-
Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment
Authors:
Tuhin Borgohain,
Amardeep Borgohain,
Rajdeep Borgohain,
Sugata Sanyal
Abstract:
The purpose of this paper is to do a general survey on the existing communication modes inside a smart grid, the existing security loopholes and their countermeasures. Then we suggest a detailed countermeasure, building upon the Jigsaw based secure data transfer [8] for enhanced security of the data flow inside the communication system of a smart grid. The paper has been written without the consid…
▽ More
The purpose of this paper is to do a general survey on the existing communication modes inside a smart grid, the existing security loopholes and their countermeasures. Then we suggest a detailed countermeasure, building upon the Jigsaw based secure data transfer [8] for enhanced security of the data flow inside the communication system of a smart grid. The paper has been written without the consideration of any factor of inoperability between the various security techniques inside a smart grid
△ Less
Submitted 31 December, 2014;
originally announced January 2015.
-
Secure Authentication of Cloud Data Mining API
Authors:
Rohit Bhadauria,
Rajdeep Borgohain,
Abirlal Biswas,
Sugata Sanyal
Abstract:
Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. This has made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multi-fold benefits to the users moving to a cloud, while posing unknown security and privacy issues. User authentication is one such growing concern and is greatly needed in order to ensure priv…
▽ More
Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. This has made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multi-fold benefits to the users moving to a cloud, while posing unknown security and privacy issues. User authentication is one such growing concern and is greatly needed in order to ensure privacy and security in a cloud computing environment. This paper discusses the security at different levels viz. network, application and virtualization, in a cloud computing environment. A security framework based on one-time pass key mechanism has been proposed. The uniqueness of the proposed security protocol lies in the fact, that it provides security to both the service providers as well the users in a highly conflicting cloud environment.
△ Less
Submitted 4 August, 2013;
originally announced August 2013.
-
Machine Translation Systems in India
Authors:
Sugata Sanyal,
Rajdeep Borgohain
Abstract:
Machine Translation is the translation of one natural language into another using automated and computerized means. For a multilingual country like India, with the huge amount of information exchanged between various regions and in different languages in digitized format, it has become necessary to find an automated process from one language to another. In this paper, we take a look at the various…
▽ More
Machine Translation is the translation of one natural language into another using automated and computerized means. For a multilingual country like India, with the huge amount of information exchanged between various regions and in different languages in digitized format, it has become necessary to find an automated process from one language to another. In this paper, we take a look at the various Machine Translation System in India which is specifically built for the purpose of translation between the Indian languages. We discuss the various approaches taken for building the machine translation system and then discuss some of the Machine Translation Systems in India along with their features.
△ Less
Submitted 29 April, 2013;
originally announced April 2013.
-
Rule Based Expert System for Diagnosis of Neuromuscular Disorders
Authors:
Rajdeep Borgohain,
Sugata Sanyal
Abstract:
In this paper, we discuss the implementation of a rule based expert system for diagnosing neuromuscular diseases. The proposed system is implemented as a rule based expert system in JESS for the diagnosis of Cerebral Palsy, Multiple Sclerosis, Muscular Dystrophy and Parkinson's disease. In the system, the user is presented with a list of questionnaires about the symptoms of the patients based on w…
▽ More
In this paper, we discuss the implementation of a rule based expert system for diagnosing neuromuscular diseases. The proposed system is implemented as a rule based expert system in JESS for the diagnosis of Cerebral Palsy, Multiple Sclerosis, Muscular Dystrophy and Parkinson's disease. In the system, the user is presented with a list of questionnaires about the symptoms of the patients based on which the disease of the patient is diagnosed and possible treatment is suggested. The system can aid and support the patients suffering from neuromuscular diseases to get an idea of their disease and possible treatment for the disease.
△ Less
Submitted 9 July, 2012;
originally announced July 2012.
