Skip to main content

Showing 1–38 of 38 results for author: Das, A K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.17279  [pdf, ps, other

    math.CO cs.DM

    Bipartite powers of some classes of bipartite graphs

    Authors: Indrajit Paul, Ashok Kumar Das

    Abstract: Graph powers are a well-studied concept in graph theory. Analogous to graph powers, Chandran et al.[3] introduced the concept of bipartite powers for bipartite graphs. In this paper, we will demonstrate that some well-known classes of bipartite graphs, namely the interval bigraphs, proper interval bigraphs, and bigraphs of Ferrers dimension 2, are closed under the operation of taking bipartite pow… ▽ More

    Submitted 26 April, 2024; originally announced April 2024.

  2. arXiv:2403.08613  [pdf, other

    cs.SI cs.AI cs.LG

    Link Prediction for Social Networks using Representation Learning and Heuristic-based Features

    Authors: Samarth Khanna, Sree Bhattacharyya, Sudipto Ghosh, Kushagra Agarwal, Asit Kumar Das

    Abstract: The exponential growth in scale and relevance of social networks enable them to provide expansive insights. Predicting missing links in social networks efficiently can help in various modern-day business applications ranging from generating recommendations to influence analysis. Several categories of solutions exist for the same. Here, we explore various feature extraction techniques to generate r… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

    Comments: Accepted to the MAISoN Workshop at IJCAI 2023

  3. arXiv:2311.00724  [pdf

    cs.LG cs.AI cs.DC

    Fraud Analytics Using Machine-learning & Engineering on Big Data (FAME) for Telecom

    Authors: Sudarson Roy Pratihar, Subhadip Paul, Pranab Kumar Dash, Amartya Kumar Das

    Abstract: Telecom industries lose globally 46.3 Billion USD due to fraud. Data mining and machine learning techniques (apart from rules oriented approach) have been used in past, but efficiency has been low as fraud pattern changes very rapidly. This paper presents an industrialized solution approach with self adaptive data mining technique and application of big data technologies to detect fraud and discov… ▽ More

    Submitted 31 October, 2023; originally announced November 2023.

    Comments: Presented in International Conference in Indian Institute of Management, Bangalore, India

  4. arXiv:2308.12614  [pdf, ps, other

    cs.DM math.CO

    Obstruction characterization of co-TT graphs

    Authors: Ashok Kumar Das, Indrajit Paul

    Abstract: Threshold tolerance graphs and their complement graphs ( known as co-TT graphs) were introduced by Monma, Reed and Trotter[24]. Introducing the concept of negative interval Hell et al.[19] defined signed-interval bigraphs/digraphs and have shown that they are equivalent to several seemingly different classes of bigraphs/digraphs. They have also shown that co-TT graphs are equivalent to symmetric s… ▽ More

    Submitted 24 August, 2023; originally announced August 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2206.05917

  5. arXiv:2308.00943  [pdf, other

    cs.CR

    IIDS: Design of Intelligent Intrusion Detection System for Internet-of-Things Applications

    Authors: KG Raghavendra Narayan, Srijanee Mookherji, Vanga Odelu, Rajendra Prasath, Anish Chand Turlapaty, Ashok Kumar Das

    Abstract: With rapid technological growth, security attacks are drastically increasing. In many crucial Internet-of-Things (IoT) applications such as healthcare and defense, the early detection of security attacks plays a significant role in protecting huge resources. An intrusion detection system is used to address this problem. The signature-based approaches fail to detect zero-day attacks. So anomaly-bas… ▽ More

    Submitted 2 August, 2023; originally announced August 2023.

