Skip to main content

Showing 1–49 of 49 results for author: Sahay, S K

.
  1. arXiv:2312.17291  [pdf, other

    gr-qc astro-ph.HE hep-th

    Gravitational wave: generation and detection techniques

    Authors: Saibal Ray, R. Bhattacharya, Sanjay K. Sahay, Abdul Aziz, Amit Das

    Abstract: In this paper, we review the theoretical basis for generation of gravitational waves and the detection techniques used to detect a gravitational wave. To materialize this goal in a thorough way we first start with a mathematical background for general relativity from which a clue for gravitational wave was conceived by Einstein. Thereafter we give the classification scheme of gravitational waves s… ▽ More

    Submitted 28 December, 2023; originally announced December 2023.

    Comments: 23 pages, 9 figures, Accepted in International Journal of Modern Physics D (Special Issue)

  2. Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: The cybersecurity threat landscape has lately become overly complex. Threat actors leverage weaknesses in the network and endpoint security in a very coordinated manner to perpetuate sophisticated attacks that could bring down the entire network and many critical hosts in the network. Increasingly advanced deep and machine learning-based solutions have been used in threat detection and protection.… ▽ More

    Submitted 6 June, 2022; originally announced June 2022.

    Journal ref: International Conference On Secure Knowledge Management In Artificial Intelligence Era. Springer, Cham, 2021

  3. arXiv:2110.09654  [pdf, other

    cs.CR

    Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System

    Authors: Trupil Limbasiya, Sanjay K. Sahay, Bharath Sridharan

    Abstract: The usage of different technologies and smart devices helps people to get medical services remotely for multiple benefits. Thus, critical and sensitive data is exchanged between a user and a doctor. When health data is transmitted over a common channel, it becomes essential to preserve various privacy and security properties in the system. Further, the number of users for remote services is increa… ▽ More

    Submitted 13 October, 2021; originally announced October 2021.

    Comments: 22 Pages

    Journal ref: Information Systems Frontiers, Vol. 23, No. 4, p. 835, 2021

  4. ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: Advanced metamorphic malware and ransomware, by using obfuscation, could alter their internal structure with every attack. If such malware could intrude even into any of the IoT networks, then even if the original malware instance gets detected, by that time it can still infect the entire network. It is challenging to obtain training data for such evasive malware. Therefore, in this paper, we pres… ▽ More

    Submitted 23 September, 2021; originally announced September 2021.

    Journal ref: 2021 International Joint Conference on Neural Networks (IJCNN), 2021, pp. 1-9

  5. LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: Long-Short-Term-Memory (LSTM) networks have shown great promise in artificial intelligence (AI) based language modeling. Recently, LSTM networks have also become popular for designing AI-based Intrusion Detection Systems (IDS). However, its applicability in IDS is studied largely in the default settings as used in language models. Whereas security applications offer distinct conditions and hence w… ▽ More

    Submitted 23 September, 2021; originally announced September 2021.

    Journal ref: 2021 International Joint Conference on Neural Networks (IJCNN), 2021, pp. 1-9

  6. DRo: A data-scarce mechanism to revolutionize the performance of Deep Learning based Security Systems

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: Supervised Deep Learning requires plenty of labeled data to converge, and hence perform optimally for task-specific learning. Therefore, we propose a novel mechanism named DRo (for Deep Routing) for data-scarce domains like security. The DRo approach builds upon some of the recent developments in Deep-Clustering. In particular, it exploits the self-augmented training mechanism using synthetically… ▽ More

    Submitted 12 September, 2021; originally announced September 2021.

    Journal ref: 2021 IEEE 46th Conference on Local Computer Networks (LCN), 2021, pp. 581-588

  7. arXiv:2103.00643  [pdf, other

    cs.CR cs.LG

    Identification of Significant Permissions for Efficient Android Malware Detection

    Authors: Hemant Rathore, Sanjay K. Sahay, Ritvik Rajvanshi, Mohit Sewak

    Abstract: Since Google unveiled Android OS for smartphones, malware are thriving with 3Vs, i.e. volume, velocity, and variety. A recent report indicates that one out of every five business/industry mobile application leaks sensitive personal data. Traditional signature/heuristic-based malware detection systems are unable to cope up with current malware challenges and thus threaten the Android ecosystem. The… ▽ More

    Submitted 28 February, 2021; originally announced March 2021.

