-
A Survey on the Detection of Android Malicious Apps
Authors:
Sanjay K. Sahay,
Ashu Sharma
Abstract:
Android-based smart devices are exponentially growing, and due to the ubiquity of the Internet, these devices are globally connected to the different devices/networks. Its popularity, attractive features, and mobility make malware creator to put a number of malicious apps in the market to disrupt and annoy the victims. Although to identify the malicious apps, time-to-time various techniques are pr…
▽ More
Android-based smart devices are exponentially growing, and due to the ubiquity of the Internet, these devices are globally connected to the different devices/networks. Its popularity, attractive features, and mobility make malware creator to put a number of malicious apps in the market to disrupt and annoy the victims. Although to identify the malicious apps, time-to-time various techniques are proposed. However, it appears that malware developers are always ahead of the anti-malware group, and the proposed techniques by the anti-malware groups are not sufficient to counter the advanced malicious apps. Therefore, to understand the various techniques proposed/used for the identification of Android malicious apps, in this paper, we present a survey conducted by us on the work done by the researchers in this field.
△ Less
Submitted 29 May, 2019;
originally announced May 2019.
-
An Efficient Detection of Malware by Naive Bayes Classifier Using GPGPU
Authors:
Sanjay K. Sahay,
Mayank Chaudhari
Abstract:
Due to continuous increase in the number of malware (according to AV-Test institute total ~8 x 10^8 malware are already known, and every day they register ~2.5 x 10^4 malware) and files in the computational devices, it is very important to design a system which not only effectively but can also efficiently detect the new or previously unseen malware to prevent/minimize the damages. Therefore, this…
▽ More
Due to continuous increase in the number of malware (according to AV-Test institute total ~8 x 10^8 malware are already known, and every day they register ~2.5 x 10^4 malware) and files in the computational devices, it is very important to design a system which not only effectively but can also efficiently detect the new or previously unseen malware to prevent/minimize the damages. Therefore, this paper presents a novel group-wise approach for the efficient detection of malware by parallelizing the classification using the power of GPGPU and shown that by using the Naive Bayes classifier the detection speed-up can be boosted up to 200x. The investigation also shows that the classification time increases significantly with the number of features.
△ Less
Submitted 29 May, 2019;
originally announced May 2019.
-
Energy-Efficient Moderate Precision Time-Domain Mixed-signal Vector-by-Matrix Multiplier Exploiting 1T-1R Arrays
Authors:
Shubham Sahay,
Mohammad Bavandpour,
Mohammad Reza Mahmoodi,
Dmitri Strukov
Abstract:
The emerging mobile devices in this era of internet-of-things (IoT) require a dedicated processor to enable computationally intensive applications such as neuromorphic computing and signal processing. Vector-by-matrix multiplication (VMM) is the most prominent operation in these applications. Therefore, there is a critical need for compact and ultralow-power VMM blocks to perform resource-intensiv…
▽ More
The emerging mobile devices in this era of internet-of-things (IoT) require a dedicated processor to enable computationally intensive applications such as neuromorphic computing and signal processing. Vector-by-matrix multiplication (VMM) is the most prominent operation in these applications. Therefore, there is a critical need for compact and ultralow-power VMM blocks to perform resource-intensive low-to-moderate precision computations. To this end, in this work, for the first time, we propose a time-domain mixed-signal VMM exploiting a modified configuration of 1MOSFET-1RRAM (1T-1R) array. The proposed VMM overcomes the energy inefficiency of the current-mode VMM approaches based on RRAMs. A rigorous analysis of the different non-ideal factors affecting the computational precision indicates that the non-negligible minimum cell currents, channel length modulation (CLM) and drain-induced barrier lowering (DIBL) are the dominant mechanisms degrading the precision of the proposed VMM. Our results also indicate that there exists a trade-off between the computational precision, dynamic range, and the area- and energy-efficiency of the proposed VMM approach. Therefore, we provide the necessary design guidelines for optimizing the performance. Our preliminary results show that an effective computational precision of 6-bits is achievable owing to an inherent compensation effect in the modified 1T-1R blocks. Furthermore, a 4-bit 200x200 VMM utilizing the proposed approach exhibits a significantly high energy efficiency of ~1.5 POps/J and a throughput of 2.5 TOps/s including the contribution from the input/output (I/O) circuitry.
△ Less
Submitted 6 January, 2020; v1 submitted 23 May, 2019;
originally announced May 2019.
-
Natural Language Interactions in Autonomous Vehicles: Intent Detection and Slot Filling from Passenger Utterances
Authors:
Eda Okur,
Shachi H Kumar,
Saurav Sahay,
Asli Arslan Esme,
Lama Nachman
Abstract:
Understanding passenger intents and extracting relevant slots are important building blocks towards develo** contextual dialogue systems for natural interactions in autonomous vehicles (AV). In this work, we explored AMIE (Automated-vehicle Multi-modal In-cabin Experience), the in-cabin agent responsible for handling certain passenger-vehicle interactions. When the passengers give instructions t…
▽ More
Understanding passenger intents and extracting relevant slots are important building blocks towards develo** contextual dialogue systems for natural interactions in autonomous vehicles (AV). In this work, we explored AMIE (Automated-vehicle Multi-modal In-cabin Experience), the in-cabin agent responsible for handling certain passenger-vehicle interactions. When the passengers give instructions to AMIE, the agent should parse such commands properly and trigger the appropriate functionality of the AV system. In our current explorations, we focused on AMIE scenarios describing usages around setting or changing the destination and route, updating driving behavior or speed, finishing the trip and other use-cases to support various natural commands. We collected a multi-modal in-cabin dataset with multi-turn dialogues between the passengers and AMIE using a Wizard-of-Oz scheme via a realistic scavenger hunt game activity. After exploring various recent Recurrent Neural Networks (RNN) based techniques, we introduced our own hierarchical joint models to recognize passenger intents along with relevant slots associated with the action to be performed in AV scenarios. Our experimental results outperformed certain competitive baselines and achieved overall F1 scores of 0.91 for utterance-level intent detection and 0.96 for slot filling tasks. In addition, we conducted initial speech-to-text explorations by comparing intent/slot models trained and tested on human transcriptions versus noisy Automatic Speech Recognition (ASR) outputs. Finally, we compared the results with single passenger rides versus the rides with multiple passengers.
△ Less
Submitted 23 April, 2019;
originally announced April 2019.
