-
Bipartite powers of some classes of bipartite graphs
Authors:
Indrajit Paul,
Ashok Kumar Das
Abstract:
Graph powers are a well-studied concept in graph theory. Analogous to graph powers, Chandran et al.[3] introduced the concept of bipartite powers for bipartite graphs. In this paper, we will demonstrate that some well-known classes of bipartite graphs, namely the interval bigraphs, proper interval bigraphs, and bigraphs of Ferrers dimension 2, are closed under the operation of taking bipartite pow…
▽ More
Graph powers are a well-studied concept in graph theory. Analogous to graph powers, Chandran et al.[3] introduced the concept of bipartite powers for bipartite graphs. In this paper, we will demonstrate that some well-known classes of bipartite graphs, namely the interval bigraphs, proper interval bigraphs, and bigraphs of Ferrers dimension 2, are closed under the operation of taking bipartite powers. Finally, we define strongly closed property for bipartite graphs under powers and have shown that the class of chordal bipartite graphs is strongly closed under powers.
△ Less
Submitted 26 April, 2024;
originally announced April 2024.
-
Link Prediction for Social Networks using Representation Learning and Heuristic-based Features
Authors:
Samarth Khanna,
Sree Bhattacharyya,
Sudipto Ghosh,
Kushagra Agarwal,
Asit Kumar Das
Abstract:
The exponential growth in scale and relevance of social networks enable them to provide expansive insights. Predicting missing links in social networks efficiently can help in various modern-day business applications ranging from generating recommendations to influence analysis. Several categories of solutions exist for the same. Here, we explore various feature extraction techniques to generate r…
▽ More
The exponential growth in scale and relevance of social networks enable them to provide expansive insights. Predicting missing links in social networks efficiently can help in various modern-day business applications ranging from generating recommendations to influence analysis. Several categories of solutions exist for the same. Here, we explore various feature extraction techniques to generate representations of nodes and edges in a social network that allow us to predict missing links. We compare the results of using ten feature extraction techniques categorized across Structural embeddings, Neighborhood-based embeddings, Graph Neural Networks, and Graph Heuristics, followed by modeling with ensemble classifiers and custom Neural Networks. Further, we propose combining heuristic-based features and learned representations that demonstrate improved performance for the link prediction task on social network datasets. Using this method to generate accurate recommendations for many applications is a matter of further study that appears very promising. The code for all the experiments has been made public.
△ Less
Submitted 13 March, 2024;
originally announced March 2024.
-
Fraud Analytics Using Machine-learning & Engineering on Big Data (FAME) for Telecom
Authors:
Sudarson Roy Pratihar,
Subhadip Paul,
Pranab Kumar Dash,
Amartya Kumar Das
Abstract:
Telecom industries lose globally 46.3 Billion USD due to fraud. Data mining and machine learning techniques (apart from rules oriented approach) have been used in past, but efficiency has been low as fraud pattern changes very rapidly. This paper presents an industrialized solution approach with self adaptive data mining technique and application of big data technologies to detect fraud and discov…
▽ More
Telecom industries lose globally 46.3 Billion USD due to fraud. Data mining and machine learning techniques (apart from rules oriented approach) have been used in past, but efficiency has been low as fraud pattern changes very rapidly. This paper presents an industrialized solution approach with self adaptive data mining technique and application of big data technologies to detect fraud and discover novel fraud patterns in accurate, efficient and cost effective manner. Solution has been successfully demonstrated to detect International Revenue Share Fraud with <5% false positive. More than 1 Terra Bytes of Call Detail Record from a reputed wholesale carrier and overseas telecom transit carrier has been used to conduct this study.
△ Less
Submitted 31 October, 2023;
originally announced November 2023.
-
Obstruction characterization of co-TT graphs
Authors:
Ashok Kumar Das,
Indrajit Paul
Abstract:
Threshold tolerance graphs and their complement graphs ( known as co-TT graphs) were introduced by Monma, Reed and Trotter[24]. Introducing the concept of negative interval Hell et al.[19] defined signed-interval bigraphs/digraphs and have shown that they are equivalent to several seemingly different classes of bigraphs/digraphs. They have also shown that co-TT graphs are equivalent to symmetric s…
▽ More
Threshold tolerance graphs and their complement graphs ( known as co-TT graphs) were introduced by Monma, Reed and Trotter[24]. Introducing the concept of negative interval Hell et al.[19] defined signed-interval bigraphs/digraphs and have shown that they are equivalent to several seemingly different classes of bigraphs/digraphs. They have also shown that co-TT graphs are equivalent to symmetric signed-interval digraphs. In this paper we characterize signed-interval bigraphs and signed-interval graphs respectively in terms of their biadjacency matrices and adjacency matrices. Finally, based on the geometric representation of signed-interval graphs we have setteled the open problem of forbidden induced subgraph characterization of co-TT graphs posed by Monma, Reed and Trotter in the same paper.
△ Less
Submitted 24 August, 2023;
originally announced August 2023.
-
IIDS: Design of Intelligent Intrusion Detection System for Internet-of-Things Applications
Authors:
KG Raghavendra Narayan,
Srijanee Mookherji,
Vanga Odelu,
Rajendra Prasath,
Anish Chand Turlapaty,
Ashok Kumar Das
Abstract:
With rapid technological growth, security attacks are drastically increasing. In many crucial Internet-of-Things (IoT) applications such as healthcare and defense, the early detection of security attacks plays a significant role in protecting huge resources. An intrusion detection system is used to address this problem. The signature-based approaches fail to detect zero-day attacks. So anomaly-bas…
▽ More
With rapid technological growth, security attacks are drastically increasing. In many crucial Internet-of-Things (IoT) applications such as healthcare and defense, the early detection of security attacks plays a significant role in protecting huge resources. An intrusion detection system is used to address this problem. The signature-based approaches fail to detect zero-day attacks. So anomaly-based detection particularly AI tools, are becoming popular. In addition, the imbalanced dataset leads to biased results. In Machine Learning (ML) models, F1 score is an important metric to measure the accuracy of class-level correct predictions. The model may fail to detect the target samples if the F1 is considerably low. It will lead to unrecoverable consequences in sensitive applications such as healthcare and defense. So, any improvement in the F1 score has significant impact on the resource protection. In this paper, we present a framework for ML-based intrusion detection system for an imbalanced dataset. In this study, the most recent dataset, namely CICIoT2023 is considered. The random forest (RF) algorithm is used in the proposed framework. The proposed approach improves 3.72%, 3.75% and 4.69% in precision, recall and F1 score, respectively, with the existing method. Additionally, for unsaturated classes (i.e., classes with F1 score < 0.99), F1 score improved significantly by 7.9%. As a result, the proposed approach is more suitable for IoT security applications for efficient detection of intrusion and is useful in further studies.
