Saurabh Mukherjee | Banasthali Vidyapith (original) (raw)

Papers by Saurabh Mukherjee

Research paper thumbnail of Curlcrawler Optimization: A Framework For Crawling The Web With URL Tracking And Canonicalization

International journal of engineering research and technology, Jan 30, 2013

Information is a vital role playing versatile thing from availability at church level to web thro... more Information is a vital role playing versatile thing from availability at church level to web through trends of books. WWW is now the huge, exposed, up-to-date, interoperable and dynamic repository of information available to everyone, everywhere and every time. In addition to the size of information available on the web its scheme, authority, dynamism, appearance and interoperability are the attributes that are growing and adopted exponentially[7,10]. These attributes are the directing one to coin a new term web 2.0 that is an evolution of web from its embryo. Search engines are the striking one to sail the web for several purposes because moreover information on the web is voyaged using search engines like AltaVista, WebCrawler, Hot Boat etc. Owing to the directing factors of its ever-growing exponential growth with the availability of endless pool of information, optimization of its design blueprint is the thrust arena of engineering endeavor. This paper is an experimental strives to develop and implement an extended framework with extended architecture to make search engines more efficient using local resource utilization features of the programming. This work is an implementation experience for use of focused and path oriented approach to provide a cross featured framework for search engines with human powered approach. In addition to curl programming, personalization of information, caching and graphical perception, main features of this framework are cross platform, cross architecture, url tracking, focused, path oriented, human powered and url canonicalization[7,21. The first part of the paper covers related work that has been done mostly in the field of general search engine in over ongoing research project for crawling the web. The second part defines architecture and functioning of developed framework and compares it to search engine optimization for web pages. The third part provides an overview and critical analysis of developed framework like experimental results, pseudo code, data structure etc.

Research paper thumbnail of A Review on Encryption Techniques based on Cellular Automata

Soft Computing Research Society eBooks, 2022

In this digital world, images are an important part of communication and while communicating secu... more In this digital world, images are an important part of communication and while communicating security is a crucial problem. And to deal with security various image encryption techniques are based on the cellular automata. The study gives a basic introduction to cryptography and cellular automata and various encryption scheme based on cellular automata. Various performance measures related to the analysis of encryption techniques have been studied. And a comparison of encryption techniques based on the performance matrices is presented. The paper gives a concluding remark on the advancement in the field of image encryption.

Research paper thumbnail of Analysis and Interpretation of Coronary Artery Blockage using Soft Computing Techniques

IOSR Journal of Computer Engineering, May 1, 2016

Analysis and interpretation of Myocardial infarction, is very important at the early stage to det... more Analysis and interpretation of Myocardial infarction, is very important at the early stage to detect the possible risk for heart attacks. Various non-invasive imaging modalities have been used for better diagnosis. Cardiologist wants better image resolution and detailed descriptions of the ROI (Region of Interest). In the present paper, the images have been pre-processed for further applications like filtering, denoising and deblurring by using various techniques like the usages of average and median filter, soft thresholding for various segmentation coronary blockages.The vessel segmentation taken from CT angiogram DICOM images. The vessel segmentation X-Ray image has been processed by fuzzy system. The gradient of the image has been taken after the conversion into double precision. 24 different 'If Then' rules have been initiated and the defuzzification method has been done by centriod method.

Research paper thumbnail of A Survey of Middleware in different languages for Ubiquitous Services

The advent of abrupt advancement in technology and availability of numerous applications has made... more The advent of abrupt advancement in technology and availability of numerous applications has made it imperative to adopt a technology that is felicitous for every domain. There exists a huge count of technologies working in all domains. The transient nature of technology itself is a reason for it being obsolete. Enterprise application development (EAI) solutions support many ongoing projects ranging from proprietary, open or academic projects to scientific experiments. After analysing various middleware, we agreed on the fact that a language works best in a specific domain but may not be amicable with other domains. The rapid augmentation in technology and unstable requirements are responsible for having dearth in languages. Therefore, succinctly the environment is unstable and will be in future as well. This research discusses middleware technologies available in various languages. In this paper, on the basis of literature survey we present a comparative analysis of their features, flexibility, scalability and tradeoffs and making it impeccable at some extent is what we aspire.