-
Android Malicious Application Classification Using Clustering
Authors:
Hemant Rathore,
Sanjay K. Sahay,
Palash Chaturvedi,
Mohit Sewak
Abstract:
Android malware have been growing at an exponential pace and becomes a serious threat to mobile users. It appears that most of the anti-malware still relies on the signature-based detection system which is generally slow and often not able to detect advanced obfuscated malware. Hence time-to-time various authors have proposed different machine learning solutions to identify sophisticated malware.…
▽ More
Android malware have been growing at an exponential pace and becomes a serious threat to mobile users. It appears that most of the anti-malware still relies on the signature-based detection system which is generally slow and often not able to detect advanced obfuscated malware. Hence time-to-time various authors have proposed different machine learning solutions to identify sophisticated malware. However, it appears that detection accuracy can be improved by using the clustering method. Therefore in this paper, we propose a novel scalable and effective clustering method to improve the detection accuracy of the malicious android application and obtained a better overall accuracy (98.34%) by random forest classifier compared to regular method, i.e., taking the data altogether to detect the malware. However, as far as true positive and true negative are concerned, by clustering method, true positive is best obtained by decision tree (97.59%) and true negative by support vector machine (99.96%) which is the almost same result obtained by the random forest true positive (97.30%) and true negative (99.38%) respectively. The reason that overall accuracy of random forest is high because the true positive of support vector machine and true negative of the decision tree is significantly less than the random forest.
△ Less
Submitted 21 April, 2019;
originally announced April 2019.
-
Malware Detection using Machine Learning and Deep Learning
Authors:
Hemant Rathore,
Swati Agarwal,
Sanjay K. Sahay,
Mohit Sewak
Abstract:
Research shows that over the last decade, malware has been growing exponentially, causing substantial financial losses to various organizations. Different anti-malware companies have been proposing solutions to defend attacks from these malware. The velocity, volume, and the complexity of malware are posing new challenges to the anti-malware community. Current state-of-the-art research shows that…
▽ More
Research shows that over the last decade, malware has been growing exponentially, causing substantial financial losses to various organizations. Different anti-malware companies have been proposing solutions to defend attacks from these malware. The velocity, volume, and the complexity of malware are posing new challenges to the anti-malware community. Current state-of-the-art research shows that recently, researchers and anti-virus organizations started applying machine learning and deep learning methods for malware analysis and detection. We have used opcode frequency as a feature vector and applied unsupervised learning in addition to supervised learning for malware classification. The focus of this tutorial is to present our work on detecting malware with 1) various machine learning algorithms and 2) deep learning models. Our results show that the Random Forest outperforms Deep Neural Network with opcode frequency as a feature. Also in feature reduction, Deep Auto-Encoders are overkill for the dataset, and elementary function like Variance Threshold perform better than others. In addition to the proposed methodologies, we will also discuss the additional issues and the unique challenges in the domain, open research problems, limitations, and future directions.
△ Less
Submitted 4 April, 2019;
originally announced April 2019.
-
Group-wise classification approach to improve Android malicious apps detection accuracy
Authors:
Ashu Sharma,
Sanjay K. Sahay
Abstract:
In the fast-growing smart devices, Android is the most popular OS, and due to its attractive features, mobility, ease of use, these devices hold sensitive information such as personal data, browsing history, shop** history, financial details, etc. Therefore, any security gap in these devices means that the information stored or accessing the smart devices are at high risk of being breached by th…
▽ More
In the fast-growing smart devices, Android is the most popular OS, and due to its attractive features, mobility, ease of use, these devices hold sensitive information such as personal data, browsing history, shop** history, financial details, etc. Therefore, any security gap in these devices means that the information stored or accessing the smart devices are at high risk of being breached by the malware. These malware are continuously growing and are also used for military espionage, disrupting the industry, power grids, etc. To detect these malware, traditional signature matching techniques are widely used. However, such strategies are not capable to detect the advanced Android malicious apps because malware developer uses several obfuscation techniques. Hence, researchers are continuously addressing the security issues in the Android based smart devices. Therefore, in this paper using Drebin benchmark malware dataset we experimentally demonstrate how to improve the detection accuracy by analyzing the apps after grou** the collected data based on the permissions and achieved 97.15% overall average accuracy. Our results outperform the accuracy obtained without grou** data (79.27%, 2017), Arp, et al. (94%, 2014), Annamalai et al. (84.29%, 2016), Bahman Rashidi et al. (82%, 2017)) and Ali Feizollah, et al. (95.5%, 2017). The analysis also shows that among the groups, Microphone group detection accuracy is least while Calendar group apps are detected with the highest accuracy, and with the highest accuracy, and for the best performance, one shall take 80-100 features.
△ Less
Submitted 3 April, 2019;
originally announced April 2019.
-
Detection of Advanced Malware by Machine Learning Techniques
Authors:
Sanjay Sharma,
C. Rama Krishna,
Sanjay K. Sahay
Abstract:
In today's digital world most of the anti-malware tools are signature based which is ineffective to detect advanced unknown malware viz. metamorphic malware. In this paper, we study the frequency of opcode occurrence to detect unknown malware by using machine learning technique. For the purpose, we have used kaggle Microsoft malware classification challenge dataset. The top 20 features obtained fr…
▽ More
In today's digital world most of the anti-malware tools are signature based which is ineffective to detect advanced unknown malware viz. metamorphic malware. In this paper, we study the frequency of opcode occurrence to detect unknown malware by using machine learning technique. For the purpose, we have used kaggle Microsoft malware classification challenge dataset. The top 20 features obtained from fisher score, information gain, gain ratio, chi-square and symmetric uncertainty feature selection methods are compared. We also studied multiple classifier available in WEKA GUI based machine learning tool and found that five of them (Random Forest, LMT, NBT, J48 Graft and REPTree) detect malware with almost 100% accuracy.
△ Less
Submitted 7 March, 2019;
originally announced March 2019.
-
Conversational Intent Understanding for Passengers in Autonomous Vehicles
Authors:
Eda Okur,
Shachi H Kumar,
Saurav Sahay,
Asli Arslan Esme,
Lama Nachman
Abstract:
Understanding passenger intents and extracting relevant slots are important building blocks towards develo** a contextual dialogue system responsible for handling certain vehicle-passenger interactions in autonomous vehicles (AV). When the passengers give instructions to AMIE (Automated-vehicle Multimodal In-cabin Experience), the agent should parse such commands properly and trigger the appropr…
▽ More
Understanding passenger intents and extracting relevant slots are important building blocks towards develo** a contextual dialogue system responsible for handling certain vehicle-passenger interactions in autonomous vehicles (AV). When the passengers give instructions to AMIE (Automated-vehicle Multimodal In-cabin Experience), the agent should parse such commands properly and trigger the appropriate functionality of the AV system. In our AMIE scenarios, we describe usages and support various natural commands for interacting with the vehicle. We collected a multimodal in-cabin data-set with multi-turn dialogues between the passengers and AMIE using a Wizard-of-Oz scheme. We explored various recent Recurrent Neural Networks (RNN) based techniques and built our own hierarchical models to recognize passenger intents along with relevant slots associated with the action to be performed in AV scenarios. Our experimental results achieved F1-score of 0.91 on utterance-level intent recognition and 0.96 on slot extraction models.
