Dr Pratosh Bansal | Devi Ahilya University (DAVV) (original) (raw)

Papers by Dr Pratosh Bansal

Research paper thumbnail of A Machine Learning-Based Dynamic Method for Detecting Vulnerabilities in Smart Contracts

Zenodo (CERN European Organization for Nuclear Research), Sep 30, 2022

Real-world application development through Smart Contracts on the Ethereum Blockchain platform is... more Real-world application development through Smart Contracts on the Ethereum Blockchain platform is one of the emerging technologies. It also has much vulnerability, and reentrancy is among the most popular ones. In our work, we have reviewed the tools based on ML for vulnerability detection in Ethereum smart contracts. Based on that, we proposed a framework that can dynamically monitor threats based on the blockchain platform's transaction meta-data and balance data. It does not require any changes or updates to the existing system and does not require expertise to implement. This framework will extract features for machine learning classifier models from the transaction data and identify the transaction as agreeable or unfavorable. It will help to identify the reentrancy threat as well as the cause of it and help the developer to trace it from where the attack is generated. In the ML classifier for the framework, random forest and decision tree are used. The cumulative performance of both is 98 percent on 540 transactions.

Research paper thumbnail of Feature Selection Using Information Gain for Software Effort Prediction Using Neural Network Model

Lecture notes in electrical engineering, 2022

Research paper thumbnail of Performance Analysis of Flower Pollination Algorithms Using Statistical Methods: An Overview

Advances in Intelligent Systems and Computing

Research paper thumbnail of A review on tea quality and safety using emerging parameters

Journal of Food Measurement and Characterization, 2022

The world's high-value crop is tea, its aspect plays a powerful role in its marketability. Te... more The world's high-value crop is tea, its aspect plays a powerful role in its marketability. Tea is the utmost extensively absorb aromatic beverage with the legion of health benefit and respond as a remedy for various disease like neurological disorder and cardiovascular. The emerging, spectroscopic and classified approaches for safety and quality assessment determination like electrochemical method, microbial of tea are very effective. These approaches improve the accuracy and sensitivity of the standard and direct technique and increase the speed of the detection process. Also, the approaches are non-destructive, cost-effective, and rapid that provides real-time detection. Application of these approaches in the tea industry from picking, fermentation, sensor evaluation, developing portable devices for real-time safety assessment benefits the tea production mechanism. Recently, colorimetric and chromatography techniques have been reported in several stages of tea processing that are expensive, laborious and inaccurate, and time-consuming. Here, computer vision and deep learning can be explored to overcome inconsistency and inaccuracy. This paper presents an overview of the processing of tea, type of tea, the microbiology of tea, safety & quality evaluation, standard & emerging techniques, and electrochemical detection using separation method, bio electrochemical sensor, and health benefits of tea with distinct tea contaminates. This paper also includes the analytical comparison of distinct approaches proposed by the different researchers for quality analysis of tea and its products. This potential review may guide for evaluation and detection of tea products which further promotes the development of the food industry.

Research paper thumbnail of Smart Contract Security and Privacy Taxonomy, Tools, and Challenges

Data Science and Security, 2021

Blockchain smart contract technology implementations are growing rapidly. The resilient and accur... more Blockchain smart contract technology implementations are growing rapidly. The resilient and accurate design of smart contracts for these intelligent applications however is a huge challenge because of the complexities involved. Smart Contract modernizes traditional processes of production, technology, and industry. It is self-verifiable, self-executable, and enclosed in Blockchain that removes the demand of trustworthy mediator. The major issue that needs to be addressed to make smart contract successful is security and privacy issues. In the paper, a survey was conducted on available taxonomy for security and privacy concerns and a new taxonomy proposed that could accommodate all potential threats. A detailed review of available security and privacy audit tools has also been done for common smart contract platforms. At last, identified the challenges required to be addressed to make the smart contract more efficient.