Research paper thumbnail of A hybrid system for detection and diagnosis of novel corona virus

Nucleation and Atmospheric Aerosols, 2022

Research paper thumbnail of A Thorough Insight into Theoretical and Practical Developments in MultiAgent Systems

IGI Global eBooks, 2020

Multiagent systems have been a fascination for research community and are often seen as an intell... more Multiagent systems have been a fascination for research community and are often seen as an intelligent solution to many complex real world problems. Researchers have been active in the domain since last three decades and many developments pertaining to theoretical design and practical developments of multiagent systems are worth appreciating. The growth in MAS is multidirectional ranging from conceptual ideas to practical implementations and from the wide range of applications; it appears that multiagent systems are proving to be universal. The paper presents a concise survey of developments in MAS highlighting the important contributions in the field and also questions the universal applicability of agents.

Research paper thumbnail of Classification of Micro-Calcification in Breast from Mammographic Images using Transfer Learning

International journal of recent technology and engineering, Jan 30, 2020

Early detection of cancer is most important for long term survival of patient. Now a days CADx ar... more Early detection of cancer is most important for long term survival of patient. Now a days CADx are widely used for early identification of breast cancer automatically. CAD uses significant features to identify and categorize cancer. CADx based on Convolutional Neural Network are becoming popular now a days due to extracting relevant features automatically. CNNs can be trained from scratch for medical images due to various input sizes and tumor structures. But due to limited amount of medical images available for training ,we have used transfer learning approach.We developed a deep learning framework based on CNN to discriminate the breast tumor either benign or malignant using transfer learning. We used digital mammographic images containing both views from CBIS-DDSM database. We have achived training(100%) and validation accuracy greater than 90% with minimum training and validation loss. We have also compared the reaults with transfer learning using pretrained network alexnet and googlenet on same dataset.

Research paper thumbnail of Threshold segmentation technique for tumor detection using morphological operator

Research paper thumbnail of A novel algorithm of weighted fuzzy spatial association rule mining (WFSARM) for wasteland reclamation

Journal of Information and Optimization Sciences

Abstract Wasteland reclamation is one of the ways in which the arable land can be increased. Weig... more Abstract Wasteland reclamation is one of the ways in which the arable land can be increased. Weighted fuzzy spatial association rules could be used for associating wastelands with ground water and soil quality. The quality of wasteland, ground water and soil are used to provide weight. The association rules mined need to be further subjected to an interestingness measure that defines their utility. For the given challenge the authors propose a new algorithm for weighted fuzzy spatial association rule mining for wasteland reclamation (WFSARM) and ranking them on interestingness measures. Here, two new measures called faith and weight-area score are introduced. Multiple minimum faith thresholds are used for pruning of itemsets. The comparative analysis shows that the proposed algorithm is ef ficient and scalable and mines more number of rules as compared to Apriori algorithm. The results are viewed using GIS tool.

Research paper thumbnail of Application of Steganography Technique in Cloud Computing

2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), 2019

Cloud computing has played a significant role in data and information management through availing... more Cloud computing has played a significant role in data and information management through availing computer system resources for all users without direct active management. In return, a considerable population has embarked on cloud computing to share data and information and communicate through the platform hence enjoying the benefit. However, data security is a crucial aspect in cloud computing as a way of assuring users of their confidentiality and safety of data and information stored and transferred through the platform. As a result, the need for data security techniques has facilitated the evolution of different techniques necessary for ensuring the safety of data and information through the platform hence ensuring effective communication channels. Therefore, Steganography techniques have been identified as one of the cloud computing techniques necessary for enhancing cloud data security. In return, this paper analyzes the application of stenography technique in cloud computing as an approach to enhance cloud data security

