Skip to main content

Showing 1–17 of 17 results for author: Sahoo, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:1407.5385  [pdf

    cs.NI

    Nontransitive Ranking to Enhance Routing Decision in MANETS

    Authors: Md. Amir Khusru Akhtar, Arshad Usmani, G. Sahoo

    Abstract: An ad hoc network is an infrastructureless network in which nodes perform terminal as well as routing functions. A routing protocol is the only substitute to complete the communications in the absence of an access point. In spite of that mobile nodes or so called routers uses some mechanism for calculating the best route when it has multiple routes for the same destination. On the basis of one or… ▽ More

    Submitted 21 July, 2014; originally announced July 2014.

    Comments: 7 Pages, IJCEA 2014

  2. arXiv:1404.2772  [pdf

    cs.DC cs.CR cs.LG

    A New Clustering Approach for Anomaly Intrusion Detection

    Authors: Ravi Ranjan, G. Sahoo

    Abstract: Recent advances in technology have made our work easier compare to earlier times. Computer network is growing day by day but while discussing about the security of computers and networks it has always been a major concerns for organizations varying from smaller to larger enterprises. It is true that organizations are aware of the possible threats and attacks so they always prepare for the safer si… ▽ More

    Submitted 10 April, 2014; originally announced April 2014.

    Comments: 10 pages with 3 figures,2 Tables This paper explains about clustering methodology used in Data Mining field for Intrusion Detection in the area of Network Security

    Journal ref: International Journal of Data Mining & Knowledge Management Process (IJDKP),ISSN:2230-9608[Online],2231-007X[Print] Vol.4, No.2, March 2014, page(s): 29-38

  3. Cloud Computing Simulation Using CloudSim

    Authors: Ranjan Kumar, G. Sahoo

    Abstract: As we know that Cloud Computing is a new paradigm in IT. It has many advantages and disadvantages. But in future it will spread in the whole world. Many researches are going on for securing the cloud services. Simulation is the act of imitating or pretending. It is a situation in which a particular set of condition is created artificially in order to study that could exit in reality. We need only… ▽ More

    Submitted 21 February, 2014; originally announced March 2014.

    Comments: 5 pages, 2 figures,"Published with International Journal of Engineering Trends and Technology (IJETT)". http://www.ijettjournal.org. published by seventh sense research group

    Journal ref: International Journal of Engineering Trends and Technology(IJETT), 8(2),82-86 February 2014. ISSN:2231-5381

  4. Humanistic approach in mobile ad hoc network: HAMANET

    Authors: Md. Amir Khusru Akhtar, G. Sahoo

    Abstract: Human society is a complex and most organized networks, in which many communities have different cultural livelihood. The creation/formation of one or more communities within a society and the way of associations can be mapped to MANET. By involving human characteristics and behavior, surely it would pave a new way, for further development. In this paper we have presented a new approach called "HA… ▽ More

    Submitted 30 December, 2013; originally announced December 2013.

    Comments: 16 pages, 6 figures, 8 tables. arXiv admin note: substantial text overlap with arXiv:1311.3172

    Journal ref: Third International Conference on Computer Science & Information Technology (CCSIT 2013), Bangalore, India. CS & IT - CSCP, Vol. 3, No. 6, pp. 1-12, Feb 2013

  5. arXiv:1312.2074  [pdf

    cs.DC cs.CY eess.SY

    Load Balancing using Ant Colony in Cloud Computing

    Authors: Ranjan Kumar, G. Sahoo

    Abstract: Ants are very small insects.They are capable to find food even they are complete blind. The ants lives in their nest and their job is to search food while they get hungry. We are not interested in their living style, such as how they live, how they sleep. But we are interested in how they search for food, and how they find the shortest path. The technique for finding the shortest path are now appl… ▽ More

    Submitted 7 December, 2013; originally announced December 2013.

    Comments: 5 pages, 1 figure, 1 table

    Journal ref: International Journal of Information Technology Convergence and Services (IJITCS) Vol.3, No.5, Pp- 01-05, October 2013

  6. Subsiding routing misbehavior in MANET using "Mirror Model"

    Authors: Md. Amir Khusru Akhtar, G. Sahoo

    Abstract: Noncooperation or failure to work together is a big challenge that surely degrades the performance and reliability of Mobile Adhoc Networks. In MANETs, nodes have dual responsibilities of forwarding and routing, that's why it needs unison with nodes. To sort out non-cooperation a real life behavior should be implemented, so that misbehavior is nullified. In this paper, we present the "Mirror Model… ▽ More

    Submitted 14 November, 2013; originally announced November 2013.