△ Less
Submitted 2 August, 2023;
originally announced August 2023.
-
Performance Analysis of DNA Crossbar Arrays for High-Density Memory Storage Applications
Authors:
Arpan De,
Hashem Mohammad,
Yiren Wang,
Rajkumar Kubendran,
Arindam K. Das,
M. P. Anantram
Abstract:
Deoxyribonucleic acid (DNA) has emerged as a promising building block for next-generation ultra-high density storage devices. Although DNA has high durability and extremely high density in nature, its potential as the basis of storage devices is currently hindered by limitations such as expensive and complex fabrication processes and time-consuming read-write operations. In this article, we propos…
▽ More
Deoxyribonucleic acid (DNA) has emerged as a promising building block for next-generation ultra-high density storage devices. Although DNA has high durability and extremely high density in nature, its potential as the basis of storage devices is currently hindered by limitations such as expensive and complex fabrication processes and time-consuming read-write operations. In this article, we propose the use of a DNA crossbar array architecture for an electrically readable Read-Only Memory (DNA-ROM). While information can be written error-free to a DNA-ROM array using appropriate sequence encoding, its read accuracy can be affected by several factors such as array size, interconnect resistance, and Fermi energy deviations from HOMO levels of DNA strands employed in the crossbar. We study the impact of array size and interconnect resistance on the bit error rate of a DNA-ROM array through extensive Monte Carlo simulations. We have also analyzed the performance of our proposed DNA crossbar array for an image storage application, as a function of array size and interconnect resistance. While we expect that future advances in bioengineering and materials science will address some of the fabrication challenges associated with DNA crossbar arrays, we believe that the comprehensive body of results we present in this paper establishes the technical viability of DNA crossbar arrays as low-power, high-density storage devices. Finally, our analysis of array performance vis-a-vis interconnect resistance should provide valuable insights into aspects of the fabrication process such as the proper choice of interconnects necessary for ensuring high read accuracies.
△ Less
Submitted 6 April, 2023;
originally announced April 2023.
-
On powers of circular arc graphs
Authors:
Ashok Kumar Das,
Indrajit Paul
Abstract:
A class of graphs $\mathcal{C}$ is closed under powers if for every graph $G\in\mathcal{C}$ and every $k\in\mathbb{N}$, $G^k\in\mathcal{C}$. Also $\mathcal{C}$ is strongly closed under powers if for every $k\in\mathbb{N}$, if $G^k\in\mathcal{C}$, then $G^{k+1}\in\mathcal{C}$. It is known that circular arc graphs and proper circular arc graphs are closed under powers. But it is open whether these c…
▽ More
A class of graphs $\mathcal{C}$ is closed under powers if for every graph $G\in\mathcal{C}$ and every $k\in\mathbb{N}$, $G^k\in\mathcal{C}$. Also $\mathcal{C}$ is strongly closed under powers if for every $k\in\mathbb{N}$, if $G^k\in\mathcal{C}$, then $G^{k+1}\in\mathcal{C}$. It is known that circular arc graphs and proper circular arc graphs are closed under powers. But it is open whether these classes of graphs are also strongly closed under powers. In this paper we have settled these problems.
△ Less
Submitted 8 June, 2023; v1 submitted 17 October, 2022;
originally announced October 2022.
-
A machine learning approach to predict the structural and magnetic properties of Heusler alloy families
Authors:
Srimanta Mitra,
Aquil Ahmad,
Sajib Biswas,
Amal Kumar Das
Abstract:
Random forest (RF) regression model is used to predict the lattice constant, magnetic moment and formation energies of full Heusler alloys, half Heusler alloys, inverse Heusler alloys and quaternary Heusler alloys based on existing as well as indigenously prepared databases. Prior analysis was carried out to check the distribution of the data points of the response variables and found that in most…
▽ More
Random forest (RF) regression model is used to predict the lattice constant, magnetic moment and formation energies of full Heusler alloys, half Heusler alloys, inverse Heusler alloys and quaternary Heusler alloys based on existing as well as indigenously prepared databases. Prior analysis was carried out to check the distribution of the data points of the response variables and found that in most of the cases, the data is not normally distributed. The outcome of the RF model performance is sufficiently accurate to predict the response variables on the test data and also shows its robustness against overfitting, outliers, multicollinearity and distribution of data points. The parity plots between the machine learning predicted values against the computed values using density functional theory (DFT) shows linear behavior with adjusted R2 values lying in the range of 0.80 to 0.94 for all the predicted properties for different types of Heusler alloys. Feature importance analysis shows that the valence electron numbers plays an important feature role in the prediction for most of the predicted outcomes. Case studies with one full Heusler alloy and one quaternary Heusler alloy were also mentioned comparing the machine learning predicted results with our earlier theoretical calculated values and experimentally measured results, suggesting high accuracy of the model predicted results.
△ Less
Submitted 7 August, 2022;
originally announced August 2022.
-
Signed interval graphs and bigraphs: A generalization of interval graphs and bigraphs
Authors:
Ashok Kumar Das,
Indrajit Paul
Abstract:
In this paper, we define and characterize signed interval graphs and bigraphs introducing the concept of negative interval. Also we have shown that these classes of graphs are respectively a generalization of well known classes of interval graphs and interval bigraphs. In this context we have observed that signed interval graphs coincide with the complement of Threshold tolerance graphs(co-TT grap…
▽ More
In this paper, we define and characterize signed interval graphs and bigraphs introducing the concept of negative interval. Also we have shown that these classes of graphs are respectively a generalization of well known classes of interval graphs and interval bigraphs. In this context we have observed that signed interval graphs coincide with the complement of Threshold tolerance graphs(co-TT graphs) introduced by Monma, Reed and Trotter \cite{22}. Finally, we have solved the open problem of forbidden induced subgraph characterization of co-TT graphs posed by them in the same paper.
△ Less
Submitted 13 June, 2022;
originally announced June 2022.
-
On Hamiltonian-Connected and Mycielski graphs
Authors:
Ashok Kumar Das,
Indrajit Paul
Abstract:
A graph $G$ is Hamiltonian-connected if there exists a Hamiltonian path between any two vertices of $G$. It is known that if $G$ is 2-connected then the graph $G^2$ is Hamiltonian-connected. In this paper we prove that the square of every self-complementary graph of order grater than 4 is Hamiltonian-connected. If $G$ is a $k$-critical graph, then we prove that the Mycielski graph $μ(G)$ is…
▽ More
A graph $G$ is Hamiltonian-connected if there exists a Hamiltonian path between any two vertices of $G$. It is known that if $G$ is 2-connected then the graph $G^2$ is Hamiltonian-connected. In this paper we prove that the square of every self-complementary graph of order grater than 4 is Hamiltonian-connected. If $G$ is a $k$-critical graph, then we prove that the Mycielski graph $μ(G)$ is $(k+1)$-critical graph. Jarnicki et al.[7] proved that for every Hamiltonian graph of odd order, the Mycielski graph $μ(G)$ of $G$ is Hamiltonian-connected. They also pose a conjecture that if $G$ is Hamiltonian-connected and not $K_2$ then $μ(G)$ is Hamiltonian-connected. In this paper we also prove this conjecture.