  6. arXiv:2304.14269  [pdf

    cs.ET physics.app-ph physics.bio-ph physics.chem-ph

    Performance Analysis of DNA Crossbar Arrays for High-Density Memory Storage Applications

    Authors: Arpan De, Hashem Mohammad, Yiren Wang, Rajkumar Kubendran, Arindam K. Das, M. P. Anantram

    Abstract: Deoxyribonucleic acid (DNA) has emerged as a promising building block for next-generation ultra-high density storage devices. Although DNA has high durability and extremely high density in nature, its potential as the basis of storage devices is currently hindered by limitations such as expensive and complex fabrication processes and time-consuming read-write operations. In this article, we propos… ▽ More

    Submitted 6 April, 2023; originally announced April 2023.

  7. arXiv:2210.08782  [pdf, ps, other

    cs.DM math.CO

    On powers of circular arc graphs

    Authors: Ashok Kumar Das, Indrajit Paul

    Abstract: A class of graphs $\mathcal{C}$ is closed under powers if for every graph $G\in\mathcal{C}$ and every $k\in\mathbb{N}$, $G^k\in\mathcal{C}$. Also $\mathcal{C}$ is strongly closed under powers if for every $k\in\mathbb{N}$, if $G^k\in\mathcal{C}$, then $G^{k+1}\in\mathcal{C}$. It is known that circular arc graphs and proper circular arc graphs are closed under powers. But it is open whether these c… ▽ More

    Submitted 8 June, 2023; v1 submitted 17 October, 2022; originally announced October 2022.

  8. arXiv:2208.12705  [pdf

    cond-mat.mtrl-sci cs.LG

    A machine learning approach to predict the structural and magnetic properties of Heusler alloy families

    Authors: Srimanta Mitra, Aquil Ahmad, Sajib Biswas, Amal Kumar Das

    Abstract: Random forest (RF) regression model is used to predict the lattice constant, magnetic moment and formation energies of full Heusler alloys, half Heusler alloys, inverse Heusler alloys and quaternary Heusler alloys based on existing as well as indigenously prepared databases. Prior analysis was carried out to check the distribution of the data points of the response variables and found that in most… ▽ More

    Submitted 7 August, 2022; originally announced August 2022.

  9. arXiv:2206.05917  [pdf, ps, other

    cs.DM math.CO

    Signed interval graphs and bigraphs: A generalization of interval graphs and bigraphs

    Authors: Ashok Kumar Das, Indrajit Paul

    Abstract: In this paper, we define and characterize signed interval graphs and bigraphs introducing the concept of negative interval. Also we have shown that these classes of graphs are respectively a generalization of well known classes of interval graphs and interval bigraphs. In this context we have observed that signed interval graphs coincide with the complement of Threshold tolerance graphs(co-TT grap… ▽ More

    Submitted 13 June, 2022; originally announced June 2022.

  10. arXiv:2206.02385  [pdf, ps, other

    cs.DM math.CO

    On Hamiltonian-Connected and Mycielski graphs

    Authors: Ashok Kumar Das, Indrajit Paul

    Abstract: A graph $G$ is Hamiltonian-connected if there exists a Hamiltonian path between any two vertices of $G$. It is known that if $G$ is 2-connected then the graph $G^2$ is Hamiltonian-connected. In this paper we prove that the square of every self-complementary graph of order grater than 4 is Hamiltonian-connected. If $G$ is a $k$-critical graph, then we prove that the Mycielski graph $μ(G)$ is… ▽ More

    Submitted 6 February, 2023; v1 submitted 6 June, 2022; originally announced June 2022.

  11. arXiv:2203.16775  [pdf

    cs.CL cs.AI cs.LG

    Bangla hate speech detection on social media using attention-based recurrent neural network

    Authors: Amit Kumar Das, Abdullah Al Asif, Anik Paul, Md. Nur Hossain

    Abstract: Hate speech has spread more rapidly through the daily use of technology and, most notably, by sharing your opinions or feelings on social media in a negative aspect. Although numerous works have been carried out in detecting hate speeches in English, German, and other languages, very few works have been carried out in the context of the Bengali language. In contrast, millions of people communicate… ▽ More

    Submitted 30 March, 2022; originally announced March 2022.