Research paper thumbnail of A Novel Approach for Copy Move Forgery Detection Using Template Matching

Advances in Intelligent Systems and Computing, 2017

Digital Photographs are most powerful and trustworthy media for conveying thoughts, emotions or m... more Digital Photographs are most powerful and trustworthy media for conveying thoughts, emotions or message. Even only a single image is sufficient to reflect every situation or scenario. During past few years, various digital image manipulation tools came into picture and number is increasing. Editing software is available either at nominal rate or free of cost. Edit or alter any digital image for fun and other purposes is now a common practice. Sometimes need arises to check authenticity and originality of image. Digital image forensics plays an important role in this situation. Out of several image forgery methods Copy Move Forgery is one of the easy and effective method. Copy Move Forgery can be used with the intention of either to hide something in the image or to duplicate one region in an image. A study has been carried out to identify suitable scheme for detection of Copy Move Forgery especially in coloured digital images. The proposed scheme uses the concept of template matching.

Research paper thumbnail of Evolution of cloud computing and related security concerns

2016 Symposium on Colossal Data Analysis and Networking (CDAN), 2016

Cloud Computing, what many are saying is future of computing in both technical and social aspects... more Cloud Computing, what many are saying is future of computing in both technical and social aspects. It defines the path ahead in the world of computer science. The idea of centralizing and storing our data in various data centers overviewed by others is nothing new but it is taken from many popular approaches, one of which is grid computing. This idea is up from around twentieth century. It offers software's and platforms as a service. It is highly flexible and cost efficient. This new paradigm is full with enormous opportunities and large scale future prospects. This paper gives you an introduction of cloud computing and its work-areas plus provides the security benefits and potential security threats/breaches.

Research paper thumbnail of Benchmarking of Digital Forensic Tools

New Trends in Computational Vision and Bio-inspired Computing, 2020

Research paper thumbnail of Analysis of Hindi-English Poetry Translation through Machine Translation Systems

2021 5th International Conference on Information Systems and Computer Networks (ISCON), 2021

Poetry is an expression of feelings. A poem is a thing which could be either sing or sometimes at... more Poetry is an expression of feelings. A poem is a thing which could be either sing or sometimes at least hummable. Over the years, specific rules have been defined for the structures and categories of the poems which can help in making them lyrical and rhythmic, although, all languages might have their own rules for the poems. Poetry translations through machines (computer systems) are very crucial and considered to be impossible tasks. Most of the times, Poetry translation of English language to other native languages may become quite easy but vice-versa is the toughest. The reasons are varieties in structures, categories and own emotions of the native languages. Numerous efforts have been applied around the world towards the poetries machine translations from native languages into English. This research presents rigorous survey for such kinds of poetry machine translation systems and their quality and accuracy measurement techniques. It also gives an idea of Hindi (our national and main native) language poetry machine translations into English Language. Further, a deep analysis and sources (corpuses) have been discussed for existing Hindi to English Machine Translations systems. At last, the research also discusses the importance of the Hindi to English Machine Translations systems [1] [2].

Research paper thumbnail of Machine translation model for effective translation of Hindi poetries into English

Journal of Experimental & Theoretical Artificial Intelligence, 2020

The Word Sense Disambiguation (WSD) is a process of disambiguating the sense of the text accordin... more The Word Sense Disambiguation (WSD) is a process of disambiguating the sense of the text according to its context. Machine translation is one of the challenging task since it requires effective rep...

Research paper thumbnail of Couplets Translation from English to Hindi Language

We are a part of that society which has different-different cultures, languages, rituals, etc. Th... more We are a part of that society which has different-different cultures, languages, rituals, etc. There are some sentences which we used to say someone at particular situation or to motivate someone which we called as couplets. A couplet is a pair of consecutive lines of rhythm in poetry. Couplet usually consists of two consecutive lines that poem has the same rhythm. Couplets are balanced in length and word segmentation, in a manner that matching words in the two consecutive sentences match each other by observing certain limitation on semantic, syntactic, and lexical connection. In this research, authors have tried to translate few couplets from English to Hindi language and this kind of task comes under the umbrella of natural language processing. In continuation of the same, authors have used a statistical machine translation (SMT) approach for producing good results (of English to Hindi translation of couplets).