△ Less
Submitted 6 February, 2023; v1 submitted 6 June, 2022;
originally announced June 2022.
-
Bangla hate speech detection on social media using attention-based recurrent neural network
Authors:
Amit Kumar Das,
Abdullah Al Asif,
Anik Paul,
Md. Nur Hossain
Abstract:
Hate speech has spread more rapidly through the daily use of technology and, most notably, by sharing your opinions or feelings on social media in a negative aspect. Although numerous works have been carried out in detecting hate speeches in English, German, and other languages, very few works have been carried out in the context of the Bengali language. In contrast, millions of people communicate…
▽ More
Hate speech has spread more rapidly through the daily use of technology and, most notably, by sharing your opinions or feelings on social media in a negative aspect. Although numerous works have been carried out in detecting hate speeches in English, German, and other languages, very few works have been carried out in the context of the Bengali language. In contrast, millions of people communicate on social media in Bengali. The few existing works that have been carried out need improvements in both accuracy and interpretability. This article proposed encoder decoder based machine learning model, a popular tool in NLP, to classify user's Bengali comments on Facebook pages. A dataset of 7,425 Bengali comments, consisting of seven distinct categories of hate speeches, was used to train and evaluate our model. For extracting and encoding local features from the comments, 1D convolutional layers were used. Finally, the attention mechanism, LSTM, and GRU based decoders have been used for predicting hate speech categories. Among the three encoder decoder algorithms, the attention-based decoder obtained the best accuracy (77%).
△ Less
Submitted 30 March, 2022;
originally announced March 2022.
-
Complexity Results on Untangling Red-Blue Matchings
Authors:
Arun Kumar Das,
Sandip Das,
Guilherme D. da Fonseca,
Yan Gerard,
Bastien Rivier
Abstract:
Given a matching between n red points and n blue points by line segments in the plane, we consider the problem of obtaining a crossing-free matching through flip operations that replace two crossing segments by two non-crossing ones. We first show that (i) it is NP-hard to alpha-approximate the shortest flip sequence, for any constant alpha. Second, we show that when the red points are colinear, (…
▽ More
Given a matching between n red points and n blue points by line segments in the plane, we consider the problem of obtaining a crossing-free matching through flip operations that replace two crossing segments by two non-crossing ones. We first show that (i) it is NP-hard to alpha-approximate the shortest flip sequence, for any constant alpha. Second, we show that when the red points are colinear, (ii) given a matching, a flip sequence of length at most n(n-1)/2 always exists, and (iii) the number of flips in any sequence never exceeds (n(n-1)/2) (n+4)/6. Finally, we present (iv) a lower bounding flip sequence with roughly 1.5 n(n-1)/2 flips, which shows that the n(n-1)/2 flips attained in the convex case are not the maximum, and (v) a convex matching from which any flip sequence has roughly 1.5 n flips. The last four results, based on novel analyses, improve the constants of state-of-the-art bounds.
△ Less
Submitted 22 November, 2022; v1 submitted 23 February, 2022;
originally announced February 2022.
-
Viewing citation trend of Indian physics and astronomy research papers since 2005 through the lens of some new indicators
Authors:
Gopinath Das,
Bidyarthi Dutta,
Anup Kumar Das
Abstract:
The indicator Citation Swing Factor (CSF) has recently been developed to measure this diffusion process quantitatively on the basis of h-core citations, excess citations and total citations. The observed or experimental value of CSF as followed from the basic definition is (dθ/dε), which resulted (-R3/he2) based on a theoretical calculation, where R2, h2 and e2 indicate total citations, h-core cit…
▽ More
The indicator Citation Swing Factor (CSF) has recently been developed to measure this diffusion process quantitatively on the basis of h-core citations, excess citations and total citations. The observed or experimental value of CSF as followed from the basic definition is (dθ/dε), which resulted (-R3/he2) based on a theoretical calculation, where R2, h2 and e2 indicate total citations, h-core citations and excess citations respectively. The later expression indicates the expected or theoretical value of CSF. This paper found out (dθ/dε) for Indian physics research output appeared in selective Indian journals since 2005 to 2020 and compared it with the respective theoretical values. The average error over entire time span is found 2.26% indicating close proximity between theoretically expected and practically observed values. Besides, three other scientometric indicators are introduced here, viz. Time-Normalised Total Cited Ratio (TC), Time-Normalised Cited Uncited Ratio (CU) and Time-Normalised Total Uncited Ratio (TU). The numerical values of these indicators are found out for the same sample and the temporal variations along with their mutual interrelationships are determined by regression analysis.
△ Less
Submitted 11 September, 2021;
originally announced September 2021.
-
Scrutinizing uncitedness of selective Indian physics and astronomy journals through the prism of some h-type indicators
Authors:
Amit Kumar Das,
Bidyarthi Dutta
Abstract:
There exist huge chunk of academic items receiving no citation years after years and remaining beyond the veil of ignorance of the academic audience. These are known as uncited items. Now, the question is, why a paper fails to get citation? The attribute of incapability of receiving citation may be termed as Uncitedness. This paper traces brief history of the concept of uncitedness sprouted first…
▽ More
There exist huge chunk of academic items receiving no citation years after years and remaining beyond the veil of ignorance of the academic audience. These are known as uncited items. Now, the question is, why a paper fails to get citation? The attribute of incapability of receiving citation may be termed as Uncitedness. This paper traces brief history of the concept of uncitedness sprouted first in 1964 in an article entitled Cybernetics, homeostasis and a model of disease by Gerson Jacobs. The concept of uncitedness was scientometrically first explained by Garfield in 1970. The uncitedness of twelve esteemed Indian physics and astronomy journals over a twelve years' (2009-2020) time span is analysed here. Besides Uncitedness Factor (UF), three other indicators are introduced here, viz. Citation per paper per Year (CY), h-core Density (HD) and Time-normalised h-index (TH). The journal-wise variational patterns of these four indicators, i.e. UF, CY, HD and TH and the relationships of UF with other three indicators are analysed. The calculated numerical values of these indicators are observed to formulate seven hypotheses, which are tested by F-Test method. The average annual rate of change of uncited paper is found 67% of total number of papers. The indicator CY is found temporally constant. The indicator HD is found nearly constant journal-wise over the entire time span, while the indicator TH is found nearly constant for all journals. The UF inversely varies with CY and TH for the journals and directly varies with TH over the years. Except few highly reputed Indian journals in physics and astronomy, majority other journals face the situation of uncitedness. The uncitedness of Indian journals in this field outshines the same for global journals by 12%, which indicates lack of circulation and timely reach of research communication to the relevant audience.