    Comments: BROADNETS, 2020

  8. arXiv:2103.00637  [pdf, other

    cs.CR cs.LG

    Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering

    Authors: Hemant Rathore, Sanjay K. Sahay, Shivin Thukral, Mohit Sewak

    Abstract: Today anti-malware community is facing challenges due to the ever-increasing sophistication and volume of malware attacks developed by adversaries. Traditional malware detection mechanisms are not able to cope-up with next-generation malware attacks. Therefore in this paper, we propose effective and efficient Android malware detection models based on machine learning and deep learning integrated w… ▽ More

    Submitted 28 February, 2021; originally announced March 2021.

    Comments: BROADNETS, 2020

  9. arXiv:2102.00898  [pdf, other

    cs.CR cs.AI cs.LG

    DRLDO: A novel DRL based De-ObfuscationSystem for Defense against Metamorphic Malware

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: In this paper, we propose a novel mechanism to normalize metamorphic and obfuscated malware down at the opcode level and hence create an advanced metamorphic malware de-obfuscation and defense system. We name this system DRLDO, for Deep Reinforcement Learning based De-Obfuscator. With the inclusion of the DRLDO as a sub-component, an existing Intrusion Detection System could be augmented with defe… ▽ More

    Submitted 1 February, 2021; originally announced February 2021.

    Journal ref: Defence Science Journal, 71(1), 55-65

  10. Robust Android Malware Detection System against Adversarial Attacks using Q-Learning

    Authors: Hemant Rathore, Sanjay K. Sahay, Piyush Nikam, Mohit Sewak

    Abstract: The current state-of-the-art Android malware detection systems are based on machine learning and deep learning models. Despite having superior performance, these models are susceptible to adversarial attacks. Therefore in this paper, we developed eight Android malware detection models based on machine learning and deep neural network and investigated their robustness against adversarial attacks. F… ▽ More

    Submitted 27 January, 2021; originally announced January 2021.

    Comments: Inf Syst Front (2020)

  11. Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: Recurrent deep learning language models like the LSTM are often used to provide advanced cyber-defense for high-value assets. The underlying assumption for using LSTM networks for malware-detection is that the op-code sequence of malware could be treated as a (spoken) language representation. There are differences between any spoken-language (sequence of words/sentences) and the machine-language (… ▽ More

    Submitted 26 December, 2020; originally announced December 2020.

    Journal ref: 2020 IEEE REGION 10 CONFERENCE (TENCON), Osaka, Japan, 2020, pp. 414-419

  12. arXiv:2010.08608  [pdf, other

    cs.CR cs.AI cs.LG

    DOOM: A Novel Adversarial-DRL-Based Op-Code Level Metamorphic Malware Obfuscator for the Enhancement of IDS

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: We designed and developed DOOM (Adversarial-DRL based Opcode level Obfuscator to generate Metamorphic malware), a novel system that uses adversarial deep reinforcement learning to obfuscate malware at the op-code level for the enhancement of IDS. The ultimate goal of DOOM is not to give a potent weapon in the hands of cyber-attackers, but to create defensive-mechanisms against advanced zero-day at… ▽ More

    Submitted 16 October, 2020; originally announced October 2020.

  13. DeepIntent: ImplicitIntent based Android IDS with E2E Deep Learning architecture

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: The Intent in Android plays an important role in inter-process and intra-process communications. The implicit Intent that an application could accept are declared in its manifest and are amongst the easiest feature to extract from an apk. Implicit Intents could even be extracted online and in real-time. So far neither the feasibility of develo** an Intrusion Detection System solely on implicit I… ▽ More

    Submitted 16 October, 2020; originally announced October 2020.

  14. arXiv:2008.02797  [pdf, other

    cs.CV eess.IV

    A Novel Spatial-Spectral Framework for the Classification of Hyperspectral Satellite Imagery

    Authors: Shriya TP Gupta, Sanjay K Sahay

    Abstract: Hyper-spectral satellite imagery is now widely being used for accurate disaster prediction and terrain feature classification. However, in such classification tasks, most of the present approaches use only the spectral information contained in the images. Therefore, in this paper, we present a novel framework that takes into account both the spectral and spatial information contained in the data f… ▽ More

    Submitted 22 July, 2020; originally announced August 2020.

