scispace - formally typeset
Search or ask a question
Author

Samar Sen Sarma

Bio: Samar Sen Sarma is an academic researcher from University of Calcutta. The author has contributed to research in topics: Graph (abstract data type) & Reverse-delete algorithm. The author has an hindex of 7, co-authored 48 publications receiving 174 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: A comprehensive investigation of the Z-number approach to CWW, which serves as a model of linguistic summarization of natural language statements, a technique to merge human-affective perspectives with C WW, and consequently can be envisaged to play a radical role in the domain of CWW-based system design and Natural Language Processing NLP.
Abstract: The Z-number is a new fuzzy-theoretic concept, proposed by Zadeh in 2011. It extends the basic philosophy of Computing With Words CWW to include the perception of uncertainty of the information conveyed by a natural language statement. The Z-number thus, serves as a model of linguistic summarization of natural language statements, a technique to merge human-affective perspectives with CWW, and consequently can be envisaged to play a radical role in the domain of CWW-based system design and Natural Language Processing NLP. This article presents a comprehensive investigation of the Z-number approach to CWW. We present here: a an outline of our understanding of the generic architecture, algorithm and challenges underlying CWW in general; b a detailed study of the Z-number methodology-where we propose an algorithm for CWW using Z-numbers, define a Z-number based operator for the evaluation of the level of requirement satisfaction, and describe simulation experiments of CWW utilizing Z-numbers; and c analyse the strengths and the challenges of the Z-numbers, and suggest possible solution strategies. We believe that this article would inspire research on the need for inclusion of human-behavioural aspects into CWW, as well as the integration of CWW and NLP.

48 citations

Journal ArticleDOI
TL;DR: This survey paper cites some methods of graph based anomaly detection in the field of information security, finance, cybersecurity, online social networks, health care, law enforcement etc. and their classification.
Abstract: This survey paper cites some methods of graph based anomaly detection in the field of information security, finance, cybersecurity, online social networks, health care, law enforcement etc. and their classification. Finally, the relevance of cyber crime and its elimination is highlighted throughout the paper with some real world applications of graph based anomaly detection techniques and also some future direction to improve the technique of detecting anomalies in data has been given.

16 citations

Journal ArticleDOI
TL;DR: This paper proposes a constrained-based watermarking technique and lays out a theoretical framework to evaluate watermarked techniques for intellectual property protection (IPP), and derives formulae that illustrate the trade-off between credibility and overhead.

13 citations

Journal ArticleDOI
01 Jan 2012
TL;DR: In this paper, a modified Simulated Annealing (MSA) algorithm for vertex coloring of a simple, symmetric and connected graph (GCP) has been proposed, which has shown better output than the simple or non-modified version of the same algorithm.
Abstract: The problems which are NP-complete in nature are always attracting the computer scientists to develop some heuristic algorithms, generating optimal solution in time-space efficient manner compared to the existing ones. Coloring of the vertices of a graph with minimum number of colours belongs to the same category, where the algorithm designers are trying to propose some new algorithms for better result. Here, we have designed modified Simulated Annealing (MSA) for optimal vertex coloring of a simple, symmetric and connected graph (GCP). The algorithm has been tested upon a series of benchmarks including large scale test case and has shown better output than the simple or non-modified version of the same algorithm. This paper describes the advancement of performance of simple SA applied upon the problem of graph coloring using a specially designed operator called random change operator instead of the general change operator. Our work is still going on for designing better algorithms generating optimal solutions.

13 citations

Proceedings ArticleDOI
31 Aug 2009
TL;DR: The proposed scheme makes unauthorized disclosure of valuable design almost infeasible, and can easily detect any alteration of the design file during transmission, and ensures authentication of the original designer as well as non-repudiation between the seller and the buyer.
Abstract: IP reuse is rapidly proliferating recent automated circuit design. It is facing serious challenges like forgery, theft and misappropriation of intellectual property (IP) of the design. Thus, protection of design IP is a matter of prime concern. In this paper, we propose a novel Internet-based scheme to tackle this problem. Input to the proposed scheme is a graph corresponding to a digital system design. Watermarking of the graph and its encryption are achieved using a new linear feedback shift register(LFSR)-based locking scheme. The proposed scheme makes unauthorized disclosure of valuable design almost infeasible, and can easily detect any alteration of the design file during transmission. It ensures authentication of the original designer as well as non-repudiation between the seller and the buyer. Empirical evidences on several benchmark problem sets are encouraging.