△ Less
Submitted 13 December, 2018;
originally announced January 2019.
-
Context, Attention and Audio Feature Explorations for Audio Visual Scene-Aware Dialog
Authors:
Shachi H Kumar,
Eda Okur,
Saurav Sahay,
Juan Jose Alvarado Leanos,
Jonathan Huang,
Lama Nachman
Abstract:
With the recent advancements in AI, Intelligent Virtual Assistants (IVA) have become a ubiquitous part of every home. Going forward, we are witnessing a confluence of vision, speech and dialog system technologies that are enabling the IVAs to learn audio-visual groundings of utterances and have conversations with users about the objects, activities and events surrounding them. As a part of the 7th…
▽ More
With the recent advancements in AI, Intelligent Virtual Assistants (IVA) have become a ubiquitous part of every home. Going forward, we are witnessing a confluence of vision, speech and dialog system technologies that are enabling the IVAs to learn audio-visual groundings of utterances and have conversations with users about the objects, activities and events surrounding them. As a part of the 7th Dialog System Technology Challenges (DSTC7), for Audio Visual Scene-Aware Dialog (AVSD) track, We explore `topics' of the dialog as an important contextual feature into the architecture along with explorations around multimodal Attention. We also incorporate an end-to-end audio classification ConvNet, AclNet, into our models. We present detailed analysis of the experiments and show that some of our model variations outperform the baseline system presented for this task.
△ Less
Submitted 20 December, 2018;
originally announced December 2018.
-
A Behavioral Compact Model of 3D NAND Flash Memory
Authors:
Shubham Sahay,
Dmitri Strukov
Abstract:
We present a behavioral compact model of 3D NAND flash memory for integrated circuits and system-level applications. This model is easy to implement, computationally efficient, fast, accurate and effectively accounts for the different parasitic capacitance coupling effects applicable to the 3D geometry of the vertical channel Macaroni body charge-trap flash memory. The model parameter extraction m…
▽ More
We present a behavioral compact model of 3D NAND flash memory for integrated circuits and system-level applications. This model is easy to implement, computationally efficient, fast, accurate and effectively accounts for the different parasitic capacitance coupling effects applicable to the 3D geometry of the vertical channel Macaroni body charge-trap flash memory. The model parameter extraction methodology is simple and can be extended to reproduce the electrical behavior of different 3D NAND flash memory architectures (with different page size, dimension, or number of stacked layers). We believe that the developed compact model would equip the circuit designers and system architects with an effective tool for design-exploration of 3D NAND flash memory devices for diverse unconventional analog applications.
△ Less
Submitted 1 December, 2018;
originally announced December 2018.
-
Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection
Authors:
Mohit Sewak,
Sanjay K. Sahay,
Hemant Rathore
Abstract:
Recently, Deep Learning has been showing promising results in various Artificial Intelligence applications like image recognition, natural language processing, language modeling, neural machine translation, etc. Although, in general, it is computationally more expensive as compared to classical machine learning techniques, their results are found to be more effective in some cases. Therefore, in t…
▽ More
Recently, Deep Learning has been showing promising results in various Artificial Intelligence applications like image recognition, natural language processing, language modeling, neural machine translation, etc. Although, in general, it is computationally more expensive as compared to classical machine learning techniques, their results are found to be more effective in some cases. Therefore, in this paper, we investigated and compared one of the Deep Learning Architecture called Deep Neural Network (DNN) with the classical Random Forest (RF) machine learning algorithm for the malware classification. We studied the performance of the classical RF and DNN with 2, 4 & 7 layers architectures with the four different feature sets, and found that irrespective of the features inputs, the classical RF accuracy outperforms the DNN.
△ Less
Submitted 16 September, 2018;
originally announced September 2018.
-
An investigation of a deep learning based malware detection system
Authors:
Mohit Sewak,
Sanjay K. Sahay,
Hemant Rathore
Abstract:
We investigate a Deep Learning based system for malware detection. In the investigation, we experiment with different combination of Deep Learning architectures including Auto-Encoders, and Deep Neural Networks with varying layers over Malicia malware dataset on which earlier studies have obtained an accuracy of (98%) with an acceptable False Positive Rates (1.07%). But these results were done usi…
▽ More
We investigate a Deep Learning based system for malware detection. In the investigation, we experiment with different combination of Deep Learning architectures including Auto-Encoders, and Deep Neural Networks with varying layers over Malicia malware dataset on which earlier studies have obtained an accuracy of (98%) with an acceptable False Positive Rates (1.07%). But these results were done using extensive man-made custom domain features and investing corresponding feature engineering and design efforts. In our proposed approach, besides improving the previous best results (99.21% accuracy and a False Positive Rate of 0.19%) indicates that Deep Learning based systems could deliver an effective defense against malware. Since it is good in automatically extracting higher conceptual features from the data, Deep Learning based systems could provide an effective, general and scalable mechanism for detection of existing and unknown malware.
△ Less
Submitted 16 September, 2018;
originally announced September 2018.
-
Multimodal Relational Tensor Network for Sentiment and Emotion Classification
Authors:
Saurav Sahay,
Shachi H Kumar,
Rui Xia,
Jonathan Huang,
Lama Nachman
Abstract:
Understanding Affect from video segments has brought researchers from the language, audio and video domains together. Most of the current multimodal research in this area deals with various techniques to fuse the modalities, and mostly treat the segments of a video independently. Motivated by the work of (Zadeh et al., 2017) and (Poria et al., 2017), we present our architecture, Relational Tensor…
▽ More
Understanding Affect from video segments has brought researchers from the language, audio and video domains together. Most of the current multimodal research in this area deals with various techniques to fuse the modalities, and mostly treat the segments of a video independently. Motivated by the work of (Zadeh et al., 2017) and (Poria et al., 2017), we present our architecture, Relational Tensor Network, where we use the inter-modal interactions within a segment (intra-segment) and also consider the sequence of segments in a video to model the inter-segment inter-modal interactions. We also generate rich representations of text and audio modalities by leveraging richer audio and linguistic context alongwith fusing fine-grained knowledge based polarity scores from text. We present the results of our model on CMU-MOSEI dataset and show that our model outperforms many baselines and state of the art methods for sentiment classification and emotion recognition.
