oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2018 ( 2 )

2017 ( 3 )

2016 ( 1 )

2015 ( 15 )

Custom range...

Search Results: 1 - 10 of 111 matches for " Rajdeep Borgohain "
All listed articles are free for downloading (OA Articles)
Page 1 /111
Display every page Item
Data Hiding Techniques using number decompositions
Rajdeep Borgohain
Computer Science , 2012,
Abstract: Data hiding is the art of embedding data into digital media in a way such that the existence of data remains concealed from everyone except the intended recipient. In this paper, we discuss the various Least Significant Bit (LSB) data hiding techniques. We first look at the classical LSB data hiding technique and the method to embed secret data into cover media by bit manipulation. We also take a look at the data hiding technique by bit plane decomposition based on Fibonacci numbers. This method generates more bit planes which allows users to embed more data into the cover image without causing significant distortion. We also discuss the data hiding technique based on bit plane decomposition by prime numbers and natural numbers. These methods are based on mapping the sequence of image bit size to the decomposed bit number to hide the intended information. Finally we present a comparative analysis of these data hiding techniques.
FuGeIDS: Fuzzy Genetic paradigms in Intrusion Detection Systems
Rajdeep Borgohain
Computer Science , 2012,
Abstract: With the increase in the number of security threats, Intrusion Detection Systems have evolved as a significant countermeasure against these threats. And as such, the topic of Intrusion Detection Systems has become one of the most prominent research topics in recent years. This paper gives an overview of the Intrusion Detection System and looks at two major machine learning paradigms used in Intrusion Detection System, Genetic Algorithms and Fuzzy Logic and how to apply them for intrusion detection.
Rule Based Expert System for Cerebral Palsy Diagnosis
Rajdeep Borgohain,Sugata Sanyal
Computer Science , 2012,
Abstract: The use of Artificial Intelligence is finding prominence not only in core computer areas, but also in cross disciplinary areas including medical diagnosis. In this paper, we present a rule based Expert System used in diagnosis of Cerebral Palsy. The expert system takes user input and depending on the symptoms of the patient, diagnoses if the patient is suffering from Cerebral Palsy. The Expert System also classifies the Cerebral Palsy as mild, moderate or severe based on the presented symptoms.
Machine Translation Systems in India
Sugata Sanyal,Rajdeep Borgohain
Computer Science , 2013,
Abstract: Machine Translation is the translation of one natural language into another using automated and computerized means. For a multilingual country like India, with the huge amount of information exchanged between various regions and in different languages in digitized format, it has become necessary to find an automated process from one language to another. In this paper, we take a look at the various Machine Translation System in India which is specifically built for the purpose of translation between the Indian languages. We discuss the various approaches taken for building the machine translation system and then discuss some of the Machine Translation Systems in India along with their features.
Rule Based Expert System for Diagnosis of Neuromuscular Disorders
Rajdeep Borgohain,Sugata Sanyal
Computer Science , 2012,
Abstract: In this paper, we discuss the implementation of a rule based expert system for diagnosing neuromuscular diseases. The proposed system is implemented as a rule based expert system in JESS for the diagnosis of Cerebral Palsy, Multiple Sclerosis, Muscular Dystrophy and Parkinson's disease. In the system, the user is presented with a list of questionnaires about the symptoms of the patients based on which the disease of the patient is diagnosed and possible treatment is suggested. The system can aid and support the patients suffering from neuromuscular diseases to get an idea of their disease and possible treatment for the disease.
Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment
Tuhin Borgohain,Amardeep Borgohain,Rajdeep Borgohain,Sugata Sanyal
Computer Science , 2014, DOI: 10.5120/19528-1165
Abstract: The purpose of this paper is to do a general survey on the existing communication modes inside a smart grid, the existing security loopholes and their countermeasures. Then we suggest a detailed countermeasure, building upon the Jigsaw based secure data transfer [8] for enhanced security of the data flow inside the communication system of a smart grid. The paper has been written without the consideration of any factor of inoperability between the various security techniques inside a smart grid
TSET: Token based Secure Electronic Transaction
Rajdeep Borgohain,Moirangthem Tiken Singh,Chandrakant Sakharwade,Sugata Sanyal
Computer Science , 2012,
Abstract: Security and trust are the most important factors in online transaction, this paper introduces TSET a Token based Secure Electronic Transaction which is an improvement over the existing SET, Secure Electronic Transaction protocol. We take the concept of tokens in the TSET protocol to provide end to end security. It also provides trust evaluation mechanism so that trustworthiness of the merchants can be known by customers before being involved in the transaction. Moreover, we also propose a grading mechanism so that quality of service in the transactions improves.
Secure Authentication of Cloud Data Mining API
Rohit Bhadauria,Rajdeep Borgohain,Abirlal Biswas,Sugata Sanyal
Computer Science , 2013,
Abstract: Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. This has made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multi-fold benefits to the users moving to a cloud, while posing unknown security and privacy issues. User authentication is one such growing concern and is greatly needed in order to ensure privacy and security in a cloud computing environment. This paper discusses the security at different levels viz. network, application and virtualization, in a cloud computing environment. A security framework based on one-time pass key mechanism has been proposed. The uniqueness of the proposed security protocol lies in the fact, that it provides security to both the service providers as well the users in a highly conflicting cloud environment.
How Indian CPI and Industrial Production Respond to Global Oil Price Shocks? Regime-Dependent Impulse Responses  [PDF]
Amanjot Singh, Rajdeep Singh
Theoretical Economics Letters (TEL) , 2017, DOI: 10.4236/tel.2017.75102
Abstract: For emerging markets like India, where around 80 percent of the crude requirements are met through imports, it is an imperative task to comprehend impact of global crude oil price shocks on Indian macroeconomic variables. The present study attempts to understand these asymmetric dynamic interactions between global crude oil price shocks and Indian macroeconomic variables by employing Markov switching-Vector Autoregressive (MS-VAR) regime-dependent impulse responses in level forms. The findings hold an important place in the wake of inflation targeting regime adopted by the monetary policy authorities. The findings highlight the existence of two regimes, namely lower and higher oil price variance regimes. The response of industrial production and consumer prices is different towards oil price shocks in different regimes. In the lower oil variance regime, there is negative (positive) relationship observed between crude oil shocks and industrial production (consumer prices). On the other hand, there is a positive equilibrium shift in the industrial production in the higher oil variance regime with cost pushing inflationary pressures in the long run. The findings bear strong implication for the policy makers in their attempt to combat effects of crude oil shocks. As per the findings, the emerging market policy makers should display a cautious approach during higher oil price volatile phases in order to support industrial production and consumer demand.
Erratum to “How Indian CPI and Industrial Production Respond to Global Oil Price Shocks? Regime-Dependent Impulse Responses” [Theoretical Economics Letters 7 (2017) 1511-1531]  [PDF]
Amanjot Singh, Rajdeep Singh
Theoretical Economics Letters (TEL) , 2017, DOI: 10.4236/tel.2017.77148
Abstract: The original online version of this article (Singh, A. and Singh, R. (2017) How Indian CPI and Industrial Production Respond to Global Oil Price Shocks? Regime-Dependent Impulse Responses. Theoretical Economics Letters, 7, 1511-1531. https://doi.org/10.4236/tel.2017.75102) was published without referring the source of Figure 1.
Page 1 /111
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.