    Journal ref: Type: Journal Language: English Publisher: De Gruyter First published: September 1, 1991 Publication Frequency: 1 Issue per Year Audience: researchers in the field of intelligent systems

  12. arXiv:2202.11857  [pdf, other

    cs.CG

    Complexity Results on Untangling Red-Blue Matchings

    Authors: Arun Kumar Das, Sandip Das, Guilherme D. da Fonseca, Yan Gerard, Bastien Rivier

    Abstract: Given a matching between n red points and n blue points by line segments in the plane, we consider the problem of obtaining a crossing-free matching through flip operations that replace two crossing segments by two non-crossing ones. We first show that (i) it is NP-hard to alpha-approximate the shortest flip sequence, for any constant alpha. Second, we show that when the red points are colinear, (… ▽ More

    Submitted 22 November, 2022; v1 submitted 23 February, 2022; originally announced February 2022.

    Comments: 28 pages, 27 figures, accepted at EuroCG 2022, at CORE 2022 (ICALP Workshop), at LATIN 2022, and at CGTA 2022 (EuroCG 2022 special issue)

  13. arXiv:2109.05344  [pdf

    cs.DL cs.IT

    Viewing citation trend of Indian physics and astronomy research papers since 2005 through the lens of some new indicators

    Authors: Gopinath Das, Bidyarthi Dutta, Anup Kumar Das

    Abstract: The indicator Citation Swing Factor (CSF) has recently been developed to measure this diffusion process quantitatively on the basis of h-core citations, excess citations and total citations. The observed or experimental value of CSF as followed from the basic definition is (dθ/dε), which resulted (-R3/he2) based on a theoretical calculation, where R2, h2 and e2 indicate total citations, h-core cit… ▽ More

    Submitted 11 September, 2021; originally announced September 2021.

    Comments: 9 pages, 3 figures

  14. arXiv:2109.04507  [pdf

    cs.DL

    Scrutinizing uncitedness of selective Indian physics and astronomy journals through the prism of some h-type indicators

    Authors: Amit Kumar Das, Bidyarthi Dutta

    Abstract: There exist huge chunk of academic items receiving no citation years after years and remaining beyond the veil of ignorance of the academic audience. These are known as uncited items. Now, the question is, why a paper fails to get citation? The attribute of incapability of receiving citation may be termed as Uncitedness. This paper traces brief history of the concept of uncitedness sprouted first… ▽ More

    Submitted 9 September, 2021; originally announced September 2021.

    Comments: 22 pages, 3 Figures

  15. arXiv:2104.11420  [pdf, other

    cs.CG cs.DS

    Finding a Largest-Area Triangle in a Terrain in Near-Linear Time

    Authors: Sergio Cabello, Arun Kumar Das, Sandip Das, Joydeep Mukherjee

    Abstract: A terrain is an $x$-monotone polygon whose lower boundary is a single line segment. We present an algorithm to find in a terrain a triangle of largest area in $O(n \log n)$ time, where $n$ is the number of vertices defining the terrain. The best previous algorithm for this problem has a running time of $O(n^2)$.

    Submitted 7 April, 2023; v1 submitted 23 April, 2021; originally announced April 2021.

  16. arXiv:2010.01479  [pdf, other

    cs.AI cs.HC cs.LG

    Explanation Ontology: A Model of Explanations for User-Centered AI

    Authors: Shruthi Chari, Oshani Seneviratne, Daniel M. Gruen, Morgan A. Foreman, Amar K. Das, Deborah L. McGuinness

    Abstract: Explainability has been a goal for Artificial Intelligence (AI) systems since their conception, with the need for explainability growing as more complex AI models are increasingly used in critical, high-stakes settings such as healthcare. Explanations have often added to an AI system in a non-principled, post-hoc manner. With greater adoption of these systems and emphasis on user-centric explainab… ▽ More

    Submitted 3 October, 2020; originally announced October 2020.