10 citations


Cited by
More filters
Proceedings ArticleDOI
22 Jan 2006
TL;DR: Some of the major results in random graphs and some of the more challenging open problems are reviewed, including those related to the WWW.
Abstract: We will review some of the major results in random graphs and some of the more challenging open problems. We will cover algorithmic and structural questions. We will touch on newer models, including those related to the WWW.

7,116 citations

Book
01 Jan 2008
TL;DR: EvoCOMNET Contributions.
Abstract: EvoCOMNET Contributions.- New Research in Nature Inspired Algorithms for Mobility Management in GSM Networks.- Adaptive Local Search for a New Military Frequency Hopping Planning Problem.- SS vs PBIL to Solve a Real-World Frequency Assignment Problem in GSM Networks.- Reconstruction of Networks from Their Betweenness Centrality.- A Self-learning Optimization Technique for Topology Design of Computer Networks.- A Comparative Study of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference Systems for Portscan Detection.- EvoFIN Contributions.- Evolutionary Single-Position Automated Trading.- Genetic Programming in Statistical Arbitrage.- Evolutionary System for Generating Investment Strategies.- Horizontal Generalization Properties of Fuzzy Rule-Based Trading Models.- Particle Swarm Optimization for Tackling Continuous Review Inventory Models.- Option Model Calibration Using a Bacterial Foraging Optimization Algorithm.- A SOM and GP Tool for Reducing the Dimensionality of a Financial Distress Prediction Problem.- Quantum-Inspired Evolutionary Algorithms for Financial Data Analysis.- EvoHOT Contributions.- Analysis of Reconfigurable Logic Blocks for Evolvable Digital Architectures.- Analogue Circuit Control through Gene Expression.- Discovering Several Robot Behaviors through Speciation.- Architecture Performance Prediction Using Evolutionary Artificial Neural Networks.- Evolving a Vision-Driven Robot Controller for Real-World Indoor Navigation.- Evolving an Automatic Defect Classification Tool.- Deterministic Test Pattern Generator Design.- An Evolutionary Methodology for Test Generation for Peripheral Cores Via Dynamic FSM Extraction.- Exploiting MOEA to Automatically Geneate Test Programs for Path-Delay Faults in Microprocessors.- EvoIASP Contributions.- Evolutionary Object Detection by Means of Naive Bayes Models Estimation.- An Evolutionary Framework for Colorimetric Characterization of Scanners.- Artificial Creatures for Object Tracking and Segmentation.- Automatic Recognition of Hand Gestures with Differential Evolution.- Optimizing Computed Tomographic Angiography Image Segmentation Using Fitness Based Partitioning.- A GA-Based Feature Selection Algorithm for Remote Sensing Images.- An Evolutionary Approach for Ontology Driven Image Interpretation.- Hybrid Genetic Algorithm Based on Gene Fragment Competition for Polyphonic Music Transcription.- Classification of Seafloor Habitats Using Genetic Programming.- Selecting Local Region Descriptors with a Genetic Algorithm for Real-World Place Recognition.- Object Detection Using Neural Networks and Genetic Programming.- Direct 3D Metric Reconstruction from Multiple Views Using Differential Evolution.- Discrete Tomography Reconstruction through a New Memetic Algorithm.- A Fuzzy Hybrid Method for Image Decomposition Problem.- Triangulation Using Differential Evolution.- Fast Multi-template Matching Using a Particle Swarm Optimization Algorithm for PCB Inspection.- EvoMUSART Contributions.- A Generative Representation for the Evolution of Jazz Solos.- Automatic Invention of Fitness Functions with Application to Scene Generation.- Manipulating Artificial Ecosystems.- Evolved Diffusion Limited Aggregation Compositions.- Scaffolding for Interactively Evolving Novel Drum Tracks for Existing Songs.- AtomSwarm: A Framework for Swarm Improvisation.- Using DNA to Generate 3D Organic Art Forms.- Towards Music Fitness Evaluation with the Hierarchical SOM.- Evolutionary Pointillist Modules: Evolving Assemblages of 3D Objects.- An Artificial-Chemistry Approach to Generating Polyphonic Musical Phrases.- Implicit Fitness Functions for Evolving a Drawing Robot.- Free Flight in Parameter Space: A Dynamic Mapping Strategy for Expressive Free Impro.- Modelling Video Games' Landscapes by Means of Genetic Terrain Programming - A New Approach for Improving Users' Experience.- Virtual Constructive Swarm Compositions and Inspirations.- New-Generation Methods in an Interpolating EC Synthesizer Interface.- Composing Music with Neural Networks and Probabilistic Finite-State Machines.- TransFormer #13: Exploration and Adaptation of Evolution Expressed in a Dynamic Sculpture.- EvoNUM Contributions.- Multiobjective Tuning of Robust PID Controllers Using Evolutionary Algorithms.- Truncation Selection and Gaussian EDA: Bounds for Sustainable Progress in High-Dimensional Spaces.- Scalable Continuous Multiobjective Optimization with a Neural Network-Based Estimation of Distribution Algorithm.- Cumulative Step Length Adaptation for Evolution Strategies Using Negative Recombination Weights.- Computing Surrogate Constraints for Multidimensional Knapsack Problems Using Evolution Strategies.- A Critical Assessment of Some Variants of Particle Swarm Optimization.- An Evolutionary Game-Theoretical Approach to Particle Swarm Optimisation.- A Hybrid Particle Swarm Optimization Algorithm for Function Optimization.- EvoSTOC Contributions.- Memory Based on Abstraction for Dynamic Fitness Functions.- A Memory Enhanced Evolutionary Algorithm for Dynamic Scheduling Problems.- Compound Particle Swarm Optimization in Dynamic Environments.- An Evolutionary Algorithm for Adaptive Online Services in Dynamic Environment.- EvoTHEORY Contributions.- A Study of Some Implications of the No Free Lunch Theorem.- Negative Slope Coefficient and the Difficulty of Random 3-SAT Instances.- EvoTRANSLOG Contributions.- A Memetic Algorithm for the Team Orienteering Problem.- Decentralized Evolutionary Optimization Approach to the p-Median Problem.- Genetic Computation of Road Network Design and Pricing Stackelberg Games with Multi-class Users.- Constrained Local Search Method for Bus Fleet Scheduling Problem with Multi-depot with Line Change.- Evolutionary System with Precedence Constraints for Ore Harbor Schedule Optimization.