    Comments: 13 Pages, 15 Figures, EANN-2020

    Journal ref: Springer, INNS, Vol. 2, pp 227-239, 2020

  15. arXiv:2004.10010  [pdf, other

    cs.CR

    Secure and Energy-Efficient Key-Agreement Protocol for Multi-Server Architecture

    Authors: Trupil Limbasiya, Sanjay K. Sahay

    Abstract: Authentication schemes are practised globally to verify the legitimacy of users and servers for the exchange of data in different facilities. Generally, the server verifies a user to provide resources for different purposes. But due to the large network system, the authentication process has become complex and therefore, time-to-time different authentication protocols have been proposed for the mu… ▽ More

    Submitted 19 April, 2020; originally announced April 2020.

    Comments: 17 Pages, SKM-2019

    Journal ref: Springer, CCIS, Vol. 1186, pp. 82-97, 2020

  16. arXiv:1912.12884  [pdf, other

    cs.CR

    Secure Communication Protocol for Smart Transportation Based on Vehicular Cloud

    Authors: Trupil Limbasiya, Debasis Das, Sanjay K. Sahay

    Abstract: The pioneering concept of connected vehicles has transformed the way of thinking for researchers and entrepreneurs by collecting relevant data from nearby objects. However, this data is useful for a specific vehicle only. Moreover, vehicles get a high amount of data (e.g., traffic, safety, and multimedia infotainment) on the road. Thus, vehicles expect adequate storage devices for this data, but i… ▽ More

    Submitted 4 January, 2020; v1 submitted 30 December, 2019; originally announced December 2019.

    Comments: 10 Pages, 1 figure, Conference

    Journal ref: ACM Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, pp. 372-376

  17. arXiv:1905.13747  [pdf, ps, other

    cs.CR

    A Survey on the Detection of Android Malicious Apps

    Authors: Sanjay K. Sahay, Ashu Sharma

    Abstract: Android-based smart devices are exponentially growing, and due to the ubiquity of the Internet, these devices are globally connected to the different devices/networks. Its popularity, attractive features, and mobility make malware creator to put a number of malicious apps in the market to disrupt and annoy the victims. Although to identify the malicious apps, time-to-time various techniques are pr… ▽ More

    Submitted 29 May, 2019; originally announced May 2019.

    Comments: Conference paper, 11 pages

    Journal ref: Springer, Advances in Computer Communication and Computational Sciences, pp 437-446, 2019

  18. arXiv:1905.13746  [pdf, other

    cs.CR cs.LG

    An Efficient Detection of Malware by Naive Bayes Classifier Using GPGPU

    Authors: Sanjay K. Sahay, Mayank Chaudhari

    Abstract: Due to continuous increase in the number of malware (according to AV-Test institute total ~8 x 10^8 malware are already known, and every day they register ~2.5 x 10^4 malware) and files in the computational devices, it is very important to design a system which not only effectively but can also efficiently detect the new or previously unseen malware to prevent/minimize the damages. Therefore, this… ▽ More

    Submitted 29 May, 2019; originally announced May 2019.

    Comments: Conference paper, 9 pages, 4 figures

    Journal ref: Springer, Advances in Computer Communication and Computational Sciences, Vol. 924, pp. 255-262, 2019

  19. arXiv:1904.10142  [pdf, other

    cs.CR cs.LG

    Android Malicious Application Classification Using Clustering

    Authors: Hemant Rathore, Sanjay K. Sahay, Palash Chaturvedi, Mohit Sewak

    Abstract: Android malware have been growing at an exponential pace and becomes a serious threat to mobile users. It appears that most of the anti-malware still relies on the signature-based detection system which is generally slow and often not able to detect advanced obfuscated malware. Hence time-to-time various authors have proposed different machine learning solutions to identify sophisticated malware.… ▽ More

    Submitted 21 April, 2019; originally announced April 2019.