-
Rule Based Expert System for Cerebral Palsy Diagnosis
Authors:
Rajdeep Borgohain,
Sugata Sanyal
Abstract:
The use of Artificial Intelligence is finding prominence not only in core computer areas, but also in cross disciplinary areas including medical diagnosis. In this paper, we present a rule based Expert System used in diagnosis of Cerebral Palsy. The expert system takes user input and depending on the symptoms of the patient, diagnoses if the patient is suffering from Cerebral Palsy. The Expert Sys…
▽ More
The use of Artificial Intelligence is finding prominence not only in core computer areas, but also in cross disciplinary areas including medical diagnosis. In this paper, we present a rule based Expert System used in diagnosis of Cerebral Palsy. The expert system takes user input and depending on the symptoms of the patient, diagnoses if the patient is suffering from Cerebral Palsy. The Expert System also classifies the Cerebral Palsy as mild, moderate or severe based on the presented symptoms.
△ Less
Submitted 30 June, 2012;
originally announced July 2012.
-
Data Hiding Techniques using number decompositions
Authors:
Rajdeep Borgohain
Abstract:
Data hiding is the art of embedding data into digital media in a way such that the existence of data remains concealed from everyone except the intended recipient. In this paper, we discuss the various Least Significant Bit (LSB) data hiding techniques. We first look at the classical LSB data hiding technique and the method to embed secret data into cover media by bit manipulation. We also take a…
▽ More
Data hiding is the art of embedding data into digital media in a way such that the existence of data remains concealed from everyone except the intended recipient. In this paper, we discuss the various Least Significant Bit (LSB) data hiding techniques. We first look at the classical LSB data hiding technique and the method to embed secret data into cover media by bit manipulation. We also take a look at the data hiding technique by bit plane decomposition based on Fibonacci numbers. This method generates more bit planes which allows users to embed more data into the cover image without causing significant distortion. We also discuss the data hiding technique based on bit plane decomposition by prime numbers and natural numbers. These methods are based on mapping the sequence of image bit size to the decomposed bit number to hide the intended information. Finally we present a comparative analysis of these data hiding techniques.
△ Less
Submitted 19 June, 2012;
originally announced June 2012.
-
FuGeIDS: Fuzzy Genetic paradigms in Intrusion Detection Systems
Authors:
Rajdeep Borgohain
Abstract:
With the increase in the number of security threats, Intrusion Detection Systems have evolved as a significant countermeasure against these threats. And as such, the topic of Intrusion Detection Systems has become one of the most prominent research topics in recent years. This paper gives an overview of the Intrusion Detection System and looks at two major machine learning paradigms used in Intrus…
▽ More
With the increase in the number of security threats, Intrusion Detection Systems have evolved as a significant countermeasure against these threats. And as such, the topic of Intrusion Detection Systems has become one of the most prominent research topics in recent years. This paper gives an overview of the Intrusion Detection System and looks at two major machine learning paradigms used in Intrusion Detection System, Genetic Algorithms and Fuzzy Logic and how to apply them for intrusion detection.
△ Less
Submitted 28 April, 2012;
originally announced April 2012.
-
TSET: Token based Secure Electronic Transaction
Authors:
Rajdeep Borgohain,
Moirangthem Tiken Singh,
Chandrakant Sakharwade,
Sugata Sanyal
Abstract:
Security and trust are the most important factors in online transaction, this paper introduces TSET a Token based Secure Electronic Transaction which is an improvement over the existing SET, Secure Electronic Transaction protocol. We take the concept of tokens in the TSET protocol to provide end to end security. It also provides trust evaluation mechanism so that trustworthiness of the merchants c…
▽ More
Security and trust are the most important factors in online transaction, this paper introduces TSET a Token based Secure Electronic Transaction which is an improvement over the existing SET, Secure Electronic Transaction protocol. We take the concept of tokens in the TSET protocol to provide end to end security. It also provides trust evaluation mechanism so that trustworthiness of the merchants can be known by customers before being involved in the transaction. Moreover, we also propose a grading mechanism so that quality of service in the transactions improves.
△ Less
Submitted 7 April, 2012; v1 submitted 27 March, 2012;
originally announced March 2012.