596 citations

Journal ArticleDOI
TL;DR: In this article, the main critical problem that naturally arises in processing Z-number-based information is computation with Z-numbers, which is a more adequate concept for description of real-world information.

234 citations

Journal ArticleDOI
TL;DR: An extended TODIM method based on the Choquet integral for multi-criteria decision-making (MCDM) problems with linguistic Z-numbers is developed, which is a more comprehensive reflection of the decision-makers’ cognition but also is more in line with expression habits.
Abstract: Z-numbers are a new concept considering both the description of cognitive information and the reliability of information. Linguistic terms are useful tools to adequately and effectively model real-life cognitive information, as well as to characterize the randomness of events. However, a form of Z-numbers, in which their two components are in the form of linguistic terms, is rarely studied, although it is common in decision-making problems. In terms of Z-numbers and linguistic term sets, we provided the definition of linguistic Z-numbers as a form of Z-numbers or a subclass of Z-numbers. Then, we defined some operations of linguistic Z-numbers and proposed a comparison method based on the score and accuracy functions of linguistic Z-numbers. We also presented the distance measure of linguistic Z-numbers. Next, we developed an extended TODIM (an acronym in Portuguese of interactive and multi-criteria decision-making) method based on the Choquet integral for multi-criteria decision-making (MCDM) problems with linguistic Z-numbers. Finally, we provided an example concerning the selection of medical inquiry applications to demonstrate the feasibility of our proposed approach. We then verified the applicability and superiority of our approach through comparative analyses with other existing methods. Illustrative and comparative analyses indicated that the proposed approach was valid and feasible for different decision-makers and cognitive environments. Furthermore, the final ranking results of the proposed approach were closer to real decision-making processes. Linguistic Z-numbers can flexibly characterize real cognitive information as well as describe the reliability of information. This method not only is a more comprehensive reflection of the decision-makers’ cognition but also is more in line with expression habits. The proposed method inherited the merits of the classical TODIM method and considers the interactivity of criteria; therefore, the proposed method was effective for dealing with real-life MCDM problems. Consideration about bounded rational and the interactivity of criteria made final outcomes convincing and consistent with real decision-making.

144 citations