Skip to main content

Showing 1–8 of 8 results for author: Borgohain, R

Searching in archive cs. Search in all archives.
.
  1. Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment

    Authors: Tuhin Borgohain, Amardeep Borgohain, Rajdeep Borgohain, Sugata Sanyal

    Abstract: The purpose of this paper is to do a general survey on the existing communication modes inside a smart grid, the existing security loopholes and their countermeasures. Then we suggest a detailed countermeasure, building upon the Jigsaw based secure data transfer [8] for enhanced security of the data flow inside the communication system of a smart grid. The paper has been written without the consid… ▽ More

    Submitted 31 December, 2014; originally announced January 2015.

    Comments: 5 pages, 2 figures

  2. arXiv:1308.0824  [pdf

    cs.CR

    Secure Authentication of Cloud Data Mining API

    Authors: Rohit Bhadauria, Rajdeep Borgohain, Abirlal Biswas, Sugata Sanyal

    Abstract: Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. This has made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multi-fold benefits to the users moving to a cloud, while posing unknown security and privacy issues. User authentication is one such growing concern and is greatly needed in order to ensure priv… ▽ More

    Submitted 4 August, 2013; originally announced August 2013.

    Comments: 7 pages, 2 figures

  3. arXiv:1304.7728  [pdf

    cs.CL cs.CY

    Machine Translation Systems in India

    Authors: Sugata Sanyal, Rajdeep Borgohain

    Abstract: Machine Translation is the translation of one natural language into another using automated and computerized means. For a multilingual country like India, with the huge amount of information exchanged between various regions and in different languages in digitized format, it has become necessary to find an automated process from one language to another. In this paper, we take a look at the various… ▽ More

    Submitted 29 April, 2013; originally announced April 2013.

    Comments: 5 pages, 5 figures, 1 table

  4. arXiv:1207.2104  [pdf

    cs.CY cs.AI

    Rule Based Expert System for Diagnosis of Neuromuscular Disorders

    Authors: Rajdeep Borgohain, Sugata Sanyal

    Abstract: In this paper, we discuss the implementation of a rule based expert system for diagnosing neuromuscular diseases. The proposed system is implemented as a rule based expert system in JESS for the diagnosis of Cerebral Palsy, Multiple Sclerosis, Muscular Dystrophy and Parkinson's disease. In the system, the user is presented with a list of questionnaires about the symptoms of the patients based on w… ▽ More

    Submitted 9 July, 2012; originally announced July 2012.

    Comments: 5 pages, 1 figure

  5. arXiv:1207.0117  [pdf

    cs.AI

    Rule Based Expert System for Cerebral Palsy Diagnosis

    Authors: Rajdeep Borgohain, Sugata Sanyal

    Abstract: The use of Artificial Intelligence is finding prominence not only in core computer areas, but also in cross disciplinary areas including medical diagnosis. In this paper, we present a rule based Expert System used in diagnosis of Cerebral Palsy. The expert system takes user input and depending on the symptoms of the patient, diagnoses if the patient is suffering from Cerebral Palsy. The Expert Sys… ▽ More

    Submitted 30 June, 2012; originally announced July 2012.

    Comments: 4 pages, 1 figure, 1 table

  6. arXiv:1206.4155  [pdf

    cs.CR

    Data Hiding Techniques using number decompositions

    Authors: Rajdeep Borgohain

    Abstract: Data hiding is the art of embedding data into digital media in a way such that the existence of data remains concealed from everyone except the intended recipient. In this paper, we discuss the various Least Significant Bit (LSB) data hiding techniques. We first look at the classical LSB data hiding technique and the method to embed secret data into cover media by bit manipulation. We also take a… ▽ More

    Submitted 19 June, 2012; originally announced June 2012.

    Comments: 5 pages, 1 figure, 4 tables

  7. arXiv:1204.6416  [pdf

    cs.CR

    FuGeIDS: Fuzzy Genetic paradigms in Intrusion Detection Systems

    Authors: Rajdeep Borgohain

    Abstract: With the increase in the number of security threats, Intrusion Detection Systems have evolved as a significant countermeasure against these threats. And as such, the topic of Intrusion Detection Systems has become one of the most prominent research topics in recent years. This paper gives an overview of the Intrusion Detection System and looks at two major machine learning paradigms used in Intrus… ▽ More

    Submitted 28 April, 2012; originally announced April 2012.

    Comments: 7 pages, 2 figures, 1 table

  8. arXiv:1203.5960  [pdf

    cs.CR

    TSET: Token based Secure Electronic Transaction

    Authors: Rajdeep Borgohain, Moirangthem Tiken Singh, Chandrakant Sakharwade, Sugata Sanyal

    Abstract: Security and trust are the most important factors in online transaction, this paper introduces TSET a Token based Secure Electronic Transaction which is an improvement over the existing SET, Secure Electronic Transaction protocol. We take the concept of tokens in the TSET protocol to provide end to end security. It also provides trust evaluation mechanism so that trustworthiness of the merchants c… ▽ More

    Submitted 7 April, 2012; v1 submitted 27 March, 2012; originally announced March 2012.

    Comments: 7 pages, 3 figures, 2 tables