Author
Debasis Das
Other affiliations: National Institute of Technology, Durgapur, Birla Institute of Technology and Science, Birla Institute of Technology & Science, Pilani - Goa ...read more
Bio: Debasis Das is an academic researcher from Indian Institute of Technology, Jodhpur. The author has contributed to research in topics: Computer science & Authentication. The author has an hindex of 15, co-authored 102 publications receiving 679 citations. Previous affiliations of Debasis Das include National Institute of Technology, Durgapur & Birla Institute of Technology and Science.
Papers
More filters
[...]
NIIT1
TL;DR: The limitation of the original Apriori algorithm of wasting time and space for scanning the whole database searching on the frequent itemsets, and an improvement on A Priori are indicated.
Abstract: Apriori Algorithm is one of the most important algorithm which is used to extract frequent itemsets from large database and get the association rule for discovering the knowledge. It basically requires two important things: minimum support and minimum confidence. First, we check whether the items are greater than or equal to the minimum support and we find the frequent itemsets respectively. Secondly, the minimum confidence constraint is used to form association rules. Based on this algorithm, this paper indicates the limitation of the original Apriori algorithm of wasting time and space for scanning the whole database searching on the frequent itemsets, and present an improvement on Apriori.
70 citations
[...]
TL;DR: This work proposes a coverage-tree heuristic based routing instead of face routing in geographic routing schemes when greedy forwarding fails, and shows that the coverage tree based routing problem is NP hard by reduction using minimum rooted spanning tree of depth 2 (RST 2).
Abstract: Geographic routing scheme (such as Greedy perimeter stateless routing) makes use of location information to forward packets greedily Nodes need to keep only this location information in stateless routing When the greedy forwarding fails, routing switches to perimeter forwarding based on either planar graph (GG and RNG) or cross link detection protocol approaches However, it has drawback in terms of cost and computational overheads We propose a coverage-tree heuristic based routing instead of face routing in geographic routing schemes when greedy forwarding fails We prove that the coverage tree based routing problem is NP hard by reduction using minimum rooted spanning tree of depth 2 (RST 2) We also show that coverage-tree based geographic routing problem is APX hard and not approximable with a factor of $$1/2(1-\in ) \ln n$$1/2(1-?)lnn for any fixed $$\in > 0$$?>0 unless $$NP\subseteq DTIME(n^{\log \log n})$$NP⊆DTIME(nloglogn) Our proposed scheme of coverage-tree heuristics based geographic routing is $$(1+\ln m)$$(1+lnm)-approximation algorithm, a polynomial time algorithm using minimum distance topology knowledge On performance comparison using simulation, our proposed scheme outperforms with the competitive schemes in term of success rate, network overhead and success rate against varying node density
28 citations
[...]
TL;DR: An ''economic production lot size'' (EPLS) model for an item with imperfect quality is developed by considering random machine failure and sensitivity of the nearer optimal solution due to changes of some key parameters are analysed.
Abstract: An ''economic production lot size'' (EPLS) model for an item with imperfect quality is developed by considering random machine failure. Breakdown of the manufacturing machines is taken into account by considering its failure rate to be random (continuous). The production rate is treated as a decision variable. It is assumed that some defective units are produced during the production process. Machine breakdown resulting in idle time of the respective machine which leads to additional cost for loss of manpower is taken into account. It is assumed that the production of the imperfect quality units is a random variable and all these units are treated as scrap items that are completely wasted. The models have been formulated as profit maximization problems in stochastic and fuzzy-stochastic environments by considering some inventory parameters as imprecise in nature. In a fuzzy-stochastic environment, using interval arithmetic technique, the interval objective function has been transformed into an equivalent deterministic multi-objective problem. Finally, multi-objective problem is solved by Global Criteria Method (GCM). Stochastic and fuzzy-stochastic problems and their significant features are illustrated by numerical examples. Using the result of the stochastic model, sensitivity of the nearer optimal solution due to changes of some key parameters are analysed.
26 citations
[...]
TL;DR: This paper presents a production lot size inventory model in which the production rate constitutes of productions during both regular time and overtime, and the demand rate is assumed as stock-dependent and the stock itself is depleted due to demand and deterioration.