    Comments: 16 pages (but 1 reference over on arxiv), 5 tables, 3 code listings, 1 figure

    Journal ref: International Semantic Web Conference (ISWC), 2020

  17. arXiv:2010.01478  [pdf, other

    cs.AI cs.HC cs.LG

    Explanation Ontology in Action: A Clinical Use-Case

    Authors: Shruthi Chari, Oshani Seneviratne, Daniel M. Gruen, Morgan A. Foreman, Amar K. Das, Deborah L. McGuinness

    Abstract: We addressed the problem of a lack of semantic representation for user-centric explanations and different explanation types in our Explanation Ontology (https://purl.org/heals/eo). Such a representation is increasingly necessary as explainability has become an important problem in Artificial Intelligence with the emergence of complex methods and an uptake in high-precision and user-facing settings… ▽ More

    Submitted 3 October, 2020; originally announced October 2020.

    Comments: 5 pages, 2 figures, 1 protocol

    Journal ref: International Semantic Web Conference, Poster and Demo Track, 2020

  18. arXiv:2009.06310  [pdf

    cs.DM cs.SI

    Sparsity of weighted networks: measures and applications

    Authors: Swati Goswami, Asit K. Das, Subhas C. Nandy

    Abstract: A majority of real life networks are weighted and sparse. The present article aims at characterization of weighted networks based on sparsity, as a measure of inherent diversity, of different network parameters. It utilizes sparsity index defined on ordered degree sequence of simple networks and derives further properties of this index. The range of possible values of sparsity index of any connect… ▽ More

    Submitted 11 January, 2021; v1 submitted 14 September, 2020; originally announced September 2020.

    Comments: 24 pages, 6 figures

  19. arXiv:2004.13002  [pdf, other

    cs.CR cs.LG stat.ML

    A Black-box Adversarial Attack Strategy with Adjustable Sparsity and Generalizability for Deep Image Classifiers

    Authors: Arka Ghosh, Sankha Subhra Mullick, Shounak Datta, Swagatam Das, Rammohan Mallipeddi, Asit Kr. Das

    Abstract: Constructing adversarial perturbations for deep neural networks is an important direction of research. Crafting image-dependent adversarial perturbations using white-box feedback has hitherto been the norm for such adversarial attacks. However, black-box attacks are much more practical for real-world applications. Universal perturbations applicable across multiple images are gaining popularity due… ▽ More

    Submitted 9 September, 2021; v1 submitted 24 April, 2020; originally announced April 2020.

  20. arXiv:1907.04358  [pdf, other

    cs.LO q-bio.PE stat.ML

    Making Study Populations Visible through Knowledge Graphs

    Authors: Shruthi Chari, Miao Qi, Nkcheniyere N. Agu, Oshani Seneviratne, James P. McCusker, Kristin P. Bennett, Amar K. Das, Deborah L. McGuinness

    Abstract: Treatment recommendations within Clinical Practice Guidelines (CPGs) are largely based on findings from clinical trials and case studies, referred to here as research studies, that are often based on highly selective clinical populations, referred to here as study cohorts. When medical practitioners apply CPG recommendations, they need to understand how well their patient population matches the ch… ▽ More

    Submitted 9 July, 2019; originally announced July 2019.

    Comments: 16 pages, 4 figures, 1 table, accepted to the ISWC 2019 Resources Track (https://iswc2019.semanticweb.org/call-for-resources-track-papers/)

  21. arXiv:1905.01263  [pdf, other

    cs.IR

    A Personalized Subreddit Recommendation Engine

    Authors: Abhishek K Das, Nikhil Bhat, Sukanto Guha, Janvi Palan

    Abstract: This paper aims to improve upon the generic recommendations that Reddit provides for its users. We propose a novel personalized recommender system that learns from both, the presence and the content of user-subreddit interaction, using implicit and explicit signals to provide robust recommendations.

    Submitted 3 May, 2019; originally announced May 2019.