Research paper thumbnail of Classical Image Segmentation Techniques for Detection of Anti-personnel Landmines

Research paper thumbnail of Fully Automated Digital Mammogram Segmentation

Research paper thumbnail of Analysis and interpretation of segmentation techniques based on delaunay triangulation and iterative thresholding explicitly used for detection of anti-personnel landmines

2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016

This paper deals with an attempt to detect anti-personnel landmines from images acquired in the v... more This paper deals with an attempt to detect anti-personnel landmines from images acquired in the visible spectrum. Segmentation techniques used includes Iterative Thresholding and Delaunay Triangulation using Morphological Thinning. Homomorphic Filtering is used for image pre-processing. Results have been tabulated and statistical parameters have been calculated from the gray level co-occurrence matrix. Iterative thresholding proved to be a better segmentation technique than Delaunay Triangulation. This work provides the basis for future analysis.

Research paper thumbnail of Biometric Template Protection Scheme-Cancelable Biometrics

Lecture Notes in Electrical Engineering, 2019

Biometric template is actually digital representation of the biometric features that are extracte... more Biometric template is actually digital representation of the biometric features that are extracted by applying different algorithms on the captured images of different types of biometric modalities. This digital information is stored in a biometric database for identification and authentication purposes. The objective of this paper discussed about cancelable Biometric template protection scheme. The idea behind cancelable biometrics is intentionally and repeatedly alteration of biometric features in such a way so that the data or biometric features will be protected.

Research paper thumbnail of Integration of GIS, Spatial Data Mining, and Fuzzy Logic for Agricultural Intelligence

Advances in Intelligent Systems and Computing, 2017

With increasing population and decreasing crop production, there is an enormous need to increase ... more With increasing population and decreasing crop production, there is an enormous need to increase land under cultivation. This paper attempts to explore the applicability of spatial data mining integrated with Geographic Information System (GIS) and fuzzy logic for Agricultural Intelligence. The research uses thematic agricultural data of Jodhpur District of Rajasthan state and mines spatial association rules between groundwater, wastelands, and soils of Jodhpur District which are then used to create Mamdani fuzzy inference system for determining the utilization of wastelands. A taluk-wise map of Jodhpur district is created from the fuzzy values showing the utilization of wastelands. Analysis of results showed that out of 36,063 hectares of mined pattern, Phalodi taluk of Jodhpur district contains the largest wasteland area and the area under the medium type of utilization is the largest. It could be suggested that wastelands having a substantial groundwater underneath can be irrigated for agriculture and/or producing fodder and firewood.

Research paper thumbnail of Comparative Analysis of Fingerprint Classification Algorithms- A review

International Journal of Computer Sciences and Engineering, 2018

Research paper thumbnail of A clustered neighbourhood consensus algorithm for a generic agent interaction protocol

International Journal of Advanced Intelligence Paradigms, 2019

This paper significantly contributes a consensus algorithm to enhance the efficiency of existing ... more This paper significantly contributes a consensus algorithm to enhance the efficiency of existing generic interaction protocol for multiagent systems (GIPMAS). The proposed algorithm is marriage of neighbourhood algorithm and discrete time consensus protocol and the neighbourhood algorithm focuses on providing more weight to communication links/edges joining two clusters as compared to links joining two agents in a cluster, which increases rate of convergence of information. Thus, in clustered network of agents, cluster head and executive cluster head would be responsible for deriving consensus in the received information. Simulation reflects that proposed mechanism improves time of convergence of information. However, slight increase in task execution is also observed due to trade-off between quality of output and complexity of mechanism.