△ Less
Submitted 7 June, 2018;
originally announced June 2018.
-
An investigation of the classifiers to detect android malicious apps
Authors:
Ashu Sharma,
Sanjay K. Sahay
Abstract:
Android devices are growing exponentially and are connected through the internet accessing billion of online websites. The popularity of these devices encourages malware developer to penetrate the market with malicious apps to annoy and disrupt the victim. Although, for the detection of malicious apps different approaches are discussed. However, proposed approaches are not suffice to detect the ad…
▽ More
Android devices are growing exponentially and are connected through the internet accessing billion of online websites. The popularity of these devices encourages malware developer to penetrate the market with malicious apps to annoy and disrupt the victim. Although, for the detection of malicious apps different approaches are discussed. However, proposed approaches are not suffice to detect the advanced malware to limit/prevent the damages. In this, very few approaches are based on opcode occurrence to classify the malicious apps. Therefore, this paper investigates the five classifiers using opcodes occurrence as the prominent features for the detection of malicious apps. For the analysis, we use WEKA tool and found that FT detection accuracy (79.27%) is best among the investigated classifiers. However, true positives rate i.e. malware detection rate is highest (99.91%) by RF and fluctuate least with the different number of prominent features compared to other studied classifiers. The analysis shows that overall accuracy is majorly affected by the false positives of the classifier.
△ Less
Submitted 23 February, 2018;
originally announced February 2018.
-
Low Cost Autonomous Navigation and Control of a Mechanically Balanced Bicycle with Dual Locomotion Mode
Authors:
Ayush Pandey,
Subhamoy Mahajan,
Adarsh Kosta,
Dhananjay Yadav,
Vikas Pandey,
Saurav Sahay,
Siddharth Jha,
Shubh Agarwal,
Aashay Bhise,
Raushan Kumar,
Aniket Bhushan,
Vraj Parikh,
Ankit Lohani,
Saurabh Dash,
Himanshu Choudhary,
Rahul Kumar,
Anurag Sharma,
Arnab Mondal,
Chendika Karthik Sai,
P N Vamshi
Abstract:
On the lines of the huge and varied efforts in the field of automation with respect to technology development and innovation of vehicles to make them run autonomously, this paper presents an innovation to a bicycle. A normal daily use bicycle was modified at low cost such that it runs autonomously, while maintaining its original form i.e. the manual drive. Hence, a bicycle which could be normally…
▽ More
On the lines of the huge and varied efforts in the field of automation with respect to technology development and innovation of vehicles to make them run autonomously, this paper presents an innovation to a bicycle. A normal daily use bicycle was modified at low cost such that it runs autonomously, while maintaining its original form i.e. the manual drive. Hence, a bicycle which could be normally driven by any human and with a press of switch could run autonomously according to the needs of the user has been developed.
△ Less
Submitted 1 November, 2016;
originally announced November 2016.
-
A Communication Efficient and Scalable Distributed Data Mining for the Astronomical Data
Authors:
Aruna Govada,
Sanjay K. Sahay
Abstract:
In 2020, ~60PB of archived data will be accessible to the astronomers. But to analyze such a paramount data will be a challenging task. This is basically due to the computational model used to download the data from complex geographically distributed archives to a central site and then analyzing it in the local systems. Because the data has to be downloaded to the central site, the network BW limi…
▽ More
In 2020, ~60PB of archived data will be accessible to the astronomers. But to analyze such a paramount data will be a challenging task. This is basically due to the computational model used to download the data from complex geographically distributed archives to a central site and then analyzing it in the local systems. Because the data has to be downloaded to the central site, the network BW limitation will be a hindrance for the scientific discoveries. Also analyzing this PB-scale on local machines in a centralized manner is challenging. In this virtual observatory is a step towards this problem, however, it does not provide the data mining model. Adding the distributed data mining layer to the VO can be the solution in which the knowledge can be downloaded by the astronomers instead the raw data and thereafter astronomers can either reconstruct the data back from the downloaded knowledge or use the knowledge directly for further analysis.Therefore, in this paper, we present Distributed Load Balancing Principal Component Analysis for optimally distributing the computation among the available nodes to minimize the transmission cost and downloading cost for the end user. The experimental analysis is done with Fundamental Plane(FP) data, Gadotti data and complex Mfeat data. In terms of transmission cost, our approach performs better than Qi. et al. and Yue.et al. The analysis shows that with the complex Mfeat data ~90% downloading cost can be reduced for the end user with the negligible loss in accuracy.
△ Less
Submitted 23 June, 2016;
originally announced June 2016.
-
Covariance estimation for vertically partitioned data in a distributed environment
Authors:
Aruna Govada,
Sanjay K. Sahay
Abstract:
The major sources of abundant data are constantly expanding with the available data collection methodologies in various applications - medical, insurance, scientific, bio-informatics and business. These data sets may be distributed geographically, rich in size and as well as dimensions also. To analyze these data sets to find out the hidden patterns, it is required to down- load the data to a cent…
▽ More
The major sources of abundant data are constantly expanding with the available data collection methodologies in various applications - medical, insurance, scientific, bio-informatics and business. These data sets may be distributed geographically, rich in size and as well as dimensions also. To analyze these data sets to find out the hidden patterns, it is required to down- load the data to a centralized site which is a challenging task in terms of the limited bandwidth available and computationally also expensive. The covariance matrix is one of the methods to estimate the relation between any two dimensions. In this paper, we propose a communication efficient algorithm to estimate the covariance matrix in a distributed manner. The global covariance matrix is computed by merging the local covariance matrices using a distributed approach. The results show that it is exactly same as centralized method with good speed-up in terms of computation. The reason for speed-up is because of the parallel construction of local covariances and distributing the cross-covariances among the nodes so that the load is balanced. The results are analyzed by considering Mfeat data set on the various partitions which address the scalability also.
△ Less
Submitted 23 June, 2016;
originally announced June 2016.