△ Less
Submitted 9 September, 2021;
originally announced September 2021.
-
Finding a Largest-Area Triangle in a Terrain in Near-Linear Time
Authors:
Sergio Cabello,
Arun Kumar Das,
Sandip Das,
Joydeep Mukherjee
Abstract:
A terrain is an $x$-monotone polygon whose lower boundary is a single line segment. We present an algorithm to find in a terrain a triangle of largest area in $O(n \log n)$ time, where $n$ is the number of vertices defining the terrain. The best previous algorithm for this problem has a running time of $O(n^2)$.
A terrain is an $x$-monotone polygon whose lower boundary is a single line segment. We present an algorithm to find in a terrain a triangle of largest area in $O(n \log n)$ time, where $n$ is the number of vertices defining the terrain. The best previous algorithm for this problem has a running time of $O(n^2)$.
△ Less
Submitted 7 April, 2023; v1 submitted 23 April, 2021;
originally announced April 2021.
-
Explanation Ontology: A Model of Explanations for User-Centered AI
Authors:
Shruthi Chari,
Oshani Seneviratne,
Daniel M. Gruen,
Morgan A. Foreman,
Amar K. Das,
Deborah L. McGuinness
Abstract:
Explainability has been a goal for Artificial Intelligence (AI) systems since their conception, with the need for explainability growing as more complex AI models are increasingly used in critical, high-stakes settings such as healthcare. Explanations have often added to an AI system in a non-principled, post-hoc manner. With greater adoption of these systems and emphasis on user-centric explainab…
▽ More
Explainability has been a goal for Artificial Intelligence (AI) systems since their conception, with the need for explainability growing as more complex AI models are increasingly used in critical, high-stakes settings such as healthcare. Explanations have often added to an AI system in a non-principled, post-hoc manner. With greater adoption of these systems and emphasis on user-centric explainability, there is a need for a structured representation that treats explainability as a primary consideration, map** end user needs to specific explanation types and the system's AI capabilities. We design an explanation ontology to model both the role of explanations, accounting for the system and user attributes in the process, and the range of different literature-derived explanation types. We indicate how the ontology can support user requirements for explanations in the domain of healthcare. We evaluate our ontology with a set of competency questions geared towards a system designer who might use our ontology to decide which explanation types to include, given a combination of users' needs and a system's capabilities, both in system design settings and in real-time operations. Through the use of this ontology, system designers will be able to make informed choices on which explanations AI systems can and should provide.
△ Less
Submitted 3 October, 2020;
originally announced October 2020.
-
Explanation Ontology in Action: A Clinical Use-Case
Authors:
Shruthi Chari,
Oshani Seneviratne,
Daniel M. Gruen,
Morgan A. Foreman,
Amar K. Das,
Deborah L. McGuinness
Abstract:
We addressed the problem of a lack of semantic representation for user-centric explanations and different explanation types in our Explanation Ontology (https://purl.org/heals/eo). Such a representation is increasingly necessary as explainability has become an important problem in Artificial Intelligence with the emergence of complex methods and an uptake in high-precision and user-facing settings…
▽ More
We addressed the problem of a lack of semantic representation for user-centric explanations and different explanation types in our Explanation Ontology (https://purl.org/heals/eo). Such a representation is increasingly necessary as explainability has become an important problem in Artificial Intelligence with the emergence of complex methods and an uptake in high-precision and user-facing settings. In this submission, we provide step-by-step guidance for system designers to utilize our ontology, introduced in our resource track paper, to plan and model for explanations during the design of their Artificial Intelligence systems. We also provide a detailed example with our utilization of this guidance in a clinical setting.
△ Less
Submitted 3 October, 2020;
originally announced October 2020.
-
Sparsity of weighted networks: measures and applications
Authors:
Swati Goswami,
Asit K. Das,
Subhas C. Nandy
Abstract:
A majority of real life networks are weighted and sparse. The present article aims at characterization of weighted networks based on sparsity, as a measure of inherent diversity, of different network parameters. It utilizes sparsity index defined on ordered degree sequence of simple networks and derives further properties of this index. The range of possible values of sparsity index of any connect…
▽ More
A majority of real life networks are weighted and sparse. The present article aims at characterization of weighted networks based on sparsity, as a measure of inherent diversity, of different network parameters. It utilizes sparsity index defined on ordered degree sequence of simple networks and derives further properties of this index. The range of possible values of sparsity index of any connected network, with edge-count in specific intervals, is worked out analytically in terms of node-count; a pattern is uncovered in corresponding degree sequences to produce highest sparsities. Given the edge-weight frequency distribution of a network, we have formulated an expression of the sparsity index of edge-weights. Its properties are analyzed under different distributions of edge-weights. For example, the upper and lower bounds of sparsity index of edge-weights of a network, having all distinct edge-weights, is determined in terms of its node-count and edge density. The article highlights that this summary index with low computational cost, computed on different network parameters, is useful to reveal different structural and organizational aspects of networks for performing analysis. An application of this index has been demonstrated through overlap** community detection of networks. The results validated on artificial and real-world networks show its efficacy.
△ Less
Submitted 11 January, 2021; v1 submitted 14 September, 2020;
originally announced September 2020.
-
A Black-box Adversarial Attack Strategy with Adjustable Sparsity and Generalizability for Deep Image Classifiers
Authors:
Arka Ghosh,
Sankha Subhra Mullick,
Shounak Datta,
Swagatam Das,
Rammohan Mallipeddi,
Asit Kr. Das
Abstract:
Constructing adversarial perturbations for deep neural networks is an important direction of research. Crafting image-dependent adversarial perturbations using white-box feedback has hitherto been the norm for such adversarial attacks. However, black-box attacks are much more practical for real-world applications. Universal perturbations applicable across multiple images are gaining popularity due…
▽ More
Constructing adversarial perturbations for deep neural networks is an important direction of research. Crafting image-dependent adversarial perturbations using white-box feedback has hitherto been the norm for such adversarial attacks. However, black-box attacks are much more practical for real-world applications. Universal perturbations applicable across multiple images are gaining popularity due to their innate generalizability. There have also been efforts to restrict the perturbations to a few pixels in the image. This helps to retain visual similarity with the original images making such attacks hard to detect. This paper marks an important step which combines all these directions of research. We propose the DEceit algorithm for constructing effective universal pixel-restricted perturbations using only black-box feedback from the target network. We conduct empirical investigations using the ImageNet validation set on the state-of-the-art deep neural classifiers by varying the number of pixels to be perturbed from a meagre 10 pixels to as high as all pixels in the image. We find that perturbing only about 10% of the pixels in an image using DEceit achieves a commendable and highly transferable Fooling Rate while retaining the visual quality. We further demonstrate that DEceit can be successfully applied to image dependent attacks as well. In both sets of experiments, we outperformed several state-of-the-art methods.