Research paper thumbnail of Heuristic Search Attacks on Gradual Secret Release Protocol: a Cryptanalysis Approach on E-Learning Security

International Review on Computers and Software, Dec 31, 2013

ABSTRACT Crypt-analysis on GSR fair exchange protocol to study and analyse the robustness of the ... more ABSTRACT Crypt-analysis on GSR fair exchange protocol to study and analyse the robustness of the protocol. In order to perform the crypt-analysis, heuristic attacks are to be over the protocol. The heuristic attacks can be termed as the attacks, which are artificially generated by various heuristic search algorithms. This work intend to use renowned heuristic search algorithms such as Genetic algorithm (GA) and Particle Swarm Optimization Algorithm (PSO) and a latest search algorithm such as cuckoo search (CS). GA and PSO have been applied for crypt-analysis of various protocols and encryption standards. CS is an emerging search algorithm and it proved the performance in solving optimization problems. Based on the aforesaid peculiarities, perform crypt-analysis based on such algorithms. Under various algorithm parameters, attacks will be made over the protocol and the performance will be studied. The protocol and the search algorithms will be implemented in MATLAB and the results will be analysed in depth to study the robustness of the protocol under such security issues.

Research paper thumbnail of A Clustering-Based Generic Interaction Protocol for Multiagent Systems

Advances in Intelligent Systems and Computing, 2016

The paper proposes a clustering based Generic Interaction Protocol for Multiagent Systems (GIPMAS... more The paper proposes a clustering based Generic Interaction Protocol for Multiagent Systems (GIPMAS) that exploits clustering methodology for establishing interaction among agents operating in a network of multiagent systems. GIPMAS is a hierarchical protocol that supports intelligent formation of clusters and dynamic election of cluster head and executive cluster head as well. It also describes a recovery mechanism in case cluster head relocates from its respective cluster.

Research paper thumbnail of Test Case Prioritization & Selection for an Object Oriented Software using Genetic Algorithm

International Journal of Engineering and Advanced Technology, 2020

In this paper our aim is to propose a Test Case Selection and Prioritization technique for OOP fo... more In this paper our aim is to propose a Test Case Selection and Prioritization technique for OOP for ordering the test cases as per in accordance with their priority for finding the faults in the OOS. We have used the heuristic Genetic Algorithm, in order to generating the order of these prioritized test cases for a given OOS. The motive is to put a test case first into the ordered sequence that may have the highest prospective of finding an error in the given OOS & then soon.

Research paper thumbnail of Curlcrawler Optimization: A Framework For Crawling The Web With URL Tracking And Canonicalization

International journal of engineering research and technology, Jan 30, 2013

Information is a vital role playing versatile thing from availability at church level to web thro... more Information is a vital role playing versatile thing from availability at church level to web through trends of books. WWW is now the huge, exposed, up-to-date, interoperable and dynamic repository of information available to everyone, everywhere and every time. In addition to the size of information available on the web its scheme, authority, dynamism, appearance and interoperability are the attributes that are growing and adopted exponentially[7,10]. These attributes are the directing one to coin a new term web 2.0 that is an evolution of web from its embryo. Search engines are the striking one to sail the web for several purposes because moreover information on the web is voyaged using search engines like AltaVista, WebCrawler, Hot Boat etc. Owing to the directing factors of its ever-growing exponential growth with the availability of endless pool of information, optimization of its design blueprint is the thrust arena of engineering endeavor. This paper is an experimental strives to develop and implement an extended framework with extended architecture to make search engines more efficient using local resource utilization features of the programming. This work is an implementation experience for use of focused and path oriented approach to provide a cross featured framework for search engines with human powered approach. In addition to curl programming, personalization of information, caching and graphical perception, main features of this framework are cross platform, cross architecture, url tracking, focused, path oriented, human powered and url canonicalization[7,21. The first part of the paper covers related work that has been done mostly in the field of general search engine in over ongoing research project for crawling the web. The second part defines architecture and functioning of developed framework and compares it to search engine optimization for web pages. The third part provides an overview and critical analysis of developed framework like experimental results, pseudo code, data structure etc.

