oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 75 )

2018 ( 83 )

2017 ( 83 )

2016 ( 74 )

Custom range...

Search Results: 1 - 10 of 23811 matches for " Goutam Paul "
All listed articles are free for downloading (OA Articles)
Page 1 /23811
Display every page Item
Task-Scheduling in Cloud Computing using Credit Based Assignment Problem
Mousumi Paul,Goutam Sanyal
International Journal on Computer Science and Engineering , 2011,
Abstract: This Cloud computing is a latest new computing paradigm where applications, data and IT services are provided across dynamic and geographically dispersed organization. Job scheduling systemproblem is a nucleus and demanding issue in Cloud Computing. How to utilize Cloud computing resources proficiently and gain the maximum profits with job scheduling system is one of the Cloud computing service providers’ ultimate objectives. In this paper we have used credit based scheduling decision to evaluate the entire group of task in the task queue and find the minimal completion time of alltask. Here cost matrix has been generated as the fair tendency of a task to be assigned in a resource.
Image Sterilization to Prevent LSB-based Steganographic Transmission
Goutam Paul,Imon Mukherjee
Computer Science , 2010,
Abstract: Sterilization is a very popular word used in biomedical testing (like removal of all microorganisms on surface of an article or in fluid using appropriate chemical products). Motivated by this biological analogy, we, for the first time, introduce the concept of sterilization of an image, i.e., removing any steganographic information embedded in the image. Experimental results show that our technique succeeded in sterilizing around 76% to 91% of stego pixels in an image on average, where data is embedded using LSB-based steganography.
Eavesdropping in Semiquantum Key Distribution Protocol
Arpita Maitra,Goutam Paul
Computer Science , 2012, DOI: 10.1016/j.ipl.2013.03.008
Abstract: In semiquantum key-distribution (Boyer et al.) Alice has the same capability as in BB84 protocol, but Bob can measure and prepare qubits only in $\{|0\rangle, |1\rangle\}$ basis and reflect any other qubit. We study an eavesdropping strategy on this scheme that listens to the channel in both the directions. With the same level of disturbance induced in the channel, Eve can extract more information using our two-way strategy than what can be obtained by the direct application of one-way eavesdropping in BB84.
A Resilient Quantum Secret Sharing Scheme
Arpita Maitra,Goutam Paul
Computer Science , 2015, DOI: 10.1007/s10773-014-2233-3
Abstract: A resilient secret sharing scheme is supposed to generate the secret correctly even after some shares are damaged. In this paper, we show how quantum error correcting codes can be exploited to design a resilient quantum secret sharing scheme, where a quantum state is shared among more than one parties.
Quantum Information splitting using a pair of GHZ states
Kaushik Nandi,Goutam Paul
Computer Science , 2015,
Abstract: We describe a protocol for quantum information splitting (QIS) of a restricted class of three-qubit states among three parties Alice, Bob and Charlie, using a pair of GHZ states as the quantum channel. There are two different forms of this three-qubit state that is used for QIS depending on the distribution of the particles among the three parties. There is also a special type of four-qubit state that can be used for QIS using the above channel. We explicitly construct the quantum channel, Alice's measurement basis and the analytic form of the unitary operations required by the receiver for such a purpose.
Revisiting Fermat's Factorization for the RSA Modulus
Sounak Gupta,Goutam Paul
Computer Science , 2009,
Abstract: We revisit Fermat's factorization method for a positive integer $n$ that is a product of two primes $p$ and $q$. Such an integer is used as the modulus for both encryption and decryption operations of an RSA cryptosystem. The security of RSA relies on the hardness of factoring this modulus. As a consequence of our analysis, two variants of Fermat's approach emerge. We also present a comparison between the two methods' effective regions. Though our study does not yield a new state-of-the-art algorithm for integer factorization, we believe that it reveals some interesting observations that are open for further analysis.
Dynamic job Scheduling in Cloud Computing based on horizontal load balancing
Mousumi Paul,Debabrata Samanta,Goutam Sanyal
International Journal of Computer Technology and Applications , 2011,
Abstract: Cloud computing is a latest new computing paradigm where applications, data and IT services are provided across dynamic and geographically dispersed organization. How to improve the global throughput and utilize Cloud computing resources proficiently and gain the maximum profits with job scheduling system is one of the Cloud computing service providers’ ultimate objectives. The motivation of this paper is to establish a scheduling mechanism which follows the Lexi –search approach to find an optimal feasible assignment. Task scheduling has been treated as general assignment problem to find the minimalcost. Here cost matrix is generated from a probabilistic factor based on some most vital condition of efficient task scheduling such as task arrival, task waiting time and the most important task processing time in a resource. The cost for assigning a task into a resource is probabilistic result considering the above criteria.
Segmentation Technique of SAR Imagery using Entropy
Debabrata Samanta,Mousumi Paul,,Goutam Sanyal
International Journal of Computer Technology and Applications , 2011,
Abstract: SAR Image Segmentation plays an important role in image of SAR plays an important role in image analysis and computer vision .The good performance of recognition algorithms depend on the quality of segmented image. An importantproblem in SAR image application is correct segmentation.It is the basis of the understanding of SAR images,such as the chnge detection of regions for maps updating and classify the land, forest, hills, oceans etc. The ability of SAR image is to penetrate cloud cover to predict the weather condition at any particular instant of time.This paper presents a novel algorithm for SAR images segmentation based on entropy based and RGB color intensity together. Since entropy is a statistical measure of randomness that can be used to characterize the texture of the input image.
Some Conjectures on the Number of Primes in Certain Intervals
Adway Mitra,Goutam Paul,Ushnish Sarkar
Mathematics , 2009,
Abstract: In this paper, we make some conjectures on prime numbers that are sharper than those found in the current literature. First we describe our studies on Legendre's Conjecture which is still unsolved. Next, we show that Brocard's Conjecture can be proved assuming our improved version of Legendre's Conjecture. Finally, we sharpen the Bertrand's Postulate for prime numbers. Our results are backed by extensive empirical investigation.
On Necessary and Sufficient Number of Cops in the Game of Cops and Robber in Multidimensional Grids
Sayan Bhattacharya,Goutam Paul,Swagato Sanyal
Computer Science , 2009, DOI: 10.1016/j.dam.2010.06.014
Abstract: We theoretically analyze the Cops and Robber Game for the first time in a multidimensional grid. It is shown that for an $n$-dimensional grid, at least $n$ cops are necessary to ensure capture of the robber. We also present a set of cop strategies for which $n$ cops are provably sufficient to catch the robber. Further, for two-dimensional grid, we provide an efficient cop strategy for which the robber is caught even by a single cop under certain conditions.
Page 1 /23811
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.