Research paper thumbnail of Enhancing Trust and Immutability in Cloud Forensics

Research paper thumbnail of Phrase-Based Statistical Machine Translation of Hindi Poetries into English

Research paper thumbnail of Authentication Process Using Secure Sum for a New Node in Mobile Ad Hoc Network

Wireless Mobile Ad hoc Networks (MANET) provide the facility of quick deployment. Ad hoc networks... more Wireless Mobile Ad hoc Networks (MANET) provide the facility of quick deployment. Ad hoc networks are useful in various situations, where the time for planning of network deployment is not enough. They set on the fly concept. Most of the setups are unplanned. Some of the unplanned networks do not require high security, while some require more. As such networks are deployed without preparation, later may require additional nodes that will help in the ongoing activities. During the working of the network, some unwanted nodes may also try to get entry into the network. To grant entry to a genuine new node and to avoid unwanted nodes in the network, needs an initial-level authentication process that allows a new node to be part of the network. The paper proposes an algorithm Algo_Authenticate_Node for authentication of a new node using the concept of the secured sum. It provides initial-level security. An algorithm is developed for short-span mobile ad hoc network.

Research paper thumbnail of Implementation of Hindi to English Idiom Translation System

International Conference on Advanced Computing Networking and Informatics, 2018

Idiom plays a significant role in a language literature (Sinha in A system for identification of ... more Idiom plays a significant role in a language literature (Sinha in A system for identification of idioms in Hindi. IEEE, 2014 [1]). It enhances the glory of the language which contains it. As idiom points to a figurative meaning (Anastasiou in Idiom treatment experiments in machine translation, 2010 [2]), i.e., the meaning different from the word set present in that idiom, it becomes difficult for the machines to translate them. This paper proposes an achievable implementation way of Hindi to English idiom translation using a hybrid approach which consists of interlingual-based approach combined with the transfer-based approach. This paper also provides details on system requirements, algorithm, database connection, and result analysis.

Research paper thumbnail of Emphasizing on Various Security Issues in Cloud Forensic Framework

Indian Journal of Science and Technology, 2017

Objectives: To provide a competent secure framework for the cloud forensics system with enhanceme... more Objectives: To provide a competent secure framework for the cloud forensics system with enhancement of security in various phases of forensics investigation method. Methods/Statistical analysis: The various issues has been raised in above study about existing cloud forensics framework as security concern has been discussed during the evidence identification and collection, during acquisition, during preservation and during analysis and reporting. The study unveils about the requirement of various security parameters during the entire chain of custody in cloud system. Findings: The major finding is related to security concern in various phases. Coming towards the initial stage of identification and collection, it is not easy to execute these tasks. Since cloud data is stored in multiple data center and using conventional method for identification of evidence is a tedious job. Because of cloud distributing nature it is not easy to collect all evidence from these servers, as thousands of servers are running globally across data center and securing this evidence is the major task. After that level key challenges is locations of data centers and data acquisition from a large data set. The remote location of data centers and client machine may require stateless communication. Predictable time duration for data acquisition from remote data centers in comparison with local computer demoralize the investigation process and make it overwhelming for a moment of time. Furthermore, erroneous evidence acquisition not only wastes investigation effort but may lead the complete investigation into the wrong manner. After that concern is about log file format, analyzing logs is challenge due to unification issue. Also at time of reporting main challenge occur for choosing the right court of law; Cross boarder verification is a big issue during investigation, and then exchanging data between two countries needs more privacy. Application/Improvements: Strong secrecy for evidence identification and collection, with enhanced privacy level and improved chain of custody method. Recovery of data in cloud can be faster, which will help in disaster recovery also due to a unified format. And finally appropriate secure integrated framework may lead to resolve cases quickly.