Research paper thumbnail of A Review on Encryption Techniques based on Cellular Automata

Soft Computing Research Society eBooks, 2022

In this digital world, images are an important part of communication and while communicating secu... more In this digital world, images are an important part of communication and while communicating security is a crucial problem. And to deal with security various image encryption techniques are based on the cellular automata. The study gives a basic introduction to cryptography and cellular automata and various encryption scheme based on cellular automata. Various performance measures related to the analysis of encryption techniques have been studied. And a comparison of encryption techniques based on the performance matrices is presented. The paper gives a concluding remark on the advancement in the field of image encryption.

Research paper thumbnail of Analysis and Interpretation of Coronary Artery Blockage using Soft Computing Techniques

IOSR Journal of Computer Engineering, May 1, 2016

Analysis and interpretation of Myocardial infarction, is very important at the early stage to det... more Analysis and interpretation of Myocardial infarction, is very important at the early stage to detect the possible risk for heart attacks. Various non-invasive imaging modalities have been used for better diagnosis. Cardiologist wants better image resolution and detailed descriptions of the ROI (Region of Interest). In the present paper, the images have been pre-processed for further applications like filtering, denoising and deblurring by using various techniques like the usages of average and median filter, soft thresholding for various segmentation coronary blockages.The vessel segmentation taken from CT angiogram DICOM images. The vessel segmentation X-Ray image has been processed by fuzzy system. The gradient of the image has been taken after the conversion into double precision. 24 different 'If Then' rules have been initiated and the defuzzification method has been done by centriod method.

Research paper thumbnail of A Survey of Middleware in different languages for Ubiquitous Services

The advent of abrupt advancement in technology and availability of numerous applications has made... more The advent of abrupt advancement in technology and availability of numerous applications has made it imperative to adopt a technology that is felicitous for every domain. There exists a huge count of technologies working in all domains. The transient nature of technology itself is a reason for it being obsolete. Enterprise application development (EAI) solutions support many ongoing projects ranging from proprietary, open or academic projects to scientific experiments. After analysing various middleware, we agreed on the fact that a language works best in a specific domain but may not be amicable with other domains. The rapid augmentation in technology and unstable requirements are responsible for having dearth in languages. Therefore, succinctly the environment is unstable and will be in future as well. This research discusses middleware technologies available in various languages. In this paper, on the basis of literature survey we present a comparative analysis of their features, flexibility, scalability and tradeoffs and making it impeccable at some extent is what we aspire.

Research paper thumbnail of A hybrid system for detection and diagnosis of novel corona virus

Nucleation and Atmospheric Aerosols, 2022

Research paper thumbnail of A Thorough Insight into Theoretical and Practical Developments in MultiAgent Systems

IGI Global eBooks, 2020

Multiagent systems have been a fascination for research community and are often seen as an intell... more Multiagent systems have been a fascination for research community and are often seen as an intelligent solution to many complex real world problems. Researchers have been active in the domain since last three decades and many developments pertaining to theoretical design and practical developments of multiagent systems are worth appreciating. The growth in MAS is multidirectional ranging from conceptual ideas to practical implementations and from the wide range of applications; it appears that multiagent systems are proving to be universal. The paper presents a concise survey of developments in MAS highlighting the important contributions in the field and also questions the universal applicability of agents.

Research paper thumbnail of Classification of Micro-Calcification in Breast from Mammographic Images using Transfer Learning

International journal of recent technology and engineering, Jan 30, 2020

Early detection of cancer is most important for long term survival of patient. Now a days CADx ar... more Early detection of cancer is most important for long term survival of patient. Now a days CADx are widely used for early identification of breast cancer automatically. CAD uses significant features to identify and categorize cancer. CADx based on Convolutional Neural Network are becoming popular now a days due to extracting relevant features automatically. CNNs can be trained from scratch for medical images due to various input sizes and tumor structures. But due to limited amount of medical images available for training ,we have used transfer learning approach.We developed a deep learning framework based on CNN to discriminate the breast tumor either benign or malignant using transfer learning. We used digital mammographic images containing both views from CBIS-DDSM database. We have achived training(100%) and validation accuracy greater than 90% with minimum training and validation loss. We have also compared the reaults with transfer learning using pretrained network alexnet and googlenet on same dataset.