    Comments: Springer, AISC, Volume 941, pp. 659-667, ISDA, 2018

  20. Malware Detection using Machine Learning and Deep Learning

    Authors: Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, Mohit Sewak

    Abstract: Research shows that over the last decade, malware has been growing exponentially, causing substantial financial losses to various organizations. Different anti-malware companies have been proposing solutions to defend attacks from these malware. The velocity, volume, and the complexity of malware are posing new challenges to the anti-malware community. Current state-of-the-art research shows that… ▽ More

    Submitted 4 April, 2019; originally announced April 2019.

    Comments: 11 Pages and 3 Figures

    Journal ref: Springer, LNCS, Vol. 11297, pp. 402-411, International Conference on Big Data Analytics, 2018

  21. arXiv:1904.02122  [pdf, other

    cs.CR cs.LG

    Group-wise classification approach to improve Android malicious apps detection accuracy

    Authors: Ashu Sharma, Sanjay K. Sahay

    Abstract: In the fast-growing smart devices, Android is the most popular OS, and due to its attractive features, mobility, ease of use, these devices hold sensitive information such as personal data, browsing history, shop** history, financial details, etc. Therefore, any security gap in these devices means that the information stored or accessing the smart devices are at high risk of being breached by th… ▽ More

    Submitted 3 April, 2019; originally announced April 2019.

    Comments: 9 pages, 20 Figures

    Journal ref: International Journal of Network Security, Vol. 21, No. 3, pp. 409-417, 2019

  22. arXiv:1903.02966  [pdf

    cs.CR cs.LG

    Detection of Advanced Malware by Machine Learning Techniques

    Authors: Sanjay Sharma, C. Rama Krishna, Sanjay K. Sahay

    Abstract: In today's digital world most of the anti-malware tools are signature based which is ineffective to detect advanced unknown malware viz. metamorphic malware. In this paper, we study the frequency of opcode occurrence to detect unknown malware by using machine learning technique. For the purpose, we have used kaggle Microsoft malware classification challenge dataset. The top 20 features obtained fr… ▽ More

    Submitted 7 March, 2019; originally announced March 2019.

    Comments: Conference Paper, 7 Pages

    Journal ref: Springer, Advances in Intelligent Systems and Computing, Vol. 742, pp. 332-342, 2018

  23. Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: Recently, Deep Learning has been showing promising results in various Artificial Intelligence applications like image recognition, natural language processing, language modeling, neural machine translation, etc. Although, in general, it is computationally more expensive as compared to classical machine learning techniques, their results are found to be more effective in some cases. Therefore, in t… ▽ More

    Submitted 16 September, 2018; originally announced September 2018.

    Comments: 11 Pages, 1 figure

    Journal ref: IEEE, pp. 293-296, 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2018

  24. arXiv:1809.05888  [pdf, other

    cs.CR cs.AI cs.LG

    An investigation of a deep learning based malware detection system

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: We investigate a Deep Learning based system for malware detection. In the investigation, we experiment with different combination of Deep Learning architectures including Auto-Encoders, and Deep Neural Networks with varying layers over Malicia malware dataset on which earlier studies have obtained an accuracy of (98%) with an acceptable False Positive Rates (1.07%). But these results were done usi… ▽ More

    Submitted 16 September, 2018; originally announced September 2018.

    Comments: 13 Pages, 4 figures

    Journal ref: ACM, pp. 26, Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES), 27-30 Aug., 2018, University of Hamburg, Germany

  25. arXiv:1802.08611  [pdf, other

    cs.CR cs.AI

    An investigation of the classifiers to detect android malicious apps

    Authors: Ashu Sharma, Sanjay K. Sahay

    Abstract: Android devices are growing exponentially and are connected through the internet accessing billion of online websites. The popularity of these devices encourages malware developer to penetrate the market with malicious apps to annoy and disrupt the victim. Although, for the detection of malicious apps different approaches are discussed. However, proposed approaches are not suffice to detect the ad… ▽ More

    Submitted 23 February, 2018; originally announced February 2018.

