scispace - formally typeset
Search or ask a question
Author

R. K. Pal

Bio: R. K. Pal is an academic researcher from Assam University. The author has contributed to research in topics: Computer science & Mathematical optimization. The author has an hindex of 1, co-authored 1 publications receiving 3 citations.

Papers
More filters
Proceedings ArticleDOI
10 Jul 2011
TL;DR: The paper describes the distributed service component framework and components design method for universal RFID system, which has the advantage of the rapid development of new scene-orientedRFID system.
Abstract: The design of Radio Frequency Identification RFID network [1], [3–5], [7], [9], [11], [12] hence plays a significant role for successfully deploying large-scale applications [7], [10], [13], [14]. This is especially true when the tagged object is on item-level. This paper discusses issues that should be considered in design of RFID network; analyzes the potential impacts of different RFID network design on the existing enterprise network [8] and presents the Distributed Design of Universal lightweight RFID system [2], [6] for Large-Scale RFID operation for different RFID deployment environment [13–16] and computing platforms, which has the advantage of the rapid development of new scene-oriented RFID system. Customization and reconfiguration with lightweight [2], [4–6] capabilities are the aspirations of our developed RFID distributed system for large scale operation. Based on OSGi Open Service Gateway Initiative technology [17–19] and its Service-Oriented development mode, the paper describes the distributed service component framework and components design method for universal RFID system.

3 citations

Journal ArticleDOI
TL;DR: Six unique KD-based designs are identified and the status of findings toward an effective solution in authentication, identification, and prediction are presented and some indications for a deeper understanding of the issues and further study are provided.
Abstract: The purpose of this study is to conduct a comprehensive evaluation and analysis of the most recent studies on the implications of keystroke dynamics (KD) patterns in user authentication, identification, and the determination of useful information. Another aim is to provide an extensive and up-to-date survey of the recent literature and potential research directions to understand the present state-of-the-art methodologies in this particular domain that are expected to be beneficial for the KD research community. From January 1st, 2017 to March 13th, 2022, the popular six electronic databases have been searched using a search criterion (“keystroke dynamics” OR “typing pattern”) AND (“authentication” OR “verification” OR “identification”). With this criterion, a total of nine thousand three hundred forty-eight results, including duplicates, were produced. However, one thousand five hundred forty-seven articles have been chosen after removing duplicates and preliminary screening. Due to insufficient information, only one hundred twenty-seven high-quality quantitative research articles have been included in the article selection process. We compared and summarised several factors with multiple tables to comprehend the various methodologies, experimental settings, and findings. In this study, we have identified six unique KD-based designs and presented the status of findings toward an effective solution in authentication, identification, and prediction. We have also discovered considerable heterogeneity across studies in each KD-based design for desktops and smartphones separately. Finally, this paper found a few open research challenges and provided some indications for a deeper understanding of the issues and further study.

2 citations


Cited by
More filters
Journal Article
TL;DR: This study presents the preparation of non-functional requirements catalogues for RFID middleware supported by Non-Functional Requirements Framework (NFR-Framework) and the effectiveness of the reuse of the catalogues.
Abstract: Non-functional requirements (NFR) are related to the user satisfaction about the quality attributes of the information system. In some cases these requirements are ignored or implemented by the end of the project in a chaotic way. It happens because, in many cases, the user does not have enough contact with the information system to solve these requirements, such as nonfunctional requirements for Radio-Frequency Identification (RFID) middleware. This study presents the preparation of non-functional requirements catalogues for RFID middleware supported by Non-Functional Requirements Framework (NFR-Framework). Two case studies were performed to evaluate the Requirements Engineering process in the creation of the NFR catalogues and the effectiveness of the reuse of the catalogues. As a result, a set of non-functional requirements are presented and organized into catalogues that work as the foundation for RFID system developers in the identification and validation of non-functional requirements for RFID middleware in information systems context.