Research paper thumbnail of Threshold segmentation technique for tumor detection using morphological operator

Research paper thumbnail of A novel algorithm of weighted fuzzy spatial association rule mining (WFSARM) for wasteland reclamation

Journal of Information and Optimization Sciences

Abstract Wasteland reclamation is one of the ways in which the arable land can be increased. Weig... more Abstract Wasteland reclamation is one of the ways in which the arable land can be increased. Weighted fuzzy spatial association rules could be used for associating wastelands with ground water and soil quality. The quality of wasteland, ground water and soil are used to provide weight. The association rules mined need to be further subjected to an interestingness measure that defines their utility. For the given challenge the authors propose a new algorithm for weighted fuzzy spatial association rule mining for wasteland reclamation (WFSARM) and ranking them on interestingness measures. Here, two new measures called faith and weight-area score are introduced. Multiple minimum faith thresholds are used for pruning of itemsets. The comparative analysis shows that the proposed algorithm is ef ficient and scalable and mines more number of rules as compared to Apriori algorithm. The results are viewed using GIS tool.

Research paper thumbnail of Application of Steganography Technique in Cloud Computing

2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), 2019

Cloud computing has played a significant role in data and information management through availing... more Cloud computing has played a significant role in data and information management through availing computer system resources for all users without direct active management. In return, a considerable population has embarked on cloud computing to share data and information and communicate through the platform hence enjoying the benefit. However, data security is a crucial aspect in cloud computing as a way of assuring users of their confidentiality and safety of data and information stored and transferred through the platform. As a result, the need for data security techniques has facilitated the evolution of different techniques necessary for ensuring the safety of data and information through the platform hence ensuring effective communication channels. Therefore, Steganography techniques have been identified as one of the cloud computing techniques necessary for enhancing cloud data security. In return, this paper analyzes the application of stenography technique in cloud computing as an approach to enhance cloud data security

Research paper thumbnail of Classical Image Segmentation Techniques for Detection of Anti-personnel Landmines

Research paper thumbnail of Fully Automated Digital Mammogram Segmentation

Research paper thumbnail of Analysis and interpretation of segmentation techniques based on delaunay triangulation and iterative thresholding explicitly used for detection of anti-personnel landmines

2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016

This paper deals with an attempt to detect anti-personnel landmines from images acquired in the v... more This paper deals with an attempt to detect anti-personnel landmines from images acquired in the visible spectrum. Segmentation techniques used includes Iterative Thresholding and Delaunay Triangulation using Morphological Thinning. Homomorphic Filtering is used for image pre-processing. Results have been tabulated and statistical parameters have been calculated from the gray level co-occurrence matrix. Iterative thresholding proved to be a better segmentation technique than Delaunay Triangulation. This work provides the basis for future analysis.

Research paper thumbnail of Biometric Template Protection Scheme-Cancelable Biometrics

Lecture Notes in Electrical Engineering, 2019

Biometric template is actually digital representation of the biometric features that are extracte... more Biometric template is actually digital representation of the biometric features that are extracted by applying different algorithms on the captured images of different types of biometric modalities. This digital information is stored in a biometric database for identification and authentication purposes. The objective of this paper discussed about cancelable Biometric template protection scheme. The idea behind cancelable biometrics is intentionally and repeatedly alteration of biometric features in such a way so that the data or biometric features will be protected.

Research paper thumbnail of Integration of GIS, Spatial Data Mining, and Fuzzy Logic for Agricultural Intelligence

Advances in Intelligent Systems and Computing, 2017

With increasing population and decreasing crop production, there is an enormous need to increase ... more With increasing population and decreasing crop production, there is an enormous need to increase land under cultivation. This paper attempts to explore the applicability of spatial data mining integrated with Geographic Information System (GIS) and fuzzy logic for Agricultural Intelligence. The research uses thematic agricultural data of Jodhpur District of Rajasthan state and mines spatial association rules between groundwater, wastelands, and soils of Jodhpur District which are then used to create Mamdani fuzzy inference system for determining the utilization of wastelands. A taluk-wise map of Jodhpur district is created from the fuzzy values showing the utilization of wastelands. Analysis of results showed that out of 36,063 hectares of mined pattern, Phalodi taluk of Jodhpur district contains the largest wasteland area and the area under the medium type of utilization is the largest. It could be suggested that wastelands having a substantial groundwater underneath can be irrigated for agriculture and/or producing fodder and firewood.