    Comments: 15 pages, 4 figures, 3 tables. arXiv admin note: substantial text overlap with arXiv:1309.2208

    Journal ref: Fifth International Conference on Wireless & Mobile Networks (WimoN 2013) Turkey, CS & IT - CSCP, Vol. 3, No. 7, pp. 1-15, Jun 2013

  7. The principles of humanism for MANETs

    Authors: Md. Amir Khusru Akhtar, G. Sahoo

    Abstract: The proposed humanistic approach mapped the human character and behavior into a device to evade the bondages of implementation and surely succeed as we live. Human societies are the complex and most organized networks, in which many communities having different cultural livelihood. The formation of communities within a society and the way of associations can be mapped to MANET. In this work we hav… ▽ More

    Submitted 13 November, 2013; originally announced November 2013.

    Comments: 14 pages, 7 figures, 10 tables

    Journal ref: International Journal of Computer Science and Information Technology (IJCSIT), Vol. 5, No. 5, pp. 147-160, Oct 2013

  8. Securing Software as a Service Model of Cloud Computing: Issues and Solutions

    Authors: Rashmi Rai, G. Sahoo, S. Mehfuz

    Abstract: Cloud computing, undoubtedly, has become the buzzword in the IT industry today. Looking at the potential impact it has on numerous business applications as well as in our everyday life, it can certainly be said that this disruptive technology is here to stay. Many of the features that make cloud computing attractive, have not just challenged the existing security system, but have also revealed new… ▽ More

    Submitted 10 September, 2013; originally announced September 2013.

    Journal ref: International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol.3, No.4, August 2013

  9. A Novel Methodology to Overcome Routing Misbehavior in MANET using Retaliation Model

    Authors: Md. Amir Khusru Akhtar, G. Sahoo

    Abstract: MANET is a cooperative network in which nodes are responsible for forwarding as well as routing. Noncooperation is still a big challenge that certainly degrades the performance and reliability of a MANET. This paper presents a novel methodology to overcome routing misbehavior in MANET using Retaliation Model. In this model node misbehavior is watched and an equivalent misbehavior is given in retur… ▽ More

    Submitted 9 September, 2013; originally announced September 2013.

    Comments: 16 pages, 6 figures, 3 tables

    Journal ref: International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 2013

  10. arXiv:1307.6649  [pdf

    cs.DC cs.CR

    Towards Securing APIs in Cloud Computing

    Authors: Kumar Gunjan, R. K. Tiwari, G. Sahoo

    Abstract: Every organisation today wants to adopt cloud computing paradigm and leverage its various advantages. Today everyone is aware of its characteristics which have made it so popular and how it can help the organisations focus on their core activities leaving all IT services development and maintenance to the cloud service providers. Application Programming Interfaces (APIs) act as the interface betwe… ▽ More

    Submitted 25 July, 2013; originally announced July 2013.

    Comments: International Journal of Computer Engineering and Applications, June 2013. arXiv admin note: text overlap with arXiv:0901.0131 by other authors

  11. arXiv:1211.0377  [pdf

    cs.CR cs.MM

    Some New Methodologies for Image Hiding using Steganographic Techniques

    Authors: Rajesh Kumar Tiwari, Gadadhar Sahoo

    Abstract: Security and memory management are the major demands for electronics devices like ipods, cell phones, pmps, iphones and digital cameras. In this paper, we have suggested a high level of security mechanism by considering the concept of steganography along with the principle of cryptography. Four different methods that can save a considerable amount of memory space have been discussed. Based on thes… ▽ More

    Submitted 2 November, 2012; originally announced November 2012.