Research paper thumbnail of Approaches for Improving Hindi to English Machine Translation System

Indian Journal of Science and Technology, 2017

Objectives: To provide approaches for effective Hindi-to-English Machine Translation (MT) that ca... more Objectives: To provide approaches for effective Hindi-to-English Machine Translation (MT) that can be helpful in inexpensive and ease implementation of and MT systems. Methods/Statistical Analysis: Structure of the Hindi and English languages have been studied thoroughly. The possible steps towards the Natural languages have also been studied. The methods, rules, approaches, tools, resources etc. related to MT have been discussed in detail. Findings: MT is an idea for automatic translation of a language. India is the country with full of diversity in culture and languages. More than 20 regional languages are spoken along with several dialects. Hindi is a widely spoken language in all the states of country. A lot of literature, poetries and valuable texts are available in Hindi which gives opportunities to retranslate into English. However, new generation is learning English rapidly and also showing keenness to learn it in simplified lucid manner. Several efforts have been made in this direction. A large number of approaches and solutions exist for MT still there is a huge scope. The paper addresses the challenges of MT and solution efforts made in this direction. This motivates researchers to implement new Hindi-to-English Machine translation systems. Application/Improvements: Efficient, inexpensive and ease translation for available Hindi literature, poetries and other valuable texts into English. Children can easily learn the culture through the poetries and literatures hence the Machine Translation of these will bring wonderful impact.

Research paper thumbnail of A Survey of Attacks and Countermeasures for Denial of Services (DoS) in Wireless Ad hoc Networks

Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies - ICTCS '16, 2016

Wireless networks provide an easier way of communication to its users. Network without infrastruc... more Wireless networks provide an easier way of communication to its users. Network without infrastructure are more flexible in deployment. Ad hoc networks are such networks that do not require a planned infrastructure during its establishment. Network with many advantages also have shortcomings. Ad hoc networks have resource constraints like limited bandwidth, battery power, short communication range, less computation power, open channel, short life time. These characteristics of ad hoc networks make them vulnerable for attacks. A malicious node, either from outside or from inside of network, may tries to disturb the network operations and try to consume network resources. Such attacks are called Denial of Services (DoS) attacks. These are more dangerous attacks among the others. They are not easily identifiable. A Denial of Service (DoS) attacker tries to vanish the resources of genuine users of network to make them unavailable for the network. The focus of this paper is to outline various types of DoS attacks. It also includes the effect of attack on node and network services. Later it gives the defense mechanism suggested by researchers for DoS attack and the other security measures that can be incorporate to avoid such attacks.

Research paper thumbnail of Phrase-Based Statistical Machine Translation of Hindi Poetries into English by incorporating Word Sense Disambiguation

Statistical machine translation (SMT) is a variant of machine translation where the translations ... more Statistical machine translation (SMT) is a variant of machine translation where the translations are handled with statistically defined rules. Numerous researchers have attempted to build the framework which can comprehend the different dialects to translate from one source language to another target language. However, the focus on translation of poetry is less. Reliable and rapid transliteration of the poetry is very mandatory for the execution of the computer to translate the poem from one language to another. The existing approach has several issues, such as, time consumption, quality of the translation process, and matching of similar words. To overcome these issues, we propose a phrase-based statistical machine translation (PSMT) with special adherence to word sense disambiguation (WSD). The quality of the translation is increased by sensing the ambiguous words with WSD. The Hindi WordNet along with the Lesk algorithm identifies the ambiguous words and senses the exact meaning ...

Research paper thumbnail of An Empirical Review on Blockchain Smart Contracts: Application and Challenges in Implementation

International Journal of Computer Networks and Applications, 2020

This paper focuses on an extensive review of Blockchain Smart contract applications in real-world... more This paper focuses on an extensive review of Blockchain Smart contract applications in real-world scenarios and challenges in it. As in today's world, Blockchain has got tremendous importance in different types of services, so it will be beneficial to analyze the loopholes in the cybersecurity aspect as well as other technical issues in privacy and governance. A smart contract is the software code that comprises a self-executed set of rules and regulations that runs on Blockchain. To implement various real-world services over different decentralized platforms, a lot of research work is going on. In this paper, a detailed review is done on more than 100 latest published documents based on the Blockchain Smart contract and applications. By following the systematic mapping research methodology first, we have identified paper relevant to our research domain, and then by applying various filters, we extracted relevant information. At last, the article highlighted the challenges and research gaps that have to be addressed in the future.