-
Improving the detection accuracy of unknown malware by partitioning the executables in groups
Authors:
Ashu Sharma,
Sanjay K. Sahay,
Abhishek Kumar
Abstract:
Detection of unknown malware with high accuracy is always a challenging task. Therefore, in this paper, we study the classification of unknown malware by two methods. In the first/regular method, similar to other authors [17][16][20] approaches we select the features by taking all dataset in one group and in the second method, we select the features by partitioning the dataset in the range of file…
▽ More
Detection of unknown malware with high accuracy is always a challenging task. Therefore, in this paper, we study the classification of unknown malware by two methods. In the first/regular method, similar to other authors [17][16][20] approaches we select the features by taking all dataset in one group and in the second method, we select the features by partitioning the dataset in the range of file 5 KB size. We find that the second method to detect the malware with ~8.7% more accurate than the first/regular method.
△ Less
Submitted 22 June, 2016;
originally announced June 2016.
-
Grou** the executables to detect malware with high accuracy
Authors:
Sanjay K. Sahay,
Ashu Sharma
Abstract:
The metamorphic malware variants with the same malicious behavior (family), can obfuscate themselves to look different from each other. This variation in structure leads to a huge signature database for traditional signature matching techniques to detect them. In order to effective and efficient detection of malware in large amounts of executables, we need to partition these files into groups whic…
▽ More
The metamorphic malware variants with the same malicious behavior (family), can obfuscate themselves to look different from each other. This variation in structure leads to a huge signature database for traditional signature matching techniques to detect them. In order to effective and efficient detection of malware in large amounts of executables, we need to partition these files into groups which can identify their respective families. In addition, the grou** criteria should be chosen such a way that, it can also be applied to unknown files encounter on computers for classification. This paper discusses the study of malware and benign executables in groups to detect unknown malware with high accuracy. We studied sizes of malware generated by three popular second generation malware (metamorphic malware) creator kits viz. G2, PS-MPC and NGVCK, and observed that the size variation in any two generated malware from same kit is not much. Hence, we grouped the executables on the basis of malware sizes by using Optimal k-Means Clustering algorithm and used these obtained groups to select promising features for training (Random forest, J48, LMT, FT and NBT) classifiers to detect variants of malware or unknown malware. We find that detection of malware on the basis of their respected file sizes gives accuracy up to 99.11% from the classifiers.
△ Less
Submitted 22 June, 2016;
originally announced June 2016.
-
An effective approach for classification of advanced malware with high accuracy
Authors:
Ashu Sharma,
Sanjay K. Sahay
Abstract:
Combating malware is very important for software/systems security, but to prevent the software/systems from the advanced malware, viz. metamorphic malware is a challenging task, as it changes the structure/code after each infection. Therefore in this paper, we present a novel approach to detect the advanced malware with high accuracy by analyzing the occurrence of opcodes (features) by grou** th…
▽ More
Combating malware is very important for software/systems security, but to prevent the software/systems from the advanced malware, viz. metamorphic malware is a challenging task, as it changes the structure/code after each infection. Therefore in this paper, we present a novel approach to detect the advanced malware with high accuracy by analyzing the occurrence of opcodes (features) by grou** the executables. These groups are made on the basis of our earlier studies [1] that the difference between the sizes of any two malware generated by popular advanced malware kits viz. PS-MPC, G2 and NGVCK are within 5 KB. On the basis of obtained promising features, we studied the performance of thirteen classifiers using N-fold cross-validation available in machine learning tool WEKA. Among these thirteen classifiers we studied in-depth top five classifiers (Random forest, LMT, NBT, J48 and FT) and obtain more than 96.28% accuracy for the detection of unknown malware, which is better than the maximum detection accuracy (95.9%) reported by Santos et al (2013). In these top five classifiers, our approach obtained a detection accuracy of 97.95% by the Random forest.
△ Less
Submitted 22 June, 2016;
originally announced June 2016.
-
A Novel Approach to Distributed Multi-Class SVM
Authors:
Aruna Govada,
Shree Ranjani,
Aditi Viswanathan,
S. K. Sahay
Abstract:
With data sizes constantly expanding, and with classical machine learning algorithms that analyze such data requiring larger and larger amounts of computation time and storage space, the need to distribute computation and memory requirements among several computers has become apparent. Although substantial work has been done in develo** distributed binary SVM algorithms and multi-class SVM algor…
▽ More
With data sizes constantly expanding, and with classical machine learning algorithms that analyze such data requiring larger and larger amounts of computation time and storage space, the need to distribute computation and memory requirements among several computers has become apparent. Although substantial work has been done in develo** distributed binary SVM algorithms and multi-class SVM algorithms individually, the field of multi-class distributed SVMs remains largely unexplored. This research proposes a novel algorithm that implements the Support Vector Machine over a multi-class dataset and is efficient in a distributed environment (here, Hadoop). The idea is to divide the dataset into half recursively and thus compute the optimal Support Vector Machine for this half during the training phase, much like a divide and conquer approach. While testing, this structure has been effectively exploited to significantly reduce the prediction time. Our algorithm has shown better computation time during the prediction phase than the traditional sequential SVM methods (One vs. One, One vs. Rest) and out-performs them as the size of the dataset grows. This approach also classifies the data with higher accuracy than the traditional multi-class algorithms.
△ Less
Submitted 7 December, 2015;
originally announced December 2015.
-
Hybrid Approach for Inductive Semi Supervised Learning using Label Propagation and Support Vector Machine
Authors:
Aruna Govada,
Pravin Joshi,
Sahil Mittal,
Sanjay K Sahay
Abstract:
Semi supervised learning methods have gained importance in today's world because of large expenses and time involved in labeling the unlabeled data by human experts. The proposed hybrid approach uses SVM and Label Propagation to label the unlabeled data. In the process, at each step SVM is trained to minimize the error and thus improve the prediction quality. Experiments are conducted by using SVM…
▽ More
Semi supervised learning methods have gained importance in today's world because of large expenses and time involved in labeling the unlabeled data by human experts. The proposed hybrid approach uses SVM and Label Propagation to label the unlabeled data. In the process, at each step SVM is trained to minimize the error and thus improve the prediction quality. Experiments are conducted by using SVM and logistic regression(Logreg). Results prove that SVM performs tremendously better than Logreg. The approach is tested using 12 datasets of different sizes ranging from the order of 1000s to the order of 10000s. Results show that the proposed approach outperforms Label Propagation by a large margin with F-measure of almost twice on average. The parallel version of the proposed approach is also designed and implemented, the analysis shows that the training time decreases significantly when parallel version is used.
△ Less
Submitted 2 December, 2015;
originally announced December 2015.