△ Less
Submitted 9 September, 2021; v1 submitted 24 April, 2020;
originally announced April 2020.
-
Making Study Populations Visible through Knowledge Graphs
Authors:
Shruthi Chari,
Miao Qi,
Nkcheniyere N. Agu,
Oshani Seneviratne,
James P. McCusker,
Kristin P. Bennett,
Amar K. Das,
Deborah L. McGuinness
Abstract:
Treatment recommendations within Clinical Practice Guidelines (CPGs) are largely based on findings from clinical trials and case studies, referred to here as research studies, that are often based on highly selective clinical populations, referred to here as study cohorts. When medical practitioners apply CPG recommendations, they need to understand how well their patient population matches the ch…
▽ More
Treatment recommendations within Clinical Practice Guidelines (CPGs) are largely based on findings from clinical trials and case studies, referred to here as research studies, that are often based on highly selective clinical populations, referred to here as study cohorts. When medical practitioners apply CPG recommendations, they need to understand how well their patient population matches the characteristics of those in the study cohort, and thus are confronted with the challenges of locating the study cohort information and making an analytic comparison. To address these challenges, we develop an ontology-enabled prototype system, which exposes the population descriptions in research studies in a declarative manner, with the ultimate goal of allowing medical practitioners to better understand the applicability and generalizability of treatment recommendations. We build a Study Cohort Ontology (SCO) to encode the vocabulary of study population descriptions, that are often reported in the first table in the published work, thus they are often referred to as Table 1. We leverage the well-used Semanticscience Integrated Ontology (SIO) for defining property associations between classes. Further, we model the key components of Table 1s, i.e., collections of study subjects, subject characteristics, and statistical measures in RDF knowledge graphs. We design scenarios for medical practitioners to perform population analysis, and generate cohort similarity visualizations to determine the applicability of a study population to the clinical population of interest. Our semantic approach to make study populations visible, by standardized representations of Table 1s, allows users to quickly derive clinically relevant inferences about study populations.
△ Less
Submitted 9 July, 2019;
originally announced July 2019.
-
A Personalized Subreddit Recommendation Engine
Authors:
Abhishek K Das,
Nikhil Bhat,
Sukanto Guha,
Janvi Palan
Abstract:
This paper aims to improve upon the generic recommendations that Reddit provides for its users. We propose a novel personalized recommender system that learns from both, the presence and the content of user-subreddit interaction, using implicit and explicit signals to provide robust recommendations.
This paper aims to improve upon the generic recommendations that Reddit provides for its users. We propose a novel personalized recommender system that learns from both, the presence and the content of user-subreddit interaction, using implicit and explicit signals to provide robust recommendations.
△ Less
Submitted 3 May, 2019;
originally announced May 2019.
-
Sparsity Measure of a Network Graph: Gini Index
Authors:
Swati Goswami,
C. A. Murthy,
Asit K. Das
Abstract:
This article examines the application of a popular measure of sparsity, Gini Index, on network graphs. A wide variety of network graphs happen to be sparse. But the index with which sparsity is commonly measured in network graphs is edge density, reflecting the proportion of the sum of the degrees of all nodes in the graph compared to the total possible degrees in the corresponding fully connected…
▽ More
This article examines the application of a popular measure of sparsity, Gini Index, on network graphs. A wide variety of network graphs happen to be sparse. But the index with which sparsity is commonly measured in network graphs is edge density, reflecting the proportion of the sum of the degrees of all nodes in the graph compared to the total possible degrees in the corresponding fully connected graph. Thus edge density is a simple ratio and carries limitations, primarily in terms of the amount of information it takes into account in its definition. In this paper, we have provided a formulation for defining sparsity of a network graph by generalizing the concept of Gini Index and call it sparsity index. A majority of the six properties (viz., Robin Hood, Scaling, Rising Tide, Cloning, Bill Gates and Babies) with which sparsity measures are commonly compared are seen to be satisfied by the proposed index. A comparison between edge density and the sparsity index has been drawn with appropriate examples to highlight the efficacy of the proposed index. It has also been shown theoretically that the two measures follow similar trend for a changing graph, i.e., as the edge density of a graph increases its sparsity index decreases. Additionally, the paper draws a relationship, analytically, between the sparsity index and the exponent term of a power law distribution, a distribution which is known to approximate the degree distribution of a wide variety of network graphs. Finally, the article highlights how the proposed index together with Gini index can reveal important properties of a network graph.
△ Less
Submitted 21 December, 2016;
originally announced December 2016.
-
FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Map**
Authors:
Hao Fu,
Zizhan Zheng,
Aveek K. Das,
Parth H. Pathak,
Pengfei Hu,
Prasant Mohapatra
Abstract:
The exponential growth of mobile devices has raised concerns about sensitive data leakage. In this paper, we make the first attempt to identify suspicious location-related HTTP transmission flows from the user's perspective, by answering the question: Is the transmission user-intended? In contrast to previous network-level detection schemes that mainly rely on a given set of suspicious hostnames,…
▽ More
The exponential growth of mobile devices has raised concerns about sensitive data leakage. In this paper, we make the first attempt to identify suspicious location-related HTTP transmission flows from the user's perspective, by answering the question: Is the transmission user-intended? In contrast to previous network-level detection schemes that mainly rely on a given set of suspicious hostnames, our approach can better adapt to the fast growth of app market and the constantly evolving leakage patterns. On the other hand, compared to existing system-level detection schemes built upon program taint analysis, where all sensitive transmissions as treated as illegal, our approach better meets the user needs and is easier to deploy. In particular, our proof-of-concept implementation (FlowIntent) captures sensitive transmissions missed by TaintDroid, the state-of-the-art dynamic taint analysis system on Android platforms. Evaluation using 1002 location sharing instances collected from more than 20,000 apps shows that our approach achieves about 91% accuracy in detecting illegitimate location transmissions.
△ Less
Submitted 24 July, 2016; v1 submitted 12 May, 2016;
originally announced May 2016.