7 citations

Journal ArticleDOI
01 Jan 2018
TL;DR: To simulate a parking system with central unit which might be ready to manage the readers, and process the information gathered from the reader(s), the operation of reading tags was simulated using Rifidi Emulator platform.
Abstract: Radio Frequency Identification (RFID) is most wide used technique in the process of determining tagged items. The aim of this article is to simulate a parking system with central unit which might be ready to manage the readers, and process the information gathered from the reader(s). The proposed system supposes there is a park unit with a number of licensed cars owned by a particular company or any institute, therefor only the licensed cars (with tag) will enter the park. The software system use a Data base to store car's ID and different information with a Graphical User Interface (GUI) to manipulate the data which was designed by Visual Basic (VB 6.0). The operation of reading tags was simulated using Rifidi Emulator platform.

4 citations

Journal ArticleDOI
TL;DR: In this paper , the authors proposed a Transformer architecture to model free-text keystroke dynamics performed on mobile devices for the purpose of user authentication, which consists in Temporal and Channel Modules enclosing two Long Short-Term Memory (LSTM) recurrent layers, Gaussian Range Encoding (GRE), a multi-head Self-Attention mechanism, and a Block-Recurrent structure.
Abstract: The broad usage of mobile devices nowadays, the sensitiveness of the information contained in them, and the shortcomings of current mobile user authentication methods are calling for novel, secure, and unobtrusive solutions to verify the users' identity. In this article, we propose TypeFormer, a novel Transformer architecture to model free-text keystroke dynamics performed on mobile devices for the purpose of user authentication. The proposed model consists in Temporal and Channel Modules enclosing two Long Short-Term Memory (LSTM) recurrent layers, Gaussian Range Encoding (GRE), a multi-head Self-Attention mechanism, and a Block-Recurrent structure. Experimenting on one of the largest public databases to date, the Aalto mobile keystroke database, TypeFormer outperforms current state-of-the-art systems achieving Equal Error Rate (EER) values of 3.25% using only 5 enrolment sessions of 50 keystrokes each. In such way, we contribute to reducing the traditional performance gap of the challenging mobile free-text scenario with respect to its desktop and fixed-text counterparts. Additionally, we analyse the behaviour of the model with different experimental configurations such as the length of the keystroke sequences and the amount of enrolment sessions, showing margin for improvement with more enrolment data. Finally, a cross-database evaluation is carried out, demonstrating the robustness of the features extracted by TypeFormer in comparison with existing approaches.

2 citations

Journal ArticleDOI
TL;DR: In this article , a multi-path routing for goods delivery with refusal problems (MPRfGDwRPs) against online booking having different route connections between nodes (customers) and solved by a novel Type-2 fuzzy logic based fireworks algorithm (T2FLFWA) developed for discrete problems with probability-based selection and generation based prime mutation.
Abstract: With the development of the internet and the availability of smart phones, online shopping and the number of digital buyers have increased enormously under the present social context (COVID-19). The major pitfall of this marketing system is the random non-availability of/refusal by customers. Nowadays, with the development of infrastructure, there are several route connections among the different locations worldwide. Considering these, we formulate some multi-path routing for goods delivery with refusal problems (MPRfGDwRPs) against online booking having different route connections between nodes (customers) and solved by a novel Type-2 fuzzy logic based fireworks algorithm (T2FLFWA) developed for discrete problems with probability-based selection and generation based prime mutation. In T2FLFWA, inferences are drawn to obtain the amplitude coefficient against the assumed spark number and iteration ratio. Some instances from TSPLIB are solved and supremacy of T2FLFWA is established through ANOVA test. In MPRfGDwRP, a delivery man starts with goods from a warehouse against customers’ online demands under cash-on-delivery or cash-on bookings systems and delivers the appropriate goods to the respective customers located at different locations. The random refusal or non-availability of customers is considered. The optimum travel plan and appropriate routes between the nodes are selected for minimum total cost. The models are illustrated numerically through a real-life problem. Some managerial conclusions are drawn. The novelty of the investigation is that for the first time, T2FLFWA for discrete problems is developed, delivery man’s routing plan with multiple paths between nodes with refusals is formulated and its solution using T2FLFWA is presented.

2 citations