Abstract: This paper presents a production lot size inventory model in which the production rate constitutes of productions during both regular time and overtime. The demand rate is assumed as stock-dependent and the stock itself is depleted due to demand and deterioration. Supplier's incentives include price discounts and granting of credit periods for account settlement within time M"1, or the supplier allows interest-free credit upto an extended period M"2. This formulation leads to a single objective optimization problem for maximum average profit evaluation through a real-coded genetic algorithm (GA) with rank-based selection and arithmetic crossover. The model is illustrated through a numerical example, and sensitivity analyses have been done with the variation of demand and deterioration parameters on optimal profit.
26 citations
[...]
TL;DR: The literature survey introduces the different type of cellular automata being used for modeling and also tries to present the different fields in which CA have been applied.
Abstract: A Cellular Automata (CA) is a computing model of complex system using simple rule. CA divides the problem space into number of cell and each cell can be one or several final state. Cells are affected by neighbors to the simple rule. This paper provides a survey of available literature of some methodologies employed by researchers to utilize the cellular automata for modeling purpose. The literature survey introduces the different type of cellular automata being used for modeling and also tries to present the different fields in which CA have been applied.
26 citations
Cited by
More filters
Posted Content•
[...]
TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Abstract: In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.A POR may be viewed as a kind of cryptographic proof of knowledge (POK), but one specially designed to handle a large file (or bitstring) F. We explore POR protocols here in which the communication costs, number of memory accesses for the prover, and storage requirements of the user (verifier) are small parameters essentially independent of the length of F. In addition to proposing new, practical POR constructions, we explore implementation considerations and optimizations that bear on previously explored, related schemes.In a POR, unlike a POK, neither the prover nor the verifier need actually have knowledge of F. PORs give rise to a new and unusual security definition whose formulation is another contribution of our work.We view PORs as an important tool for semi-trusted online archives. Existing cryptographic techniques help users ensure the privacy and integrity of files they retrieve. It is also natural, however, for users to want to verify that archives do not delete or modify files prior to retrieval. The goal of a POR is to accomplish these checks without users having to download the files themselves. A POR can also provide quality-of-service guarantees, i.e., show that a file is retrievable within a certain time bound.
1,655 citations
Journal Article•
[...]
TL;DR: This conversion is the first generic transformation from an arbitrary one-way asymmetricryption scheme to a chosen-ciphertext secure asymmetric encryption scheme in the random oracle model.
Abstract: This paper shows a generic and simple conversion from weak asymmetric and symmetric encryption schemes into an asymmetric encryption scheme which is secure in a very strong sense- indistinguishability against adaptive chosen-ciphertext attacks in the random oracle model. In particular, this conversion can be applied efficiently to an asymmetric encryption scheme that provides a large enough coin space and, for every message, many enough variants of the encryption, like the ElGamal encryption scheme.
457 citations
Journal Article•
[...]
TL;DR: Calculations are developed and examined to reduce the entire quantity of Wireless access points as well as their locations in almost any given atmosphere while with the throughput needs and the necessity to ensure every place in the area can achieve a minimum of k APs.
Abstract: More particularly, calculations are developed and examined to reduce the entire quantity of Wireless access points as well as their locations in almost any given atmosphere while with the throughput needs and the necessity to ensure every place in the area can achieve a minimum of k APs. This paper concentrates on using Wireless for interacting with and localizing the robot. We've carried out thorough studies of Wireless signal propagation qualities both in indoor and outside conditions, which forms the foundation for Wireless AP deployment and communication to be able to augment how human operators communicate with this atmosphere, a mobile automatic platform is developed. Gas and oil refineries could be a harmful atmosphere for various reasons, including heat, toxic gasses, and unpredicted catastrophic failures. When multiple Wireless APs are close together, there's a possible for interference. A graph-coloring heuristic can be used to find out AP funnel allocation. Additionally, Wireless fingerprinting based localization is developed. All of the calculations implemented are examined in real life situations using the robot developed and answers are promising. For example, within the gas and oil industry, during inspection, maintenance, or repair of facilities inside a refinery, people might be uncovered to seriously high temps to have a long time, to toxic gasses including methane and H2S, and also to unpredicted catastrophic failures.
410 citations