  22. arXiv:1612.07074  [pdf

    cs.DM cs.SI physics.soc-ph

    Sparsity Measure of a Network Graph: Gini Index

    Authors: Swati Goswami, C. A. Murthy, Asit K. Das

    Abstract: This article examines the application of a popular measure of sparsity, Gini Index, on network graphs. A wide variety of network graphs happen to be sparse. But the index with which sparsity is commonly measured in network graphs is edge density, reflecting the proportion of the sum of the degrees of all nodes in the graph compared to the total possible degrees in the corresponding fully connected… ▽ More

    Submitted 21 December, 2016; originally announced December 2016.

    Comments: 15 pages with 6 figures

    MSC Class: 68R10; 05C82 ACM Class: G.2.2; G.2.3

  23. arXiv:1605.04025  [pdf, other

    cs.CR

    FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Map**

    Authors: Hao Fu, Zizhan Zheng, Aveek K. Das, Parth H. Pathak, Pengfei Hu, Prasant Mohapatra

    Abstract: The exponential growth of mobile devices has raised concerns about sensitive data leakage. In this paper, we make the first attempt to identify suspicious location-related HTTP transmission flows from the user's perspective, by answering the question: Is the transmission user-intended? In contrast to previous network-level detection schemes that mainly rely on a given set of suspicious hostnames,… ▽ More

    Submitted 24 July, 2016; v1 submitted 12 May, 2016; originally announced May 2016.

  24. arXiv:1410.2988  [pdf, ps, other

    cs.DB

    An Algorithm for Mining High Utility Closed Itemsets and Generators

    Authors: Jayakrushna Sahoo, Ashok Kumar Das, A. Goswami

    Abstract: Traditional association rule mining based on the support-confidence framework provides the objective measure of the rules that are of interest to users. However, it does not reflect the utility of the rules. To extract non-redundant association rules in support-confidence framework frequent closed itemsets and their generators play an important role. To extract non-redundant association rules amon… ▽ More

    Submitted 11 October, 2014; originally announced October 2014.

  25. arXiv:1409.3920  [pdf

    cs.DL

    The 7 Habits of Highly Effective Research Communicators

    Authors: Anup Kumar Das

    Abstract: The emergence of Web 2.0 and simultaneously Library 2.0 platforms has helped the library and information professionals to outreach to new audiences beyond their physical boundaries. In a globalized society, information becomes very useful resource for socio-economic empowerment of marginalized communities, economic prosperity of common citizens, and knowledge enrichment of liberated minds. Scholar… ▽ More

    Submitted 13 September, 2014; originally announced September 2014.

    Comments: Book Chapter. In Gautam Maity et. al. (Eds.), Charaibeti: Golden Jubilee Commemorative Volume (pp. 356-365). Kolkata, India: Department of Library and Information Science, Jadavpur University, 2014. ISBN: 978-81-929886-0-3

  26. arXiv:1408.0090  [pdf

    cs.DL cs.IR

    Genesis of Altmetrics or Article-level Metrics for Measuring Efficacy of Scholarly Communications: Current Perspectives

    Authors: Anup Kumar Das, Sanjaya Mishra

    Abstract: The article-level metrics (ALMs) or altmetrics becomes a new trendsetter in recent times for measuring the impact of scientific publications and their social outreach to intended audiences. The popular social networks such as Facebook, Twitter, and Linkedin and social bookmarks such as Mendeley and CiteULike are nowadays widely used for communicating research to larger transnational audiences. In… ▽ More

    Submitted 10 December, 2014; v1 submitted 1 August, 2014; originally announced August 2014.

    Journal ref: Journal of Scientometric Research, 2014, 3(2), 82-92

  27. arXiv:1402.0648  [pdf, ps, other

    cs.IT

    Linear Network Coding for Multiple Groupcast Sessions: An Interference Alignment Approach

    Authors: Abhik Kumar Das, Siddhartha Banerjee, Sriram Vishwanath

    Abstract: We consider the problem of linear network coding over communication networks, representable by directed acyclic graphs, with multiple groupcast sessions: the network comprises of multiple destination nodes, each desiring messages from multiple sources. We adopt an interference alignment perspective, providing new insights into designing practical network coding schemes as well as the impact of net… ▽ More

    Submitted 4 February, 2014; originally announced February 2014.