-
An Algorithm for Mining High Utility Closed Itemsets and Generators
Authors:
Jayakrushna Sahoo,
Ashok Kumar Das,
A. Goswami
Abstract:
Traditional association rule mining based on the support-confidence framework provides the objective measure of the rules that are of interest to users. However, it does not reflect the utility of the rules. To extract non-redundant association rules in support-confidence framework frequent closed itemsets and their generators play an important role. To extract non-redundant association rules amon…
▽ More
Traditional association rule mining based on the support-confidence framework provides the objective measure of the rules that are of interest to users. However, it does not reflect the utility of the rules. To extract non-redundant association rules in support-confidence framework frequent closed itemsets and their generators play an important role. To extract non-redundant association rules among high utility itemsets, high utility closed itemsets (HUCI) and their generators should be extracted in order to apply traditional support-confidence framework. However, no efficient method exists at present for mining HUCIs with their generators. This paper addresses this issue. A post-processing algorithm, called the HUCI-Miner, is proposed to mine HUCIs with their generators. The proposed algorithm is implemented using both synthetic and real datasets.
△ Less
Submitted 11 October, 2014;
originally announced October 2014.
-
The 7 Habits of Highly Effective Research Communicators
Authors:
Anup Kumar Das
Abstract:
The emergence of Web 2.0 and simultaneously Library 2.0 platforms has helped the library and information professionals to outreach to new audiences beyond their physical boundaries. In a globalized society, information becomes very useful resource for socio-economic empowerment of marginalized communities, economic prosperity of common citizens, and knowledge enrichment of liberated minds. Scholar…
▽ More
The emergence of Web 2.0 and simultaneously Library 2.0 platforms has helped the library and information professionals to outreach to new audiences beyond their physical boundaries. In a globalized society, information becomes very useful resource for socio-economic empowerment of marginalized communities, economic prosperity of common citizens, and knowledge enrichment of liberated minds. Scholarly information becomes both developmental and functional for researchers working towards advancement of knowledge. We must recognize a relay of information flow and information ecology while pursuing scholarly research. Published scholarly literatures we consult that help us in creation of new knowledge. Similarly, our published scholarly works should be outreached to future researchers for regeneration of next dimension of knowledge. Fortunately, present day research communicators have many freely available personalized digital tools to outreach to globalized research audiences having similar research interests. These tools and techniques, already adopted by many researchers in different subject areas across the world, should be enthusiastically utilized by LIS researchers in South Asia for global dissemination of their scholarly research works. This newly found enthusiasm will soon become integral part of the positive habits and cultural practices of research communicators in LIS domain.
△ Less
Submitted 13 September, 2014;
originally announced September 2014.
-
Genesis of Altmetrics or Article-level Metrics for Measuring Efficacy of Scholarly Communications: Current Perspectives
Authors:
Anup Kumar Das,
Sanjaya Mishra
Abstract:
The article-level metrics (ALMs) or altmetrics becomes a new trendsetter in recent times for measuring the impact of scientific publications and their social outreach to intended audiences. The popular social networks such as Facebook, Twitter, and Linkedin and social bookmarks such as Mendeley and CiteULike are nowadays widely used for communicating research to larger transnational audiences. In…
▽ More
The article-level metrics (ALMs) or altmetrics becomes a new trendsetter in recent times for measuring the impact of scientific publications and their social outreach to intended audiences. The popular social networks such as Facebook, Twitter, and Linkedin and social bookmarks such as Mendeley and CiteULike are nowadays widely used for communicating research to larger transnational audiences. In 2012, the San Francisco Declaration on Research Assessment got signed by the scientific and researchers communities across the world. This declaration has given preference to the ALM or altmetrics over traditional but faulty journal impact factor (JIF)-based assessment of career scientists. JIF does not consider impact or influence beyond citations count as this count reflected only through Thomson Reuters' Web of Science database. Furthermore, JIF provides indicator related to the journal, but not related to a published paper. Thus, altmetrics now becomes an alternative metrics for performance assessment of individual scientists and their contributed scholarly publications. This paper provides a glimpse of genesis of altmetrics in measuring efficacy of scholarly communications and highlights available altmetric tools and social platforms linking altmetric tools, which are widely used in deriving altmetric scores of scholarly publications. The paper thus argues for institutions and policy makers to pay more attention to altmetrics based indicators for evaluation purpose but cautions that proper safeguards and validations are needed before their adoption.
△ Less
Submitted 10 December, 2014; v1 submitted 1 August, 2014;
originally announced August 2014.
-
Linear Network Coding for Multiple Groupcast Sessions: An Interference Alignment Approach
Authors:
Abhik Kumar Das,
Siddhartha Banerjee,
Sriram Vishwanath
Abstract:
We consider the problem of linear network coding over communication networks, representable by directed acyclic graphs, with multiple groupcast sessions: the network comprises of multiple destination nodes, each desiring messages from multiple sources. We adopt an interference alignment perspective, providing new insights into designing practical network coding schemes as well as the impact of net…
▽ More
We consider the problem of linear network coding over communication networks, representable by directed acyclic graphs, with multiple groupcast sessions: the network comprises of multiple destination nodes, each desiring messages from multiple sources. We adopt an interference alignment perspective, providing new insights into designing practical network coding schemes as well as the impact of network topology on the complexity of the alignment scheme. In particular, we show that under certain (polynomial-time checkable) constraints on networks with $K$ sources, it is possible to achieve a rate of $1/(L+d+1)$ per source using linear network coding coupled with interference alignment, where each destination receives messages from $L$ sources ($L < K$), and $d$ is a parameter, solely dependent on the network topology, that satisfies $0 \leq d < K-L$.
△ Less
Submitted 4 February, 2014;
originally announced February 2014.
-
Precoding-Based Network Alignment For Three Unicast Sessions
Authors:
Chun Meng,
Abhik Kumar Das,
Abinesh Ramakrishnan,
Syed Ali Jafar,
Athina Markopoulou,
Sriram Vishwanath
Abstract:
We consider the problem of network coding across three unicast sessions over a directed acyclic graph, where each sender and the receiver is connected to the network via a single edge of unit capacity. We consider a network model in which the middle of the network only performs random linear network coding, and restrict our approaches to precoding-based linear schemes, where the senders use precod…
▽ More
We consider the problem of network coding across three unicast sessions over a directed acyclic graph, where each sender and the receiver is connected to the network via a single edge of unit capacity. We consider a network model in which the middle of the network only performs random linear network coding, and restrict our approaches to precoding-based linear schemes, where the senders use precoding matrices to encode source symbols. We adapt a precoding-based interference alignment technique, originally developed for the wireless interference channel, to construct a precoding-based linear scheme, which we refer to as as a {\em precoding-based network alignment scheme (PBNA)}. A primary difference between this setting and the wireless interference channel is that the network topology can introduce dependencies between elements of the transfer matrix, which we refer to as coupling relations, and can potentially affect the achievable rate of PBNA. We identify all possible such coupling relations, and interpret these coupling relations in terms of network topology and present polynomial-time algorithms to check the presence of these coupling relations. Finally, we show that, depending on the coupling relations present in the network, the optimal symmetric rate achieved by precoding-based linear scheme can take only three possible values, all of which can be achieved by PBNA.