Research paper thumbnail of A Machine Learning-Based Dynamic Method for Detecting Vulnerabilities in Smart Contracts

Zenodo (CERN European Organization for Nuclear Research), Sep 30, 2022

Real-world application development through Smart Contracts on the Ethereum Blockchain platform is... more Real-world application development through Smart Contracts on the Ethereum Blockchain platform is one of the emerging technologies. It also has much vulnerability, and reentrancy is among the most popular ones. In our work, we have reviewed the tools based on ML for vulnerability detection in Ethereum smart contracts. Based on that, we proposed a framework that can dynamically monitor threats based on the blockchain platform's transaction meta-data and balance data. It does not require any changes or updates to the existing system and does not require expertise to implement. This framework will extract features for machine learning classifier models from the transaction data and identify the transaction as agreeable or unfavorable. It will help to identify the reentrancy threat as well as the cause of it and help the developer to trace it from where the attack is generated. In the ML classifier for the framework, random forest and decision tree are used. The cumulative performance of both is 98 percent on 540 transactions.

Research paper thumbnail of Feature Selection Using Information Gain for Software Effort Prediction Using Neural Network Model

Lecture notes in electrical engineering, 2022

Research paper thumbnail of Performance Analysis of Flower Pollination Algorithms Using Statistical Methods: An Overview

Advances in Intelligent Systems and Computing

Research paper thumbnail of A review on tea quality and safety using emerging parameters

Journal of Food Measurement and Characterization, 2022

The world's high-value crop is tea, its aspect plays a powerful role in its marketability. Te... more The world's high-value crop is tea, its aspect plays a powerful role in its marketability. Tea is the utmost extensively absorb aromatic beverage with the legion of health benefit and respond as a remedy for various disease like neurological disorder and cardiovascular. The emerging, spectroscopic and classified approaches for safety and quality assessment determination like electrochemical method, microbial of tea are very effective. These approaches improve the accuracy and sensitivity of the standard and direct technique and increase the speed of the detection process. Also, the approaches are non-destructive, cost-effective, and rapid that provides real-time detection. Application of these approaches in the tea industry from picking, fermentation, sensor evaluation, developing portable devices for real-time safety assessment benefits the tea production mechanism. Recently, colorimetric and chromatography techniques have been reported in several stages of tea processing that are expensive, laborious and inaccurate, and time-consuming. Here, computer vision and deep learning can be explored to overcome inconsistency and inaccuracy. This paper presents an overview of the processing of tea, type of tea, the microbiology of tea, safety & quality evaluation, standard & emerging techniques, and electrochemical detection using separation method, bio electrochemical sensor, and health benefits of tea with distinct tea contaminates. This paper also includes the analytical comparison of distinct approaches proposed by the different researchers for quality analysis of tea and its products. This potential review may guide for evaluation and detection of tea products which further promotes the development of the food industry.

Research paper thumbnail of Smart Contract Security and Privacy Taxonomy, Tools, and Challenges

Data Science and Security, 2021

Blockchain smart contract technology implementations are growing rapidly. The resilient and accur... more Blockchain smart contract technology implementations are growing rapidly. The resilient and accurate design of smart contracts for these intelligent applications however is a huge challenge because of the complexities involved. Smart Contract modernizes traditional processes of production, technology, and industry. It is self-verifiable, self-executable, and enclosed in Blockchain that removes the demand of trustworthy mediator. The major issue that needs to be addressed to make smart contract successful is security and privacy issues. In the paper, a survey was conducted on available taxonomy for security and privacy concerns and a new taxonomy proposed that could accommodate all potential threats. A detailed review of available security and privacy audit tools has also been done for common smart contract platforms. At last, identified the challenges required to be addressed to make the smart contract more efficient.

Research paper thumbnail of A Novel Approach for Copy Move Forgery Detection Using Template Matching

Advances in Intelligent Systems and Computing, 2017

Digital Photographs are most powerful and trustworthy media for conveying thoughts, emotions or m... more Digital Photographs are most powerful and trustworthy media for conveying thoughts, emotions or message. Even only a single image is sufficient to reflect every situation or scenario. During past few years, various digital image manipulation tools came into picture and number is increasing. Editing software is available either at nominal rate or free of cost. Edit or alter any digital image for fun and other purposes is now a common practice. Sometimes need arises to check authenticity and originality of image. Digital image forensics plays an important role in this situation. Out of several image forgery methods Copy Move Forgery is one of the easy and effective method. Copy Move Forgery can be used with the intention of either to hide something in the image or to duplicate one region in an image. A study has been carried out to identify suitable scheme for detection of Copy Move Forgery especially in coloured digital images. The proposed scheme uses the concept of template matching.