Research paper thumbnail of Comparative Analysis of Fingerprint Classification Algorithms- A review

International Journal of Computer Sciences and Engineering, 2018

Research paper thumbnail of A clustered neighbourhood consensus algorithm for a generic agent interaction protocol

International Journal of Advanced Intelligence Paradigms, 2019

This paper significantly contributes a consensus algorithm to enhance the efficiency of existing ... more This paper significantly contributes a consensus algorithm to enhance the efficiency of existing generic interaction protocol for multiagent systems (GIPMAS). The proposed algorithm is marriage of neighbourhood algorithm and discrete time consensus protocol and the neighbourhood algorithm focuses on providing more weight to communication links/edges joining two clusters as compared to links joining two agents in a cluster, which increases rate of convergence of information. Thus, in clustered network of agents, cluster head and executive cluster head would be responsible for deriving consensus in the received information. Simulation reflects that proposed mechanism improves time of convergence of information. However, slight increase in task execution is also observed due to trade-off between quality of output and complexity of mechanism.

Research paper thumbnail of Heuristic Search Attacks on Gradual Secret Release Protocol: a Cryptanalysis Approach on E-Learning Security

International Review on Computers and Software, Dec 31, 2013

ABSTRACT Crypt-analysis on GSR fair exchange protocol to study and analyse the robustness of the ... more ABSTRACT Crypt-analysis on GSR fair exchange protocol to study and analyse the robustness of the protocol. In order to perform the crypt-analysis, heuristic attacks are to be over the protocol. The heuristic attacks can be termed as the attacks, which are artificially generated by various heuristic search algorithms. This work intend to use renowned heuristic search algorithms such as Genetic algorithm (GA) and Particle Swarm Optimization Algorithm (PSO) and a latest search algorithm such as cuckoo search (CS). GA and PSO have been applied for crypt-analysis of various protocols and encryption standards. CS is an emerging search algorithm and it proved the performance in solving optimization problems. Based on the aforesaid peculiarities, perform crypt-analysis based on such algorithms. Under various algorithm parameters, attacks will be made over the protocol and the performance will be studied. The protocol and the search algorithms will be implemented in MATLAB and the results will be analysed in depth to study the robustness of the protocol under such security issues.

Research paper thumbnail of A Clustering-Based Generic Interaction Protocol for Multiagent Systems

Advances in Intelligent Systems and Computing, 2016

The paper proposes a clustering based Generic Interaction Protocol for Multiagent Systems (GIPMAS... more The paper proposes a clustering based Generic Interaction Protocol for Multiagent Systems (GIPMAS) that exploits clustering methodology for establishing interaction among agents operating in a network of multiagent systems. GIPMAS is a hierarchical protocol that supports intelligent formation of clusters and dynamic election of cluster head and executive cluster head as well. It also describes a recovery mechanism in case cluster head relocates from its respective cluster.

Research paper thumbnail of Test Case Prioritization & Selection for an Object Oriented Software using Genetic Algorithm

International Journal of Engineering and Advanced Technology, 2020

In this paper our aim is to propose a Test Case Selection and Prioritization technique for OOP fo... more In this paper our aim is to propose a Test Case Selection and Prioritization technique for OOP for ordering the test cases as per in accordance with their priority for finding the faults in the OOS. We have used the heuristic Genetic Algorithm, in order to generating the order of these prioritized test cases for a given OOS. The motive is to put a test case first into the ordered sequence that may have the highest prospective of finding an error in the given OOS & then soon.