△ Less
Submitted 21 May, 2014; v1 submitted 3 May, 2013;
originally announced May 2013.
-
On Finite Alphabet Compressive Sensing
Authors:
Abhik Kumar Das,
Sriram Vishwanath
Abstract:
This paper considers the problem of compressive sensing over a finite alphabet, where the finite alphabet may be inherent to the nature of the data or a result of quantization. There are multiple examples of finite alphabet based static as well as time-series data with inherent sparse structure; and quantizing real values is an essential step while handling real data in practice. We show that ther…
▽ More
This paper considers the problem of compressive sensing over a finite alphabet, where the finite alphabet may be inherent to the nature of the data or a result of quantization. There are multiple examples of finite alphabet based static as well as time-series data with inherent sparse structure; and quantizing real values is an essential step while handling real data in practice. We show that there are significant benefits to analyzing the problem while incorporating its finite alphabet nature, versus ignoring it and employing a conventional real alphabet based toolbox. Specifically, when the alphabet is finite, our techniques (a) have a lower sample complexity compared to real-valued compressive sensing for sparsity levels below a threshold; (b) facilitate constructive designs of sensing matrices based on coding-theoretic techniques; (c) enable one to solve the exact $\ell_0$-minimization problem in polynomial time rather than a approach of convex relaxation followed by sufficient conditions for when the relaxation matches the original problem; and finally, (d) allow for smaller amount of data storage (in bits).
△ Less
Submitted 16 March, 2013;
originally announced March 2013.
-
Epidemic Spreading with External Agents
Authors:
Siddhartha Banerjee,
Aditya Gopalan,
Abhik Kumar Das,
Sanjay Shakkottai
Abstract:
We study epidemic spreading processes in large networks, when the spread is assisted by a small number of external agents: infection sources with bounded spreading power, but whose movement is unrestricted vis-à-vis the underlying network topology. For networks which are `spatially constrained', we show that the spread of infection can be significantly speeded up even by a few such external agents…
▽ More
We study epidemic spreading processes in large networks, when the spread is assisted by a small number of external agents: infection sources with bounded spreading power, but whose movement is unrestricted vis-à-vis the underlying network topology. For networks which are `spatially constrained', we show that the spread of infection can be significantly speeded up even by a few such external agents infecting randomly. Moreover, for general networks, we derive upper-bounds on the order of the spreading time achieved by certain simple (random/greedy) external-spreading policies. Conversely, for certain common classes of networks such as line graphs, grids and random geometric graphs, we also derive lower bounds on the order of the spreading time over all (potentially network-state aware and adversarial) external-spreading policies; these adversarial lower bounds match (up to logarithmic factors) the spreading time achieved by an external agent with a random spreading policy. This demonstrates that random, state-oblivious infection-spreading by an external agent is in fact order-wise optimal for spreading in such spatially constrained networks.
△ Less
Submitted 13 April, 2014; v1 submitted 15 June, 2012;
originally announced June 2012.
-
Single Reduct Generation Based on Relative Indiscernibility of Rough Set Theory
Authors:
Shampa Sengupta,
Asit Kr. Das
Abstract:
In real world everything is an object which represents particular classes. Every object can be fully described by its attributes. Any real world dataset contains large number of attributes and objects. Classifiers give poor performance when these huge datasets are given as input to it for proper classification. So from these huge dataset most useful attributes need to be extracted that contribute…
▽ More
In real world everything is an object which represents particular classes. Every object can be fully described by its attributes. Any real world dataset contains large number of attributes and objects. Classifiers give poor performance when these huge datasets are given as input to it for proper classification. So from these huge dataset most useful attributes need to be extracted that contribute the maximum to the decision. In the paper, attribute set is reduced by generating reducts using the indiscernibility relation of Rough Set Theory (RST). The method measures similarity among the attributes using relative indiscernibility relation and computes attribute similarity set. Then the set is minimized and an attribute similarity table is constructed from which attribute similar to maximum number of attributes is selected so that the resultant minimum set of selected attributes (called reduct) cover all attributes of the attribute similarity table. The method has been applied on glass dataset collected from the UCI repository and the classification accuracy is calculated by various classifiers. The result shows the efficiency of the proposed method.
△ Less
Submitted 14 March, 2012;
originally announced March 2012.
-
A New Energy Efficient Approach Towards WASN Routing with Modified QCS Protocol
Authors:
Debaditya Ghosh,
Pritam Majumder,
Ayan Kumar Das
Abstract:
In today's world Wireless Ad-hoc sensor network, consists of small sensor nodes having limited resources, has a great potential to solve problems in various domain including disaster management. In this paper "QCS-protocol" is modified which was introduced in our previous paper [1] and named as "Modified QCS-protocol". This is the backbone of our Intelligent Energy Efficient Ad-hoc Sensor Network.…
▽ More
In today's world Wireless Ad-hoc sensor network, consists of small sensor nodes having limited resources, has a great potential to solve problems in various domain including disaster management. In this paper "QCS-protocol" is modified which was introduced in our previous paper [1] and named as "Modified QCS-protocol". This is the backbone of our Intelligent Energy Efficient Ad-hoc Sensor Network. Two other protocols "Irregular Information Transfer" & "Final Broadcast-Petrol Flow" protocol are also modified to enhance performance of the new version of QCS protocol to run the system properly and to make the network more energy efficient and perfect. The challenges in WASN are- limited node power, Ad-hoc organization of network and reliability. Most of the existing approaches addressed the problems separately, but not in a totality. This paper shows how the network can have unlimited life and all time readiness with overall stability to send information to the base station with minimum power dissipation with the help of multimode "same type" sensor nodes and type categorization of generated information. Moreover an effort is made to give some light to the implementation issues and analyzed overall performance of the network by MATLAB simulation.
△ Less
Submitted 8 October, 2011;
originally announced October 2011.