Research paper thumbnail of Evolution of cloud computing and related security concerns

2016 Symposium on Colossal Data Analysis and Networking (CDAN), 2016

Cloud Computing, what many are saying is future of computing in both technical and social aspects... more Cloud Computing, what many are saying is future of computing in both technical and social aspects. It defines the path ahead in the world of computer science. The idea of centralizing and storing our data in various data centers overviewed by others is nothing new but it is taken from many popular approaches, one of which is grid computing. This idea is up from around twentieth century. It offers software's and platforms as a service. It is highly flexible and cost efficient. This new paradigm is full with enormous opportunities and large scale future prospects. This paper gives you an introduction of cloud computing and its work-areas plus provides the security benefits and potential security threats/breaches.

Research paper thumbnail of Benchmarking of Digital Forensic Tools

New Trends in Computational Vision and Bio-inspired Computing, 2020

Research paper thumbnail of Analysis of Hindi-English Poetry Translation through Machine Translation Systems

2021 5th International Conference on Information Systems and Computer Networks (ISCON), 2021

Poetry is an expression of feelings. A poem is a thing which could be either sing or sometimes at... more Poetry is an expression of feelings. A poem is a thing which could be either sing or sometimes at least hummable. Over the years, specific rules have been defined for the structures and categories of the poems which can help in making them lyrical and rhythmic, although, all languages might have their own rules for the poems. Poetry translations through machines (computer systems) are very crucial and considered to be impossible tasks. Most of the times, Poetry translation of English language to other native languages may become quite easy but vice-versa is the toughest. The reasons are varieties in structures, categories and own emotions of the native languages. Numerous efforts have been applied around the world towards the poetries machine translations from native languages into English. This research presents rigorous survey for such kinds of poetry machine translation systems and their quality and accuracy measurement techniques. It also gives an idea of Hindi (our national and main native) language poetry machine translations into English Language. Further, a deep analysis and sources (corpuses) have been discussed for existing Hindi to English Machine Translations systems. At last, the research also discusses the importance of the Hindi to English Machine Translations systems [1] [2].

Research paper thumbnail of Machine translation model for effective translation of Hindi poetries into English

Journal of Experimental & Theoretical Artificial Intelligence, 2020

The Word Sense Disambiguation (WSD) is a process of disambiguating the sense of the text accordin... more The Word Sense Disambiguation (WSD) is a process of disambiguating the sense of the text according to its context. Machine translation is one of the challenging task since it requires effective rep...

Research paper thumbnail of Couplets Translation from English to Hindi Language

We are a part of that society which has different-different cultures, languages, rituals, etc. Th... more We are a part of that society which has different-different cultures, languages, rituals, etc. There are some sentences which we used to say someone at particular situation or to motivate someone which we called as couplets. A couplet is a pair of consecutive lines of rhythm in poetry. Couplet usually consists of two consecutive lines that poem has the same rhythm. Couplets are balanced in length and word segmentation, in a manner that matching words in the two consecutive sentences match each other by observing certain limitation on semantic, syntactic, and lexical connection. In this research, authors have tried to translate few couplets from English to Hindi language and this kind of task comes under the umbrella of natural language processing. In continuation of the same, authors have used a statistical machine translation (SMT) approach for producing good results (of English to Hindi translation of couplets).

Research paper thumbnail of Enhancing Trust and Immutability in Cloud Forensics

Research paper thumbnail of Phrase-Based Statistical Machine Translation of Hindi Poetries into English

Research paper thumbnail of Authentication Process Using Secure Sum for a New Node in Mobile Ad Hoc Network

Wireless Mobile Ad hoc Networks (MANET) provide the facility of quick deployment. Ad hoc networks... more Wireless Mobile Ad hoc Networks (MANET) provide the facility of quick deployment. Ad hoc networks are useful in various situations, where the time for planning of network deployment is not enough. They set on the fly concept. Most of the setups are unplanned. Some of the unplanned networks do not require high security, while some require more. As such networks are deployed without preparation, later may require additional nodes that will help in the ongoing activities. During the working of the network, some unwanted nodes may also try to get entry into the network. To grant entry to a genuine new node and to avoid unwanted nodes in the network, needs an initial-level authentication process that allows a new node to be part of the network. The paper proposes an algorithm Algo_Authenticate_Node for authentication of a new node using the concept of the secured sum. It provides initial-level security. An algorithm is developed for short-span mobile ad hoc network.