-
Distributed Multi Class SVM for Large Data Sets
Authors:
Aruna Govada,
Bhavul Gauri,
S. K. Sahay
Abstract:
Data mining algorithms are originally designed by assuming the data is available at one centralized site.These algorithms also assume that the whole data is fit into main memory while running the algorithm. But in today's scenario the data has to be handled is distributed even geographically. Bringing the data into a centralized site is a bottleneck in terms of the bandwidth when compared with the…
▽ More
Data mining algorithms are originally designed by assuming the data is available at one centralized site.These algorithms also assume that the whole data is fit into main memory while running the algorithm. But in today's scenario the data has to be handled is distributed even geographically. Bringing the data into a centralized site is a bottleneck in terms of the bandwidth when compared with the size of the data. In this paper for multiclass SVM we propose an algorithm which builds a global SVM model by merging the local SVMs using a distributed approach(DSVM). And the global SVM will be communicated to each site and made it available for further classification. The experimental analysis has shown promising results with better accuracy when compared with both the centralized and ensemble method. The time complexity is also reduced drastically because of the parallel construction of local SVMs. The experiments are conducted by considering the data sets of size 100s to hundred of 100s which also addresses the issue of scalability.
△ Less
Submitted 2 December, 2015;
originally announced December 2015.
-
Centroid Based Binary Tree Structured SVM for Multi Classification
Authors:
Aruna Govada,
Bhavul Gauri,
S. K. Sahay
Abstract:
Support Vector Machines (SVMs) were primarily designed for 2-class classification. But they have been extended for N-class classification also based on the requirement of multiclasses in the practical applications. Although N-class classification using SVM has considerable research attention, getting minimum number of classifiers at the time of training and testing is still a continuing research.…
▽ More
Support Vector Machines (SVMs) were primarily designed for 2-class classification. But they have been extended for N-class classification also based on the requirement of multiclasses in the practical applications. Although N-class classification using SVM has considerable research attention, getting minimum number of classifiers at the time of training and testing is still a continuing research. We propose a new algorithm CBTS-SVM (Centroid based Binary Tree Structured SVM) which addresses this issue. In this we build a binary tree of SVM models based on the similarity of the class labels by finding their distance from the corresponding centroids at the root level. The experimental results demonstrates the comparable accuracy for CBTS with OVO with reasonable gamma and cost values. On the other hand when CBTS is compared with OVA, it gives the better accuracy with reduced training time and testing time. Furthermore CBTS is also scalable as it is able to handle the large data sets.
△ Less
Submitted 2 December, 2015;
originally announced December 2015.
-
Automated Document Indexing via Intelligent Hierarchical Clustering: A Novel Approach
Authors:
Rajendra Kumar Roul,
Shubham Rohan Asthana,
Sanjay Kumar Sahay
Abstract:
With the rising quantity of textual data available in electronic format, the need to organize it become a highly challenging task. In the present paper, we explore a document organization framework that exploits an intelligent hierarchical clustering algorithm to generate an index over a set of documents. The framework has been designed to be scalable and accurate even with large corpora. The adva…
▽ More
With the rising quantity of textual data available in electronic format, the need to organize it become a highly challenging task. In the present paper, we explore a document organization framework that exploits an intelligent hierarchical clustering algorithm to generate an index over a set of documents. The framework has been designed to be scalable and accurate even with large corpora. The advantage of the proposed algorithm lies in the need for minimal inputs, with much of the hierarchy attributes being decided in an automated manner using statistical methods. The use of topic modeling in a pre-processing stage ensures robustness to a range of variations in the input data. For experimental work 20-Newsgroups dataset has been used. The F- measure of the proposed approach has been compared with the traditional K-Means and K-Medoids clustering algorithms. Test results demonstrate the applicability, efficiency and effectiveness of our proposed approach. After extensive experimentation, we conclude that the framework shows promise for further research and specialized commercial applications.
△ Less
Submitted 1 April, 2015;
originally announced April 2015.
-
A Novel Modified Apriori Approach for Web Document Clustering
Authors:
Rajendra Kumar Roul,
Saransh Varshneya,
Ashu Kalra,
Sanjay Kumar Sahay
Abstract:
The traditional apriori algorithm can be used for clustering the web documents based on the association technique of data mining. But this algorithm has several limitations due to repeated database scans and its weak association rule analysis. In modern world of large databases, efficiency of traditional apriori algorithm would reduce manifolds. In this paper, we proposed a new modified apriori ap…
▽ More
The traditional apriori algorithm can be used for clustering the web documents based on the association technique of data mining. But this algorithm has several limitations due to repeated database scans and its weak association rule analysis. In modern world of large databases, efficiency of traditional apriori algorithm would reduce manifolds. In this paper, we proposed a new modified apriori approach by cutting down the repeated database scans and improving association analysis of traditional apriori algorithm to cluster the web documents. Further we improve those clusters by applying Fuzzy C-Means (FCM), K-Means and Vector Space Model (VSM) techniques separately. For experimental purpose, we use Classic3 and Classic4 datasets of Cornell University having more than 10,000 documents and run both traditional apriori and our modified apriori approach on it. Experimental results show that our approach outperforms the traditional apriori algorithm in terms of database scan and improvement on association of analysis. We found out that FCM is better than K-Means and VSM in terms of F-measure of clusters of different sizes.
△ Less
Submitted 29 March, 2015;
originally announced March 2015.
-
Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey
Authors:
Ashu Sharma,
S. K. Sahay
Abstract:
Malwares are big threat to digital world and evolving with high complexity. It can penetrate networks, steal confidential information from computers, bring down servers and can cripple infrastructures etc. To combat the threat/attacks from the malwares, anti- malwares have been developed. The existing anti-malwares are mostly based on the assumption that the malware structure does not changes appr…
▽ More
Malwares are big threat to digital world and evolving with high complexity. It can penetrate networks, steal confidential information from computers, bring down servers and can cripple infrastructures etc. To combat the threat/attacks from the malwares, anti- malwares have been developed. The existing anti-malwares are mostly based on the assumption that the malware structure does not changes appreciably. But the recent advancement in second generation malwares can create variants and hence posed a challenge to anti-malwares developers. To combat the threat/attacks from the second generation malwares with low false alarm we present our survey on malwares and its detection techniques.
△ Less
Submitted 2 December, 2015; v1 submitted 27 June, 2014;
originally announced June 2014.