    Comments: 8 Pages, 8 Figures

    Journal ref: Springer, Information and Communication Technology, 625, p. 207 - 217, 2017

  26. A Communication Efficient and Scalable Distributed Data Mining for the Astronomical Data

    Authors: Aruna Govada, Sanjay K. Sahay

    Abstract: In 2020, ~60PB of archived data will be accessible to the astronomers. But to analyze such a paramount data will be a challenging task. This is basically due to the computational model used to download the data from complex geographically distributed archives to a central site and then analyzing it in the local systems. Because the data has to be downloaded to the central site, the network BW limi… ▽ More

    Submitted 23 June, 2016; originally announced June 2016.

    Comments: Accepted in Astronomy and Computing, 2016, 20 Pages, 19 Figures

    Journal ref: Elsevier, Astronomy and Computing, Vol. 16, pp. 166 - 174, 2016

  27. arXiv:1606.07336  [pdf, other

    cs.DC

    Covariance estimation for vertically partitioned data in a distributed environment

    Authors: Aruna Govada, Sanjay K. Sahay

    Abstract: The major sources of abundant data are constantly expanding with the available data collection methodologies in various applications - medical, insurance, scientific, bio-informatics and business. These data sets may be distributed geographically, rich in size and as well as dimensions also. To analyze these data sets to find out the hidden patterns, it is required to down- load the data to a cent… ▽ More

    Submitted 23 June, 2016; originally announced June 2016.

    Comments: Proceedings, 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2016

    Journal ref: Springer, Studies in Computational Intelligence, Vol. 653, pp 151-164, 2016

  28. arXiv:1606.06909  [pdf

    cs.CR

    Improving the detection accuracy of unknown malware by partitioning the executables in groups

    Authors: Ashu Sharma, Sanjay K. Sahay, Abhishek Kumar

    Abstract: Detection of unknown malware with high accuracy is always a challenging task. Therefore, in this paper, we study the classification of unknown malware by two methods. In the first/regular method, similar to other authors [17][16][20] approaches we select the features by taking all dataset in one group and in the second method, we select the features by partitioning the dataset in the range of file… ▽ More

    Submitted 22 June, 2016; originally announced June 2016.

    Comments: Proceedings 9th ICACCT, 2015, 8 Pages, 7 Figures

    Journal ref: Springer, Advances in Intelligent System and Computing, Vol. 452, pp. 421 - 431, 2016

  29. arXiv:1606.06908  [pdf

    cs.CR cs.AI

    Grou** the executables to detect malware with high accuracy

    Authors: Sanjay K. Sahay, Ashu Sharma

    Abstract: The metamorphic malware variants with the same malicious behavior (family), can obfuscate themselves to look different from each other. This variation in structure leads to a huge signature database for traditional signature matching techniques to detect them. In order to effective and efficient detection of malware in large amounts of executables, we need to partition these files into groups whic… ▽ More

    Submitted 22 June, 2016; originally announced June 2016.

    Comments: 8 Pages, 13 Figures. arXiv admin note: text overlap with arXiv:1606.06897

    Journal ref: Elsevier, Procedia Computer Science, Vol. 78, pp. 667 - 674, 2016

  30. arXiv:1606.06897  [pdf

    cs.CR cs.AI

    An effective approach for classification of advanced malware with high accuracy

    Authors: Ashu Sharma, Sanjay K. Sahay

    Abstract: Combating malware is very important for software/systems security, but to prevent the software/systems from the advanced malware, viz. metamorphic malware is a challenging task, as it changes the structure/code after each infection. Therefore in this paper, we present a novel approach to detect the advanced malware with high accuracy by analyzing the occurrence of opcodes (features) by grou** th… ▽ More

    Submitted 22 June, 2016; originally announced June 2016.

    Comments: 15 Pages, 14 figures

    Journal ref: International Journal of Security and Its Applications, Vol. 10, No. 4, pp.249-266, 2016

  31. A Novel Approach to Distributed Multi-Class SVM

    Authors: Aruna Govada, Shree Ranjani, Aditi Viswanathan, S. K. Sahay

    Abstract: With data sizes constantly expanding, and with classical machine learning algorithms that analyze such data requiring larger and larger amounts of computation time and storage space, the need to distribute computation and memory requirements among several computers has become apparent. Although substantial work has been done in develo** distributed binary SVM algorithms and multi-class SVM algor… ▽ More

    Submitted 7 December, 2015; originally announced December 2015.