Research paper thumbnail of Implementation of Hindi to English Idiom Translation System

International Conference on Advanced Computing Networking and Informatics, 2018

Idiom plays a significant role in a language literature (Sinha in A system for identification of ... more Idiom plays a significant role in a language literature (Sinha in A system for identification of idioms in Hindi. IEEE, 2014 [1]). It enhances the glory of the language which contains it. As idiom points to a figurative meaning (Anastasiou in Idiom treatment experiments in machine translation, 2010 [2]), i.e., the meaning different from the word set present in that idiom, it becomes difficult for the machines to translate them. This paper proposes an achievable implementation way of Hindi to English idiom translation using a hybrid approach which consists of interlingual-based approach combined with the transfer-based approach. This paper also provides details on system requirements, algorithm, database connection, and result analysis.

Research paper thumbnail of Emphasizing on Various Security Issues in Cloud Forensic Framework

Indian Journal of Science and Technology, 2017

Objectives: To provide a competent secure framework for the cloud forensics system with enhanceme... more Objectives: To provide a competent secure framework for the cloud forensics system with enhancement of security in various phases of forensics investigation method. Methods/Statistical analysis: The various issues has been raised in above study about existing cloud forensics framework as security concern has been discussed during the evidence identification and collection, during acquisition, during preservation and during analysis and reporting. The study unveils about the requirement of various security parameters during the entire chain of custody in cloud system. Findings: The major finding is related to security concern in various phases. Coming towards the initial stage of identification and collection, it is not easy to execute these tasks. Since cloud data is stored in multiple data center and using conventional method for identification of evidence is a tedious job. Because of cloud distributing nature it is not easy to collect all evidence from these servers, as thousands of servers are running globally across data center and securing this evidence is the major task. After that level key challenges is locations of data centers and data acquisition from a large data set. The remote location of data centers and client machine may require stateless communication. Predictable time duration for data acquisition from remote data centers in comparison with local computer demoralize the investigation process and make it overwhelming for a moment of time. Furthermore, erroneous evidence acquisition not only wastes investigation effort but may lead the complete investigation into the wrong manner. After that concern is about log file format, analyzing logs is challenge due to unification issue. Also at time of reporting main challenge occur for choosing the right court of law; Cross boarder verification is a big issue during investigation, and then exchanging data between two countries needs more privacy. Application/Improvements: Strong secrecy for evidence identification and collection, with enhanced privacy level and improved chain of custody method. Recovery of data in cloud can be faster, which will help in disaster recovery also due to a unified format. And finally appropriate secure integrated framework may lead to resolve cases quickly.

Research paper thumbnail of Approaches for Improving Hindi to English Machine Translation System

Indian Journal of Science and Technology, 2017

Objectives: To provide approaches for effective Hindi-to-English Machine Translation (MT) that ca... more Objectives: To provide approaches for effective Hindi-to-English Machine Translation (MT) that can be helpful in inexpensive and ease implementation of and MT systems. Methods/Statistical Analysis: Structure of the Hindi and English languages have been studied thoroughly. The possible steps towards the Natural languages have also been studied. The methods, rules, approaches, tools, resources etc. related to MT have been discussed in detail. Findings: MT is an idea for automatic translation of a language. India is the country with full of diversity in culture and languages. More than 20 regional languages are spoken along with several dialects. Hindi is a widely spoken language in all the states of country. A lot of literature, poetries and valuable texts are available in Hindi which gives opportunities to retranslate into English. However, new generation is learning English rapidly and also showing keenness to learn it in simplified lucid manner. Several efforts have been made in this direction. A large number of approaches and solutions exist for MT still there is a huge scope. The paper addresses the challenges of MT and solution efforts made in this direction. This motivates researchers to implement new Hindi-to-English Machine translation systems. Application/Improvements: Efficient, inexpensive and ease translation for available Hindi literature, poetries and other valuable texts into English. Children can easily learn the culture through the poetries and literatures hence the Machine Translation of these will bring wonderful impact.

