can be done in many ways. In this paper we i… ▽ More

    Submitted 5 November, 2012; originally announced November 2012.

    Comments: 11 Pages, 2 figures

    Report number: IJCSMR, 2012, Vol. 1, No. 3, p. 481

  32. arXiv:1204.1406  [pdf, other

    cs.IR

    An Effective Information Retrieval for Ambiguous Query

    Authors: R. K. Roul, S. K. Sahay

    Abstract: Search engine returns thousands of web pages for a single user query, in which most of them are not relevant. In this context, effective information retrieval from the expanding web is a challenging task, in particular, if the query is ambiguous. The major question arises here is that how to get the relevant pages for an ambiguous query. We propose an approach for the effective result of an ambigu… ▽ More

    Submitted 6 April, 2012; originally announced April 2012.

    Comments: 11 Pages, 1 figure

    Journal ref: AJCSIT, Vol. 2, No. 3, P. 26-30, 2012

  33. arXiv:0803.0786  [pdf, ps, other

    gr-qc astro-ph

    On the independent points in the sky for the search of periodic gravitational wave

    Authors: S. K. Sahay

    Abstract: We investigate the independent points in the sky require to search the periodic gravitational wave, assuming the noise power spectral density to be flat. We have made an analysis with different initial azimuth of the Earth for a week data set. The analysis shows significant difference in the independent points in the sky for the search. We numerically obtain an approximate relation to make trade… ▽ More

    Submitted 5 March, 2008; originally announced March 2008.

    Comments: 10 Pages, 2 figures

    Journal ref: Rom.Rep.Phys.61:191-201,2009

  34. Earth azimuth effect in the bank of search templates for an all sky search of the continuous gravitational wave

    Authors: S. K. Sahay

    Abstract: We study the problem of all sky search in reference to continuous gravitational wave (CGW) whose wave-form are known in advance. We employ the concept of Fitting Factor and study the variation in the bank of search templates with different Earth azimuth at t=0. We found that the number of search templates varies significantly. Hence, accordingly, the computational demand for the search may be re… ▽ More

    Submitted 28 March, 2006; originally announced March 2006.

    Comments: 12 Pages, 3 figures

    Journal ref: Int.J.Mod.Phys. D15 (2006) 225-234

  35. Matching of the continuous gravitational wave in an all sky search

    Authors: S. K. Sahay

    Abstract: We investigate the matching of continuous gravitational wave (CGW) signals in an all sky search with reference to Earth based laser interferometric detectors. We consider the source location as the parameters of the signal manifold and templates corresponding to different source locations. It has been found that the matching of signals from locations in the sky that differ in their co-latitude a… ▽ More

    Submitted 24 March, 2003; v1 submitted 31 December, 2002; originally announced December 2002.

    Comments: 16 pages, 7 figures, 3 Tables, To appear in Int. J. Mod. Phys. D

    Journal ref: Int.J.Mod.Phys.D12:1227-1240,2003

  36. arXiv:gr-qc/0209019  [pdf, ps, other

    gr-qc astro-ph

    Studies in Gravitational Wave Data Analysis

    Authors: S. K. Sahay

    Abstract: This thesis is devoted to the investigations of gravitational wave (GW) data analysis from a continuous source e.g. a pulsar, a binary star system. The first Chapter is an introduction to gravitational wave and second Chapter is on the data analysis concept for the detection of GW. In third Chapter we developed the Fourier Transform (FT) of a continuous gravitational wave (CGW) for ground based… ▽ More

    Submitted 6 September, 2002; originally announced September 2002.

    Comments: Ph.D Thesis, based on gr-qc/0111050, 0207119 and 0209009 (All three papers to be apppear in MNRAS), 179 Pages and 39 figures

  37. Data analysis of continuous gravitational wave: All sky search and study of templates

    Authors: D. C. Srivastava, S. K. Sahay

    Abstract: We have studied the problem of all sky search in reference to continuous gravitational wave particularly for such sources whose wave-form are known in advance. We have made an analysis of the number of templates required for matched filter analysis as applicable to these sources. We have employed the concept of {\it fitting factor} {\it (FF)}; treating the source location as the parameters of th… ▽ More

    Submitted 3 September, 2002; originally announced September 2002.

    Comments: Accepted in MNRAS, 14 pages, 5 figures

    Journal ref: Mon.Not.Roy.Astron.Soc. 337 (2002) 322-326

  38. Data analysis of continuous gravitational wave: Fourier transform-II

    Authors: D. C. Srivastava, S. K. Sahay

    Abstract: In this paper we obtain the Fourier Transform of a continuous gravitational wave. We have analysed the data set for (i) one year observation time and (ii) arbitrary observation time, for arbitrary location of detector and source taking into account the effects arising due to rotational as well as orbital motion of the earth. As an application of the transform we considered spin down and N-compon… ▽ More

    Submitted 30 July, 2002; originally announced July 2002.

    Comments: Accepted in MNRAS, 14 pages, 4 figures

    Journal ref: Mon.Not.Roy.Astron.Soc. 337 (2002) 315-321

  39. Data analysis of continuous gravitational wave: Fourier transform-I

    Authors: D. C. Srivastava, S. K. Sahay

    Abstract: We present the Fourier Transform of a continuous gravitational wave. We have analysed the data set for one day observation time and our analysis is applicable for arbitrary location of detector and source. We have taken into account the effects arising due to rotational as well as orbital motions of the earth.

    Submitted 3 September, 2002; v1 submitted 16 November, 2001; originally announced November 2001.

    Comments: Accepted in MNRAS, 22 pages, 9 figures

    Journal ref: Mon.Not.Roy.Astron.Soc.337:305-314,2002

  40. Data Analysis of Continuous Gravitational Wave Signal: Fourier Transform

    Authors: D. C. Srivastava, S. K. Sahay

    Abstract: We present the Fourier Transform of continuous gravitational wave for arbitrary location of detector and source and for any duration of observation time in which both rotational motion of earth about its spin axis and orbital motion around sun has been taken into account. We also give the method to account the spin down of continuous gravitational wave.

    Submitted 27 September, 2000; originally announced September 2000.

    Comments: 3 pages