    Comments: 8 Pages

    Journal ref: Transactions on Machine Learning and Artificial Intelligence, Vol. 2, No. 5, p. 72, 2014

  32. Hybrid Approach for Inductive Semi Supervised Learning using Label Propagation and Support Vector Machine

    Authors: Aruna Govada, Pravin Joshi, Sahil Mittal, Sanjay K Sahay

    Abstract: Semi supervised learning methods have gained importance in today's world because of large expenses and time involved in labeling the unlabeled data by human experts. The proposed hybrid approach uses SVM and Label Propagation to label the unlabeled data. In the process, at each step SVM is trained to minimize the error and thus improve the prediction quality. Experiments are conducted by using SVM… ▽ More

    Submitted 2 December, 2015; originally announced December 2015.

    Comments: Presented in the 11th International Conference, MLDM, Germany, July 20 - 21, 2015. Springer, Machine Learning and Data Mining in Pattern Recognition, LNAI Vol. 9166, p. 199-213, 2015

  33. Distributed Multi Class SVM for Large Data Sets

    Authors: Aruna Govada, Bhavul Gauri, S. K. Sahay

    Abstract: Data mining algorithms are originally designed by assuming the data is available at one centralized site.These algorithms also assume that the whole data is fit into main memory while running the algorithm. But in today's scenario the data has to be handled is distributed even geographically. Bringing the data into a centralized site is a bottleneck in terms of the bandwidth when compared with the… ▽ More

    Submitted 2 December, 2015; originally announced December 2015.

    Comments: Presente in the WCI, Kochi, India, 2015

    Journal ref: ACM Digital Library, Proceeding WCI '15 Proceedings of the Third International Symposium on Women in Computing and Informatics, PP. 54-58, 2015

  34. Centroid Based Binary Tree Structured SVM for Multi Classification

    Authors: Aruna Govada, Bhavul Gauri, S. K. Sahay

    Abstract: Support Vector Machines (SVMs) were primarily designed for 2-class classification. But they have been extended for N-class classification also based on the requirement of multiclasses in the practical applications. Although N-class classification using SVM has considerable research attention, getting minimum number of classifiers at the time of training and testing is still a continuing research.… ▽ More

    Submitted 2 December, 2015; originally announced December 2015.

    Comments: Presented in ICACCI, Kochi, India, 2015

    Journal ref: IEEE Xplore, Advances in Computing, Communications and Informatics (ICACCI), p.258 - 262, 2015

  35. Automated Document Indexing via Intelligent Hierarchical Clustering: A Novel Approach

    Authors: Rajendra Kumar Roul, Shubham Rohan Asthana, Sanjay Kumar Sahay

    Abstract: With the rising quantity of textual data available in electronic format, the need to organize it become a highly challenging task. In the present paper, we explore a document organization framework that exploits an intelligent hierarchical clustering algorithm to generate an index over a set of documents. The framework has been designed to be scalable and accurate even with large corpora. The adva… ▽ More

    Submitted 1 April, 2015; originally announced April 2015.

    Comments: 6 Pages, 3 Figures. IEEE Xplore, ICHPCA-2014

  36. arXiv:1503.08463  [pdf

    cs.IR

    A Novel Modified Apriori Approach for Web Document Clustering

    Authors: Rajendra Kumar Roul, Saransh Varshneya, Ashu Kalra, Sanjay Kumar Sahay

    Abstract: The traditional apriori algorithm can be used for clustering the web documents based on the association technique of data mining. But this algorithm has several limitations due to repeated database scans and its weak association rule analysis. In modern world of large databases, efficiency of traditional apriori algorithm would reduce manifolds. In this paper, we proposed a new modified apriori ap… ▽ More

    Submitted 29 March, 2015; originally announced March 2015.

    Comments: 11 Pages, 5 Figures

    Journal ref: Springer, Smart Innovation Systems and Technologies, Vol. 33, 2015, p. 159-171; Proceedings of the ICCIDM, Dec. 2014

  37. Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey

    Authors: Ashu Sharma, S. K. Sahay

    Abstract: Malwares are big threat to digital world and evolving with high complexity. It can penetrate networks, steal confidential information from computers, bring down servers and can cripple infrastructures etc. To combat the threat/attacks from the malwares, anti- malwares have been developed. The existing anti-malwares are mostly based on the assumption that the malware structure does not changes appr… ▽ More

    Submitted 2 December, 2015; v1 submitted 27 June, 2014; originally announced June 2014.