Research paper thumbnail of A Survey of Attacks and Countermeasures for Denial of Services (DoS) in Wireless Ad hoc Networks

Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies - ICTCS '16, 2016

Wireless networks provide an easier way of communication to its users. Network without infrastruc... more Wireless networks provide an easier way of communication to its users. Network without infrastructure are more flexible in deployment. Ad hoc networks are such networks that do not require a planned infrastructure during its establishment. Network with many advantages also have shortcomings. Ad hoc networks have resource constraints like limited bandwidth, battery power, short communication range, less computation power, open channel, short life time. These characteristics of ad hoc networks make them vulnerable for attacks. A malicious node, either from outside or from inside of network, may tries to disturb the network operations and try to consume network resources. Such attacks are called Denial of Services (DoS) attacks. These are more dangerous attacks among the others. They are not easily identifiable. A Denial of Service (DoS) attacker tries to vanish the resources of genuine users of network to make them unavailable for the network. The focus of this paper is to outline various types of DoS attacks. It also includes the effect of attack on node and network services. Later it gives the defense mechanism suggested by researchers for DoS attack and the other security measures that can be incorporate to avoid such attacks.

Research paper thumbnail of Phrase-Based Statistical Machine Translation of Hindi Poetries into English by incorporating Word Sense Disambiguation

Statistical machine translation (SMT) is a variant of machine translation where the translations ... more Statistical machine translation (SMT) is a variant of machine translation where the translations are handled with statistically defined rules. Numerous researchers have attempted to build the framework which can comprehend the different dialects to translate from one source language to another target language. However, the focus on translation of poetry is less. Reliable and rapid transliteration of the poetry is very mandatory for the execution of the computer to translate the poem from one language to another. The existing approach has several issues, such as, time consumption, quality of the translation process, and matching of similar words. To overcome these issues, we propose a phrase-based statistical machine translation (PSMT) with special adherence to word sense disambiguation (WSD). The quality of the translation is increased by sensing the ambiguous words with WSD. The Hindi WordNet along with the Lesk algorithm identifies the ambiguous words and senses the exact meaning ...

Research paper thumbnail of An Empirical Review on Blockchain Smart Contracts: Application and Challenges in Implementation

International Journal of Computer Networks and Applications, 2020

This paper focuses on an extensive review of Blockchain Smart contract applications in real-world... more This paper focuses on an extensive review of Blockchain Smart contract applications in real-world scenarios and challenges in it. As in today's world, Blockchain has got tremendous importance in different types of services, so it will be beneficial to analyze the loopholes in the cybersecurity aspect as well as other technical issues in privacy and governance. A smart contract is the software code that comprises a self-executed set of rules and regulations that runs on Blockchain. To implement various real-world services over different decentralized platforms, a lot of research work is going on. In this paper, a detailed review is done on more than 100 latest published documents based on the Blockchain Smart contract and applications. By following the systematic mapping research methodology first, we have identified paper relevant to our research domain, and then by applying various filters, we extracted relevant information. At last, the article highlighted the challenges and research gaps that have to be addressed in the future.

Research paper thumbnail of Study of Important Security Features of Android, Windows for Mobile, iOS and Blackberry Operating Systems

Today, Mobile Operating Systems have become a vital part of our life. They cater to our daily nee... more Today, Mobile Operating Systems have become a vital part of our life. They cater to our daily needs such as Scheduling, communication, documentation, multimedia, entertainment & more resulting in an ever expanding market. Technology always comes with threats and here security is the issue, like breach of confidentiality & personal information as well as unauthorized access. Therefore manufacturer's provide built in security features and measures to cope with them. Still, most of the general users are unaware about them. This paper throws light on the security features of popular operating systems: Android, Windows Mobile, iOS & BlackBerry.