    Comments: 5 pages, appeared in ITW 2013

  28. arXiv:1305.0868  [pdf, other

    cs.IT

    Precoding-Based Network Alignment For Three Unicast Sessions

    Authors: Chun Meng, Abhik Kumar Das, Abinesh Ramakrishnan, Syed Ali Jafar, Athina Markopoulou, Sriram Vishwanath

    Abstract: We consider the problem of network coding across three unicast sessions over a directed acyclic graph, where each sender and the receiver is connected to the network via a single edge of unit capacity. We consider a network model in which the middle of the network only performs random linear network coding, and restrict our approaches to precoding-based linear schemes, where the senders use precod… ▽ More

    Submitted 21 May, 2014; v1 submitted 3 May, 2013; originally announced May 2013.

    Comments: arXiv admin note: text overlap with arXiv:1202.3405

  29. arXiv:1303.3943  [pdf, other

    cs.IT

    On Finite Alphabet Compressive Sensing

    Authors: Abhik Kumar Das, Sriram Vishwanath

    Abstract: This paper considers the problem of compressive sensing over a finite alphabet, where the finite alphabet may be inherent to the nature of the data or a result of quantization. There are multiple examples of finite alphabet based static as well as time-series data with inherent sparse structure; and quantizing real values is an essential step while handling real data in practice. We show that ther… ▽ More

    Submitted 16 March, 2013; originally announced March 2013.

  30. arXiv:1206.3599  [pdf, other

    cs.SI cs.IT cs.NI physics.soc-ph

    Epidemic Spreading with External Agents

    Authors: Siddhartha Banerjee, Aditya Gopalan, Abhik Kumar Das, Sanjay Shakkottai

    Abstract: We study epidemic spreading processes in large networks, when the spread is assisted by a small number of external agents: infection sources with bounded spreading power, but whose movement is unrestricted vis-à-vis the underlying network topology. For networks which are `spatially constrained', we show that the spread of infection can be significantly speeded up even by a few such external agents… ▽ More

    Submitted 13 April, 2014; v1 submitted 15 June, 2012; originally announced June 2012.

  31. arXiv:1203.3170  [pdf

    cs.CV

    Single Reduct Generation Based on Relative Indiscernibility of Rough Set Theory

    Authors: Shampa Sengupta, Asit Kr. Das

    Abstract: In real world everything is an object which represents particular classes. Every object can be fully described by its attributes. Any real world dataset contains large number of attributes and objects. Classifiers give poor performance when these huge datasets are given as input to it for proper classification. So from these huge dataset most useful attributes need to be extracted that contribute… ▽ More

    Submitted 14 March, 2012; originally announced March 2012.

    Comments: 13 pages

  32. A New Energy Efficient Approach Towards WASN Routing with Modified QCS Protocol

    Authors: Debaditya Ghosh, Pritam Majumder, Ayan Kumar Das

    Abstract: In today's world Wireless Ad-hoc sensor network, consists of small sensor nodes having limited resources, has a great potential to solve problems in various domain including disaster management. In this paper "QCS-protocol" is modified which was introduced in our previous paper [1] and named as "Modified QCS-protocol". This is the backbone of our Intelligent Energy Efficient Ad-hoc Sensor Network.… ▽ More

    Submitted 8 October, 2011; originally announced October 2011.

    Comments: 18 pages, 14 figures

    Journal ref: International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.3, September 2011

  33. A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge

    Authors: Ashok Kumar Das

    Abstract: Establishment of pairwise keys between sensor nodes in a sensor network is a difficult problem due to resource limitations of sensor nodes as well as vulnerability to physical captures of sensor nodes by the enemy. Public-key cryptosystems are not much suited for most resource-constrained sensor networks. Recently, elliptic curve cryptographic techniques show that public key cryptosystem is also f… ▽ More

    Submitted 5 August, 2011; originally announced August 2011.

