scispace - formally typeset
Search or ask a question
Author

D. P. Acharjya

Bio: D. P. Acharjya is an academic researcher from VIT University. The author has contributed to research in topics: Rough set & Set (abstract data type). The author has an hindex of 13, co-authored 40 publications receiving 567 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The basic objective of this paper is to explore the potential impact of big data challenges, open research issues, and various tools associated with it and provide a platform to explore big data at numerous stages.
Abstract: A huge repository of terabytes of data is generated each day from modern information systems and digital technolo-gies such as Internet of Things and cloud computing. Analysis of these massive data requires a lot of efforts at multiple levels to extract knowledge for decision making. Therefore, big data analysis is a current area of research and development. The basic objective of this paper is to explore the potential impact of big data challenges, open research issues, and various tools associated with it. As a result, this article provides a platform to explore big data at numerous stages. Additionally, it opens a new horizon for researchers to develop the solution, based on the challenges and open research issues.

168 citations

Journal ArticleDOI
TL;DR: Authors survey on various segmentation and feature extraction methods in medicinal images used for preprocessing in order to find the inner or outer construction of mortal body.

82 citations

Posted Content
TL;DR: In this paper, two processes such as pre process and post process are used to mine suitable rules and to explore the relationship among the attributes to explore better knowledge and most important factors affecting the decision making.
Abstract: Medical diagnosis process vary in the degree to which they attempt to deal with different complicating aspects of diagnosis such as relative importance of symptoms, varied symptom pattern and the relation between diseases them selves. Based on decision theory, in the past many mathematical models such as crisp set, probability distribution, fuzzy set, intuitionistic fuzzy set were developed to deal with complicating aspects of diagnosis. But, many such models are failed to include important aspects of the expert decisions. Therefore, an effort has been made to process inconsistencies in data being considered by Pawlak with the introduction of rough set theory. Though rough set has major advantages over the other methods, but it generates too many rules that create many difficulties while taking decisions. Therefore, it is essential to minimize the decision rules. In this paper, we use two processes such as pre process and post process to mine suitable rules and to explore the relationship among the attributes. In pre process we use rough set theory to mine suitable rules, whereas in post process we use formal concept analysis from these suitable rules to explore better knowledge and most important factors affecting the decision making.

52 citations

Journal ArticleDOI
TL;DR: In this article, the authors used two processes such as pre-process and post-process to mine suitable rules and explore the relationship among the attributes, whereas in post process they used formal concept analysis from these suitable rules to explore better knowledge and most important factors affecting the decision making.
Abstract: Medical diagnosis process vary in the degree to which they attempt to deal with different complicating aspects of diagnosis such as relative importance of symptoms, varied symptom pattern and the relation between diseases them selves. Based on decision theory, in the past many mathematical models such as crisp set, probability distribution, fuzzy set, intuitionistic fuzzy set were developed to deal with complicating aspects of diagnosis. But, many such models are failed to include important aspects of the expert decisions. Therefore, an effort has been made to process inconsistencies in data being considered by Pawlak with the introduction of rough set theory. Though rough set has major advantages over the other methods, but it generates too many rules that create many difficulties while taking decisions. Therefore, it is essential to minimize the decision rules. In this paper, we use two processes such as pre process and post process to mine suitable rules and to explore the relationship among the attributes. In pre process we use rough set theory to mine suitable rules, whereas in post process we use formal concept analysis from these suitable rules to explore better knowledge and most important factors affecting the decision making.

48 citations

Journal ArticleDOI
01 Nov 2008
TL;DR: The results of the present paper extend the basic properties of rough sets and results involving set theoretic operations on types of rough set that have been established in Tripathy and Mitra (2008) by defining rough sets defined on fuzzy approximation spaces.
Abstract: A fuzzy relation is an extension of crisp relation on any set U. Fuzzy proximity relations on U are much more general and abundant than equivalence relations. The fuzzy approximation space which depends upon a fuzzy proximity relation defined on a set U is a generalisation of the concept of knowledge base. So, rough sets defined on fuzzy approximation spaces extend the concept of rough sets on knowledge bases. The results of the present paper extend the basic properties of rough sets and results involving set theoretic operations on types of rough sets that have been established in Tripathy and Mitra (2008).

42 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The analysis of recent advances in genetic algorithms is discussed and the well-known algorithms and their implementation are presented with their pros and cons with the aim of facilitating new researchers.
Abstract: In this paper, the analysis of recent advances in genetic algorithms is discussed. The genetic algorithms of great interest in research community are selected for analysis. This review will help the new and demanding researchers to provide the wider vision of genetic algorithms. The well-known algorithms and their implementation are presented with their pros and cons. The genetic operators and their usages are discussed with the aim of facilitating new researchers. The different research domains involved in genetic algorithms are covered. The future research directions in the area of genetic operators, fitness function and hybrid algorithms are discussed. This structured review will be helpful for research and graduate teaching.

1,271 citations

Journal ArticleDOI
TL;DR: This paper is a review that survey recent technologies developed for Big Data and provides not only a global view of main Big Data technologies but also comparisons according to different system layers such as Data Storage Layer, Data Processing Layer, data Querying layer, Data Access Layer and Management Layer.

600 citations

Journal ArticleDOI
08 Mar 2018-Sensors
TL;DR: The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks.
Abstract: The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

236 citations

Journal ArticleDOI
TL;DR: An overview of MULTIMOORA is conducted by categorizing and analyzing main researches, theoretically and practically, in terms of the subordinate ranking methods, ranking aggregation tools, weighting methods, group decision-making, combination with other models, and the robustness of the method.

155 citations

Journal ArticleDOI
TL;DR: This paper presents the CPS taxonomy via providing a broad overview of data collection, storage, access, processing, and analysis, and discusses big data meeting green challenges in the contexts of CPS.
Abstract: The world is witnessing an unprecedented growth of cyber-physical systems (CPS), which are foreseen to revolutionize our world via creating new services and applications in a variety of sectors, such as environmental monitoring, mobile-health systems, intelligent transportation systems, and so on. The information and communication technology sector is experiencing a significant growth in data traffic, driven by the widespread usage of smartphones, tablets, and video streaming, along with the significant growth of sensors deployments that are anticipated in the near future. It is expected to outstandingly increase the growth rate of raw sensed data. In this paper, we present the CPS taxonomy via providing a broad overview of data collection, storage, access, processing, and analysis. Compared with other survey papers, this is the first panoramic survey on big data for CPS, where our objective is to provide a panoramic summary of different CPS aspects. Furthermore, CPS requires cybersecurity to protect them against malicious attacks and unauthorized intrusion, which become a challenge with the enormous amount of data that are continuously being generated in the network. Thus, we also provide an overview of the different security solutions proposed for CPS big data storage, access, and analytics. We also discuss big data meeting green challenges in the contexts of CPS.

149 citations