-
A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge
Authors:
Ashok Kumar Das
Abstract:
Establishment of pairwise keys between sensor nodes in a sensor network is a difficult problem due to resource limitations of sensor nodes as well as vulnerability to physical captures of sensor nodes by the enemy. Public-key cryptosystems are not much suited for most resource-constrained sensor networks. Recently, elliptic curve cryptographic techniques show that public key cryptosystem is also f…
▽ More
Establishment of pairwise keys between sensor nodes in a sensor network is a difficult problem due to resource limitations of sensor nodes as well as vulnerability to physical captures of sensor nodes by the enemy. Public-key cryptosystems are not much suited for most resource-constrained sensor networks. Recently, elliptic curve cryptographic techniques show that public key cryptosystem is also feasible for resource-constrained sensor networks. However, most researchers accept that the symmetric key cryptosystems are viable options for resource-constrained sensor networks. In this paper, we first develop a basic principle to address the key pre-distribution problem in mobile sensor networks. Then, using this developed basic principle, we propose a scheme which takes the advantage of the post-deployment knowledge. Our scheme is a modified version of the key prioritization technique proposed by Liu and Ning. Our improved scheme provides reasonable network connectivity and security. Moreover, the proposed scheme works for any deployment topology.
△ Less
Submitted 5 August, 2011;
originally announced August 2011.
-
An Unconditionally Secure Key Management Scheme for Large-Scale Heterogeneous Wireless Sensor Networks
Authors:
Ashok Kumar Das
Abstract:
Key establishment in sensor networks becomes a challenging problem because of the resource limitations of the sensors and also due to vulnerability to physical capture of the sensor nodes. In this paper, we propose an unconditionally secure probabilistic group-based key pre-distribution scheme for a heterogeneous wireless sensor network. The proposed scheme always guarantees that no matter how man…
▽ More
Key establishment in sensor networks becomes a challenging problem because of the resource limitations of the sensors and also due to vulnerability to physical capture of the sensor nodes. In this paper, we propose an unconditionally secure probabilistic group-based key pre-distribution scheme for a heterogeneous wireless sensor network. The proposed scheme always guarantees that no matter how many sensor nodes are compromised, the non-compromised nodes can still communicate with 100% secrecy, i.e., the proposed scheme is always unconditionally secure against node capture attacks. Moreover, it provides significantly better trade-off between communication overhead, computational overhead, network connectivity and security against node capture as compared to the existing key pre-distribution schemes. It also supports dynamic node addition after the initial deployment of the nodes in the network.
△ Less
Submitted 24 March, 2011;
originally announced March 2011.
-
An Identity Based Key Management Scheme in Wireless Sensor Networks
Authors:
Ashok Kumar Das,
Debasis Giri
Abstract:
Pairwise key establishment is one of the fundamental security services in sensor networks which enables sensor nodes in a sensor network to communicate securely with each other using cryptographic techniques. It is not feasible to apply traditional public key management techniques in resource-constrained sensor nodes, and also because the sensor nodes are vulnerable to physical capture. In this pa…
▽ More
Pairwise key establishment is one of the fundamental security services in sensor networks which enables sensor nodes in a sensor network to communicate securely with each other using cryptographic techniques. It is not feasible to apply traditional public key management techniques in resource-constrained sensor nodes, and also because the sensor nodes are vulnerable to physical capture. In this paper, we introduce a new scheme called the identity based key pre-distribution using a pseudo random function (IBPRF), which has better trade-off between communication overhead, network connectivity and resilience against node capture compared to the other key pre-distribution schemes. Our scheme can be easily adapted in mobile sensor networks. This scheme supports the addition of new sensor nodes after the initial deployment and also works for any deployment topology. In addition, we propose an improved version of our scheme to support large sensor networks.
△ Less
Submitted 24 March, 2011;
originally announced March 2011.
-
An Improved Efficient Key Distribution Mechanism for Large-Scale Heterogeneous Mobile Sensor Networks
Authors:
Ashok Kumar Das
Abstract:
Due to resource constraints of the sensor nodes, traditional public key cryptographic techniques are not feasible in most sensor network architectures. Several symmetric key distribution mechanisms are proposed for establishing pairwise keys between sensor nodes in sensor networks, but most of them are not scalable and also are not much suited for mobile sensor networks because they incur much com…
▽ More
Due to resource constraints of the sensor nodes, traditional public key cryptographic techniques are not feasible in most sensor network architectures. Several symmetric key distribution mechanisms are proposed for establishing pairwise keys between sensor nodes in sensor networks, but most of them are not scalable and also are not much suited for mobile sensor networks because they incur much communication as well as computational overheads. Moreover, these schemes are either vulnerable to a small number of compromised sensor nodes or involve expensive protocols for establishing keys. In this paper, we introduce a new scheme for establishing keys between sensor nodes with the help of additional high-end sensor nodes, called the auxiliary nodes. Our scheme provides unconditional security against sensor node captures and high network connectivity. In addition, our scheme requires minimal storage requirement for storing keys mainly due to only a single key before deployment in each node in the sensor network, supports efficiently addition of new nodes after initial deployment and also works for any deployment topology.
△ Less
Submitted 23 March, 2011;
originally announced March 2011.
-
Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards
Authors:
Ashok Kumar Das
Abstract:
Recently, Li et al. proposed a secure biometric-based remote user authentication scheme using smart cards to withstand the security flaws of Li-Hwang's efficient biometric-based remote user authentication scheme using smart cards. Li et al.'s scheme is based on biometrics verification, smart card and one-way hash function, and it also uses the random nonce rather than a synchronized clock, and thu…
▽ More
Recently, Li et al. proposed a secure biometric-based remote user authentication scheme using smart cards to withstand the security flaws of Li-Hwang's efficient biometric-based remote user authentication scheme using smart cards. Li et al.'s scheme is based on biometrics verification, smart card and one-way hash function, and it also uses the random nonce rather than a synchronized clock, and thus it is efficient in computational cost and more secure than Li-Hwang's scheme. Unfortunately, in this paper we show that Li et al.'s scheme still has some security weaknesses in their design. In order to withstand those weaknesses in their scheme, we further propose an improvement of their scheme so that the improved scheme always provides proper authentication and as a result, it establishes a session key between the user and the server at the end of successful user authentication.
△ Less
Submitted 16 March, 2011;
originally announced March 2011.
-
Multi-Objective Geometric Programming Problem Being Cost Coefficients as Continous Function with Weighted Mean Method
Authors:
A. K. Ojha,
A. K. Das
Abstract:
Geometric programming problems occur frequently in engineering design and management. In multiobjective optimization, the trade-off information between different objective functions is probably the most important piece of information in a solution process to reach the most preferred solution. In this paper we have discussed the basic concepts and principles of multiple objective optimization pro…
▽ More
Geometric programming problems occur frequently in engineering design and management. In multiobjective optimization, the trade-off information between different objective functions is probably the most important piece of information in a solution process to reach the most preferred solution. In this paper we have discussed the basic concepts and principles of multiple objective optimization problems and developed a solution procedure to solve this optimization problem where the cost coefficients are continuous functions using weighted method to obtain the non-inferior solutions.
△ Less
Submitted 21 February, 2010;
originally announced February 2010.