  12. An Unmanned Aerial Vehicle as Human-Assistant Robotics System

    Authors: Tejbanta Singh Chingtham, G. Sahoo, M. K. Ghose

    Abstract: According to the American Heritage Dictionary [1],Robotics is the science or study of the technology associated with the design, fabrication, theory, and application of Robots. The term Hoverbot is also often used to refer to sophisticated mechanical devices that are remotely controlled by human beings even though these devices are not autonomous. This paper describes a remotely controlled hoverbo… ▽ More

    Submitted 19 April, 2011; originally announced April 2011.

    Journal ref: 2010 IEEE International Conference on Computational Intelligence and Computing Research

  13. arXiv:1103.2091  [pdf

    cs.AI

    An Artificial Immune System Model for Multi-Agents Resource Sharing in Distributed Environments

    Authors: Tejbanta Singh Chingtham, G. Sahoo, M. K. Ghose

    Abstract: Natural Immune system plays a vital role in the survival of the all living being. It provides a mechanism to defend itself from external predates making it consistent systems, capable of adapting itself for survival incase of changes. The human immune system has motivated scientists and engineers for finding powerful information processing algorithms that has solved complex engineering tasks. This… ▽ More

    Submitted 24 February, 2011; originally announced March 2011.

    Journal ref: International Journal on Computer Science and Engineering (IJCSE), Vol. 02, No. 05, 2010, pp 1813-1818

  14. arXiv:1103.0829  [pdf

    cs.MM cs.CR

    Hiding Secret Information in Movie Clip: A Steganographic Approach

    Authors: G. Sahoo, Rajesh Kumar Tiwari

    Abstract: Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the internet. One of the key methods for establishing hidden communication is steganography. Modern day steganography mainly deals with hiding information within files like image, text, html, binary files etc. These file contains small irrelevant informatio… ▽ More

    Submitted 4 March, 2011; originally announced March 2011.

    Comments: Steganography, Frame, Stego-Frame, Stego-key, and Carrier

    ACM Class: F.2.2; I.2.7

    Journal ref: International Journal of Computing and Applications, Vol. 4, No. 1, June 2009, pp. 87-94

  15. arXiv:1102.3971  [pdf

    cs.CR cs.ET

    Artificial Immune Privileged Sites as an Enhancement to Immuno-Computing Paradigm

    Authors: Tejbanta Singh Chingtham, G. Sahoo, M. K. Ghose

    Abstract: The immune system is a highly parallel and distributed intelligent system which has learning, memory, and associative capabilities. Artificial Immune System is an evolutionary paradigm inspired by the biological aspects of the immune system of mammals. The immune system can inspire to form new algorithms learning from its course of action. The human immune system has motivated scientists and engin… ▽ More

    Submitted 19 February, 2011; originally announced February 2011.

    Comments: Accepted for publication in International Journal of Intelligent Information Technology Application (IJIITA)

  16. arXiv:1006.2813  [pdf

    cs.CE q-bio.BM

    Algorithm for Predicting Protein Secondary Structure

    Authors: K. K Senapati, G. Sahoo, D. Bhaumik

    Abstract: Predicting protein structure from amino acid sequence is one of the most important unsolved problems of molecular biology and biophysics.Not only would a successful prediction algorithm be a tremendous advance in the understanding of the biochemical mechanisms of proteins, but, since such an algorithm could conceivably be used to design proteins to carry out specific functions.Prediction of the se… ▽ More

    Submitted 14 June, 2010; originally announced June 2010.

    Comments: Submitted to Journal of Computer Science and Engineering, see http://sites.google.com/site/jcseuk/volume-1-issue-1-may-2010

    Journal ref: Journal of Computer Science and Engineering, Volume 1, Issue 1, p68-71, May 2010

  17. arXiv:1002.2412  [pdf

    q-bio.QM cs.CE

    A Probabilistic Model For Sequence Analysis

    Authors: Amrita Priyam, B. M. Karan, G. Sahoo

    Abstract: This paper presents a probabilistic approach for DNA sequence analysis. A DNA sequence consists of an arrangement of the four nucleotides A, C, T and G and different representation schemes are presented according to a probability measure associated with them. There are different ways that probability can be associated with the DNA sequence: one way is when the probability of an occurrence of a l… ▽ More

    Submitted 11 February, 2010; originally announced February 2010.

    Comments: IEEE format, International Journal of Computer Science and Information Security, IJCSIS January 2010, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Journal of Computer Science, ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 244-247, January 2010, USA