    Comments: 5 Pages

    Journal ref: International Journal of Computer Applications, 2014, Vol. 90, No. 2, p. 7

  38. arXiv:1406.5617  [pdf

    cs.IR

    Web Document Clustering and Ranking using Tf-Idf based Apriori Approach

    Authors: R. K. Roul, O. R. Devanand, S. K. Sahay

    Abstract: The dynamic web has increased exponentially over the past few years with more than thousands of documents related to a subject available to the user now. Most of the web documents are unstructured and not in an organized manner and hence user facing more difficult to find relevant documents. A more useful and efficient mechanism is combining clustering with ranking, where clustering can group the… ▽ More

    Submitted 21 June, 2014; originally announced June 2014.

    Comments: 5 Pages

    Journal ref: IJCA Proceedings on ICACEA, No. 2, p. 34 (2014)

  39. arXiv:1406.5616  [pdf

    cs.IR

    An Effective Approach for Web Document Classification using the Concept of Association Analysis of Data Mining

    Authors: R. K. Roul, S. K. Sahay

    Abstract: Exponential growth of the web increased the importance of web document classification and data mining. To get the exact information, in the form of knowing what classes a web document belongs to, is expensive. Automatic classification of web document is of great use to search engines which provides this information at a low cost. In this paper, we propose an approach for classifying the web docume… ▽ More

    Submitted 21 June, 2014; originally announced June 2014.

    Comments: 9 Pages

    Journal ref: IJCSET, 2012, Vol. 3, No. 10, p. 483

  40. arXiv:1211.1107  [pdf

    cs.IR

    An effective web document clustering for information retrieval

    Authors: R. K. Roul, S. K. Sahay

    Abstract: The size of web has increased exponentially over the past few years with thousands of documents related to a subject available to the user. With this much amount of information available, it is not possible to take the full advantage of the World Wide Web without having a proper framework to search through the available data. This requisite organization can be done in many ways. In this paper we i… ▽ More

    Submitted 5 November, 2012; originally announced November 2012.

    Comments: 11 Pages, 2 figures

    Report number: IJCSMR, 2012, Vol. 1, No. 3, p. 481

  41. arXiv:1204.1406  [pdf, other

    cs.IR

    An Effective Information Retrieval for Ambiguous Query

    Authors: R. K. Roul, S. K. Sahay

    Abstract: Search engine returns thousands of web pages for a single user query, in which most of them are not relevant. In this context, effective information retrieval from the expanding web is a challenging task, in particular, if the query is ambiguous. The major question arises here is that how to get the relevant pages for an ambiguous query. We propose an approach for the effective result of an ambigu… ▽ More

    Submitted 6 April, 2012; originally announced April 2012.

    Comments: 11 Pages, 1 figure

    Journal ref: AJCSIT, Vol. 2, No. 3, P. 26-30, 2012

  42. arXiv:0803.0786  [pdf, ps, other

    gr-qc astro-ph

    On the independent points in the sky for the search of periodic gravitational wave

    Authors: S. K. Sahay

    Abstract: We investigate the independent points in the sky require to search the periodic gravitational wave, assuming the noise power spectral density to be flat. We have made an analysis with different initial azimuth of the Earth for a week data set. The analysis shows significant difference in the independent points in the sky for the search. We numerically obtain an approximate relation to make trade… ▽ More

    Submitted 5 March, 2008; originally announced March 2008.

    Comments: 10 Pages, 2 figures

    Journal ref: Rom.Rep.Phys.61:191-201,2009

  43. Earth azimuth effect in the bank of search templates for an all sky search of the continuous gravitational wave

    Authors: S. K. Sahay

    Abstract: We study the problem of all sky search in reference to continuous gravitational wave (CGW) whose wave-form are known in advance. We employ the concept of Fitting Factor and study the variation in the bank of search templates with different Earth azimuth at t=0. We found that the number of search templates varies significantly. Hence, accordingly, the computational demand for the search may be re… ▽ More

    Submitted 28 March, 2006; originally announced March 2006.