-
Web Document Clustering and Ranking using Tf-Idf based Apriori Approach
Authors:
R. K. Roul,
O. R. Devanand,
S. K. Sahay
Abstract:
The dynamic web has increased exponentially over the past few years with more than thousands of documents related to a subject available to the user now. Most of the web documents are unstructured and not in an organized manner and hence user facing more difficult to find relevant documents. A more useful and efficient mechanism is combining clustering with ranking, where clustering can group the…
▽ More
The dynamic web has increased exponentially over the past few years with more than thousands of documents related to a subject available to the user now. Most of the web documents are unstructured and not in an organized manner and hence user facing more difficult to find relevant documents. A more useful and efficient mechanism is combining clustering with ranking, where clustering can group the similar documents in one place and ranking can be applied to each cluster for viewing the top documents at the beginning.. Besides the particular clustering algorithm, the different term weighting functions applied to the selected features to represent web document is a main aspect in clustering task. Kee** this approach in mind, here we proposed a new mechanism called Tf-Idf based Apriori for clustering the web documents. We then rank the documents in each cluster using Tf-Idf and similarity factor of documents based on the user query. This approach will helps the user to get all his relevant documents in one place and can restrict his search to some top documents of his choice. For experimental purpose, we have taken the Classic3 and Classic4 datasets of Cornell University having more than 10,000 documents and use gensim toolkit to carry out our work. We have compared our approach with traditional apriori algorithm and found that our approach is giving better results for higher minimum support. Our ranking mechanism is also giving a good F-measure of 78%.
△ Less
Submitted 21 June, 2014;
originally announced June 2014.
-
An Effective Approach for Web Document Classification using the Concept of Association Analysis of Data Mining
Authors:
R. K. Roul,
S. K. Sahay
Abstract:
Exponential growth of the web increased the importance of web document classification and data mining. To get the exact information, in the form of knowing what classes a web document belongs to, is expensive. Automatic classification of web document is of great use to search engines which provides this information at a low cost. In this paper, we propose an approach for classifying the web docume…
▽ More
Exponential growth of the web increased the importance of web document classification and data mining. To get the exact information, in the form of knowing what classes a web document belongs to, is expensive. Automatic classification of web document is of great use to search engines which provides this information at a low cost. In this paper, we propose an approach for classifying the web document using the frequent item word sets generated by the Frequent Pattern (FP) Growth which is an association analysis technique of data mining. These set of associated words act as feature set. The final classification obtained after Naïve Bayes classifier used on the feature set. For the experimental work, we use Gensim package, as it is simple and robust. Results show that our approach can be effectively classifying the web document.
△ Less
Submitted 21 June, 2014;
originally announced June 2014.
-
An effective web document clustering for information retrieval
Authors:
R. K. Roul,
S. K. Sahay
Abstract:
The size of web has increased exponentially over the past few years with thousands of documents related to a subject available to the user. With this much amount of information available, it is not possible to take the full advantage of the World Wide Web without having a proper framework to search through the available data. This requisite organization can be done in many ways. In this paper we i…
▽ More
The size of web has increased exponentially over the past few years with thousands of documents related to a subject available to the user. With this much amount of information available, it is not possible to take the full advantage of the World Wide Web without having a proper framework to search through the available data. This requisite organization can be done in many ways. In this paper we introduce a combine approach to cluster the web pages which first finds the frequent sets and then clusters the documents. These frequent sets are generated by using Frequent Pattern growth technique. Then by applying Fuzzy C- Means algorithm on it, we found clusters having documents which are highly related and have similar features. We used Gensim package to implement our approach because of its simplicity and robust nature. We have compared our results with the combine approach of (Frequent Pattern growth, K-means) and (Frequent Pattern growth, Cosine_Similarity). Experimental results show that our approach is more efficient then the above two combine approach and can handles more efficiently the serious limitation of traditional Fuzzy C-Means algorithm, which is sensitiveto initial centroid and the number of clusters to be formed.
△ Less
Submitted 5 November, 2012;
originally announced November 2012.
-
An Effective Information Retrieval for Ambiguous Query
Authors:
R. K. Roul,
S. K. Sahay
Abstract:
Search engine returns thousands of web pages for a single user query, in which most of them are not relevant. In this context, effective information retrieval from the expanding web is a challenging task, in particular, if the query is ambiguous. The major question arises here is that how to get the relevant pages for an ambiguous query. We propose an approach for the effective result of an ambigu…
▽ More
Search engine returns thousands of web pages for a single user query, in which most of them are not relevant. In this context, effective information retrieval from the expanding web is a challenging task, in particular, if the query is ambiguous. The major question arises here is that how to get the relevant pages for an ambiguous query. We propose an approach for the effective result of an ambiguous query by forming community vector based on association concept of data minning using vector space model and the freedictionary. We develop clusters by computing the similarity between community vectors and document vectors formed from the extracted web pages by the search engine. We use Gensim package to implement the algorithm because of its simplicity and robust nature. Analysis shows that our approach is an effective way to form clusters for an ambiguous query.
△ Less
Submitted 6 April, 2012;
originally announced April 2012.
-
On the independent points in the sky for the search of periodic gravitational wave
Authors:
S. K. Sahay
Abstract:
We investigate the independent points in the sky require to search the periodic gravitational wave, assuming the noise power spectral density to be flat. We have made an analysis with different initial azimuth of the Earth for a week data set. The analysis shows significant difference in the independent points in the sky for the search. We numerically obtain an approximate relation to make trade…
▽ More
We investigate the independent points in the sky require to search the periodic gravitational wave, assuming the noise power spectral density to be flat. We have made an analysis with different initial azimuth of the Earth for a week data set. The analysis shows significant difference in the independent points in the sky for the search. We numerically obtain an approximate relation to make trade-off between computational cost and sensitivities. We also discuss the feasibility of the coherent search in small frequency band in reference to advanced LIGO.
△ Less
Submitted 5 March, 2008;
originally announced March 2008.
-
Earth azimuth effect in the bank of search templates for an all sky search of the continuous gravitational wave
Authors:
S. K. Sahay
Abstract:
We study the problem of all sky search in reference to continuous gravitational wave (CGW) whose wave-form are known in advance. We employ the concept of Fitting Factor and study the variation in the bank of search templates with different Earth azimuth at t=0. We found that the number of search templates varies significantly. Hence, accordingly, the computational demand for the search may be re…
▽ More
We study the problem of all sky search in reference to continuous gravitational wave (CGW) whose wave-form are known in advance. We employ the concept of Fitting Factor and study the variation in the bank of search templates with different Earth azimuth at t=0. We found that the number of search templates varies significantly. Hence, accordingly, the computational demand for the search may be reduced up to two orders by time shifting the data.