    Comments: Published in International Journal of Computer Networks & Communications (IJCNC) Vol.3, No.4, July 2011

  34. An Unconditionally Secure Key Management Scheme for Large-Scale Heterogeneous Wireless Sensor Networks

    Authors: Ashok Kumar Das

    Abstract: Key establishment in sensor networks becomes a challenging problem because of the resource limitations of the sensors and also due to vulnerability to physical capture of the sensor nodes. In this paper, we propose an unconditionally secure probabilistic group-based key pre-distribution scheme for a heterogeneous wireless sensor network. The proposed scheme always guarantees that no matter how man… ▽ More

    Submitted 24 March, 2011; originally announced March 2011.

    Comments: 10 pages, Published in Proceedings of First International Conference on COMmunication Systems and NETworkS (COMSNETS 2009), IEEE Computer Society Press, pp. 1 - 10, Bangalore, India, January 5-10, 2009

  35. arXiv:1103.4676  [pdf, ps, other

    cs.CR

    An Identity Based Key Management Scheme in Wireless Sensor Networks

    Authors: Ashok Kumar Das, Debasis Giri

    Abstract: Pairwise key establishment is one of the fundamental security services in sensor networks which enables sensor nodes in a sensor network to communicate securely with each other using cryptographic techniques. It is not feasible to apply traditional public key management techniques in resource-constrained sensor nodes, and also because the sensor nodes are vulnerable to physical capture. In this pa… ▽ More

    Submitted 24 March, 2011; originally announced March 2011.

    Comments: 7 pages, Published in Proceedings of 4th Asian International Mobile Computing Conference (AMOC 2006), Kolkata, India, pp. 70-76, January 4-7, 2006

  36. arXiv:1103.4496  [pdf, ps, other

    cs.CR

    An Improved Efficient Key Distribution Mechanism for Large-Scale Heterogeneous Mobile Sensor Networks

    Authors: Ashok Kumar Das

    Abstract: Due to resource constraints of the sensor nodes, traditional public key cryptographic techniques are not feasible in most sensor network architectures. Several symmetric key distribution mechanisms are proposed for establishing pairwise keys between sensor nodes in sensor networks, but most of them are not scalable and also are not much suited for mobile sensor networks because they incur much com… ▽ More

    Submitted 23 March, 2011; originally announced March 2011.

    Comments: 12 pages

    Journal ref: International Journal of Information Processing, Vol. 2, No. 3, pp. 21 - 32, 2008

  37. Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards

    Authors: Ashok Kumar Das

    Abstract: Recently, Li et al. proposed a secure biometric-based remote user authentication scheme using smart cards to withstand the security flaws of Li-Hwang's efficient biometric-based remote user authentication scheme using smart cards. Li et al.'s scheme is based on biometrics verification, smart card and one-way hash function, and it also uses the random nonce rather than a synchronized clock, and thu… ▽ More

    Submitted 16 March, 2011; originally announced March 2011.

    Comments: 16 pages

    Journal ref: International Journal of Network Security & Its Applications (IJNSA), Vol. 3, No. 2, 2011

  38. arXiv:1002.4002  [pdf

    cs.DS math.NA

    Multi-Objective Geometric Programming Problem Being Cost Coefficients as Continous Function with Weighted Mean Method

    Authors: A. K. Ojha, A. K. Das

    Abstract: Geometric programming problems occur frequently in engineering design and management. In multiobjective optimization, the trade-off information between different objective functions is probably the most important piece of information in a solution process to reach the most preferred solution. In this paper we have discussed the basic concepts and principles of multiple objective optimization pro… ▽ More

    Submitted 21 February, 2010; originally announced February 2010.

    Journal ref: Journal of Computing, Volume 2, Issue 2, February 2010, https://sites.google.com/site/journalofcomputing/