    Comments: 12 Pages, 3 figures

    Journal ref: Int.J.Mod.Phys. D15 (2006) 225-234

  44. Matching of the continuous gravitational wave in an all sky search

    Authors: S. K. Sahay

    Abstract: We investigate the matching of continuous gravitational wave (CGW) signals in an all sky search with reference to Earth based laser interferometric detectors. We consider the source location as the parameters of the signal manifold and templates corresponding to different source locations. It has been found that the matching of signals from locations in the sky that differ in their co-latitude a… ▽ More

    Submitted 24 March, 2003; v1 submitted 31 December, 2002; originally announced December 2002.

    Comments: 16 pages, 7 figures, 3 Tables, To appear in Int. J. Mod. Phys. D

    Journal ref: Int.J.Mod.Phys.D12:1227-1240,2003

  45. arXiv:gr-qc/0209019  [pdf, ps, other

    gr-qc astro-ph

    Studies in Gravitational Wave Data Analysis

    Authors: S. K. Sahay

    Abstract: This thesis is devoted to the investigations of gravitational wave (GW) data analysis from a continuous source e.g. a pulsar, a binary star system. The first Chapter is an introduction to gravitational wave and second Chapter is on the data analysis concept for the detection of GW. In third Chapter we developed the Fourier Transform (FT) of a continuous gravitational wave (CGW) for ground based… ▽ More

    Submitted 6 September, 2002; originally announced September 2002.

    Comments: Ph.D Thesis, based on gr-qc/0111050, 0207119 and 0209009 (All three papers to be apppear in MNRAS), 179 Pages and 39 figures

  46. Data analysis of continuous gravitational wave: All sky search and study of templates

    Authors: D. C. Srivastava, S. K. Sahay

    Abstract: We have studied the problem of all sky search in reference to continuous gravitational wave particularly for such sources whose wave-form are known in advance. We have made an analysis of the number of templates required for matched filter analysis as applicable to these sources. We have employed the concept of {\it fitting factor} {\it (FF)}; treating the source location as the parameters of th… ▽ More

    Submitted 3 September, 2002; originally announced September 2002.

    Comments: Accepted in MNRAS, 14 pages, 5 figures

    Journal ref: Mon.Not.Roy.Astron.Soc. 337 (2002) 322-326

  47. Data analysis of continuous gravitational wave: Fourier transform-II

    Authors: D. C. Srivastava, S. K. Sahay

    Abstract: In this paper we obtain the Fourier Transform of a continuous gravitational wave. We have analysed the data set for (i) one year observation time and (ii) arbitrary observation time, for arbitrary location of detector and source taking into account the effects arising due to rotational as well as orbital motion of the earth. As an application of the transform we considered spin down and N-compon… ▽ More

    Submitted 30 July, 2002; originally announced July 2002.

    Comments: Accepted in MNRAS, 14 pages, 4 figures

    Journal ref: Mon.Not.Roy.Astron.Soc. 337 (2002) 315-321

  48. Data analysis of continuous gravitational wave: Fourier transform-I

    Authors: D. C. Srivastava, S. K. Sahay

    Abstract: We present the Fourier Transform of a continuous gravitational wave. We have analysed the data set for one day observation time and our analysis is applicable for arbitrary location of detector and source. We have taken into account the effects arising due to rotational as well as orbital motions of the earth.

    Submitted 3 September, 2002; v1 submitted 16 November, 2001; originally announced November 2001.

    Comments: Accepted in MNRAS, 22 pages, 9 figures

    Journal ref: Mon.Not.Roy.Astron.Soc.337:305-314,2002

  49. Data Analysis of Continuous Gravitational Wave Signal: Fourier Transform

    Authors: D. C. Srivastava, S. K. Sahay

    Abstract: We present the Fourier Transform of continuous gravitational wave for arbitrary location of detector and source and for any duration of observation time in which both rotational motion of earth about its spin axis and orbital motion around sun has been taken into account. We also give the method to account the spin down of continuous gravitational wave.

    Submitted 27 September, 2000; originally announced September 2000.

    Comments: 3 pages