△ Less
Submitted 28 March, 2006;
originally announced March 2006.
-
Matching of the continuous gravitational wave in an all sky search
Authors:
S. K. Sahay
Abstract:
We investigate the matching of continuous gravitational wave (CGW) signals in an all sky search with reference to Earth based laser interferometric detectors. We consider the source location as the parameters of the signal manifold and templates corresponding to different source locations. It has been found that the matching of signals from locations in the sky that differ in their co-latitude a…
▽ More
We investigate the matching of continuous gravitational wave (CGW) signals in an all sky search with reference to Earth based laser interferometric detectors. We consider the source location as the parameters of the signal manifold and templates corresponding to different source locations. It has been found that the matching of signals from locations in the sky that differ in their co-latitude and longitude by $π$ radians decreases with source frequency. We have also made an analysis with the other parameters affecting the symmetries. We observe that it may not be relevant to take care of the symmetries in the sky locations for the search of CGW from the output of LIGO-I, GEO600 and TAMA detectors.
△ Less
Submitted 24 March, 2003; v1 submitted 31 December, 2002;
originally announced December 2002.
-
Studies in Gravitational Wave Data Analysis
Authors:
S. K. Sahay
Abstract:
This thesis is devoted to the investigations of gravitational wave (GW) data analysis from a continuous source e.g. a pulsar, a binary star system. The first Chapter is an introduction to gravitational wave and second Chapter is on the data analysis concept for the detection of GW. In third Chapter we developed the Fourier Transform (FT) of a continuous gravitational wave (CGW) for ground based…
▽ More
This thesis is devoted to the investigations of gravitational wave (GW) data analysis from a continuous source e.g. a pulsar, a binary star system. The first Chapter is an introduction to gravitational wave and second Chapter is on the data analysis concept for the detection of GW. In third Chapter we developed the Fourier Transform (FT) of a continuous gravitational wave (CGW) for ground based laser interferometric detectors for the data set of one day observation time incorporating the effects arising due to rotational as well as orbital motion of the earth. The transform is applicable for arbitrary location of detector and source. In Chapter four we have generalized the FT for the data set for (i) one year observation time and (ii) arbitrary observation time. As an application of the transform we considered spin down and N-component signal analysis. In fifth Chapter we have made an analysis of the number of templates required for matched filter analysis as applicable to these sources. We have employed the concept of {\it Fitting Factor (FF)}; treating the source location as the parameters of the signal manifold and have studied the matching of the signal with templates corresponding to different source locations. We have investigated the variation of {\it FF} with source location and have noticed a symmetry in template parameters, $θ_T$ and $φ_T$. It has been found that the two different template values in source location, each in $θ_T$ and $φ_T$, have same {\it FF}. We have also computed the number of templates required assuming the noise power spectral density $S_n(f)$ to be flat. It is observed that higher {\it FF} requires exponentially increasing large number of templates. Appendix contains the source codes developed for the computation.
△ Less
Submitted 6 September, 2002;
originally announced September 2002.
-
Data analysis of continuous gravitational wave: All sky search and study of templates
Authors:
D. C. Srivastava,
S. K. Sahay
Abstract:
We have studied the problem of all sky search in reference to continuous gravitational wave particularly for such sources whose wave-form are known in advance. We have made an analysis of the number of templates required for matched filter analysis as applicable to these sources. We have employed the concept of {\it fitting factor} {\it (FF)}; treating the source location as the parameters of th…
▽ More
We have studied the problem of all sky search in reference to continuous gravitational wave particularly for such sources whose wave-form are known in advance. We have made an analysis of the number of templates required for matched filter analysis as applicable to these sources. We have employed the concept of {\it fitting factor} {\it (FF)}; treating the source location as the parameters of the signal manifold and have studied the matching of the signal with templates corresponding to different source locations. We have investigated the variation of FF with source location and have noticed a symmetry in template parameters, $θ_T$ and $φ_T$. It has been found that the two different template values in source location, each in $θ_T$ and $φ_T$, have same {\it FF}. We have also computed the number of templates required assuming the noise power spectral density $S_n(f)$ to be flat. It is observed that higher {\it FF} requires exponentially increasing large number of templates.
△ Less
Submitted 3 September, 2002;
originally announced September 2002.
-
Data analysis of continuous gravitational wave: Fourier transform-II
Authors:
D. C. Srivastava,
S. K. Sahay
Abstract:
In this paper we obtain the Fourier Transform of a continuous gravitational wave. We have analysed the data set for (i) one year observation time and (ii) arbitrary observation time, for arbitrary location of detector and source taking into account the effects arising due to rotational as well as orbital motion of the earth. As an application of the transform we considered spin down and N-compon…
▽ More
In this paper we obtain the Fourier Transform of a continuous gravitational wave. We have analysed the data set for (i) one year observation time and (ii) arbitrary observation time, for arbitrary location of detector and source taking into account the effects arising due to rotational as well as orbital motion of the earth. As an application of the transform we considered spin down and N-component signal analysis.
△ Less
Submitted 30 July, 2002;
originally announced July 2002.
-
Data analysis of continuous gravitational wave: Fourier transform-I
Authors:
D. C. Srivastava,
S. K. Sahay
Abstract:
We present the Fourier Transform of a continuous gravitational wave. We have analysed the data set for one day observation time and our analysis is applicable for arbitrary location of detector and source. We have taken into account the effects arising due to rotational as well as orbital motions of the earth.
We present the Fourier Transform of a continuous gravitational wave. We have analysed the data set for one day observation time and our analysis is applicable for arbitrary location of detector and source. We have taken into account the effects arising due to rotational as well as orbital motions of the earth.
△ Less
Submitted 3 September, 2002; v1 submitted 16 November, 2001;
originally announced November 2001.
-
Data Analysis of Continuous Gravitational Wave Signal: Fourier Transform
Authors:
D. C. Srivastava,
S. K. Sahay
Abstract:
We present the Fourier Transform of continuous gravitational wave for arbitrary location of detector and source and for any duration of observation time in which both rotational motion of earth about its spin axis and orbital motion around sun has been taken into account. We also give the method to account the spin down of continuous gravitational wave.
We present the Fourier Transform of continuous gravitational wave for arbitrary location of detector and source and for any duration of observation time in which both rotational motion of earth about its spin axis and orbital motion around sun has been taken into account. We also give the method to account the spin down of continuous gravitational wave.
△ Less
Submitted 27 September, 2000;
originally announced September 2000.