Suben Saha | Ohio State University (original) (raw)
Uploads
Drafts by Suben Saha
In simple words, cloud computing is the delivery of computing services—servers, storage, database... more In simple words, cloud computing is the delivery of computing services—servers, storage, databases, networking, software, analytics and more—over the Internet (“the cloud”) which has ubiquitous access, virtually infinite elasticity and economy of scale. Cloud computing has given IT companies almost infinite elasticity in respect to computing power, storage capacity, networking capability and many more but with associated price like downtime, security & privacy, vulnerability to attack, limited control & flexibility, unpredictable final cost which may exceed the traditional cost. Security concern for the cloud computing is much more as because traditional grid computing has only outside threat but cloud computing has also inside threat. And also when you as IT company don’t possess data on your own computer there are trust and compliance issues as well.
Non functional requirements define how a system is supposed to be rather do. On the other hand, security requirements can be seen on different abstraction levels. According to Open Security Architecture(OSA) security requirements might be divided in 4 different types: Secure Functional Requirements, Functional Security Requirements, Non-Functional Security Requirements, Secure Development Requirements. In this study, objective is to study non functional security requirements in the context of cloud computing.
Confidentiality, integrity, availability, accountability, privacy, trust, audit & compliance are the main non functional security requirements but this study is limited to confidentiality, integrity and availability.
Thesis Chapters by Suben Saha
Bacteria contaminated water is one of the reasons of water pollution which causes different disea... more Bacteria contaminated water is one of the reasons of water pollution which causes different
diseases. This single celled microscopic organisms which thrive in diverse environment & stay in
colonies. Counting those colonies it can be said the amount of bacteria available on a specific
sample. To grow these colonies different culture & filtration procedures are used. After the
growth colonies are usually being counted on naked eye. This paper represents an automated
counting system the number of colonies which are present in a sample using image processing
techniques. Colonies are considered as circular objects or discs and clustered as a colony with
respect to its shape & ratio.
Complexity of water quality is growing higher day by day. General criterion used to measure
water quality relate to the security of human contact. Most of those criterions involves a lot
amount time and money and also have some availability issues. In this paper there is described a
new way of measuring water quality completely based on the image processing techniques which
assures simplicity & affordability everywhere. Just one 250X+ zoom lens is all you need which
could be attached to the phone which compares particles of water pixel by pixel & search for the
impure particle of a water image. This procedure can be used as pre laboratory test for its costeffective
design, field-portability this sensitive and specific contamination measurement
procedure running on mobile could be rather useful as pre-laboratory water test at anyplace
anywhere.
Papers by Suben Saha
Research Square (Research Square), May 7, 2021
Objectives: The COVID-19 pandemic is among the most serious global threats, and it is still a sig... more Objectives: The COVID-19 pandemic is among the most serious global threats, and it is still a significant concern. The people of Bangladesh are undergoing one of the world's largest vaccination drive. With the recent launch and introduction of the COVID-19 vaccines, many of us are curious about the general opinion or view of the vaccine. While the vaccine has ignited new hope in the battle against COVID-19, it has also sparked militant anti-vaccine campaigns, so the need to analyze public opinion on the COVID-19 vaccine has emerged. Methods: Traditional machine learning methods were used to obtain a benchmark result for the experiment. The recurrent neural network (RNN) algorithm was used next. Several different types of recurrent neural networks were used, including simple RNNs, Gated Recurrent Units (GRUs), and LSTMs. Finally, to achieve
Research Square (Research Square), Jan 4, 2022
Online News media which is more accessible, cheaper, and faster to consume, is also of questionab... more Online News media which is more accessible, cheaper, and faster to consume, is also of questionable quality as there is less moderation. Anybody with a computing device and internet connection can take part in creating, contributing, and spreading news in online portals. Social media has intensified the problem further. Due to the high volume, velocity, and veracity, online news content is beyond traditional moderation, also known as moderation through human experts. So different machine learning method is being tested and used to spot fake news. One of the main challenges for fake-news classification is getting labeled instances for this high volume of real-time data. In this study, we examined how semi-supervised machine learning can help to decrease the need for labeled instances with an acceptable drop of accuracy. The accuracy difference between the supervised classifier and the semisupervised classifier is around 0.05 while using only five percent of label instances of the supervised classifier. We tested with logistic regression, SVM, and random forest classifier to prove our hypothesis.
Objectives: The COVID-19 pandemic is among the most serious global threats, and it is still a sig... more Objectives: The COVID-19 pandemic is among the most serious global threats, and it is still a significant concern. The people of Bangladesh are undergoing one of the world's largest vaccination drive. With the recent launch and introduction of the COVID-19 vaccines, many of us are curious about the general opinion or view of the vaccine. While the vaccine has ignited new hope in the battle against COVID-19, it has also sparked militant anti-vaccine campaigns, so the need to analyze public opinion on the COVID-19 vaccine has emerged. Methods: Traditional machine learning methods were used to obtain a benchmark result for the experiment. The recurrent neural network (RNN) algorithm was used next. Several different types of recurrent neural networks were used, including simple RNNs, Gated Recurrent Units (GRUs), and LSTMs. Finally, to achieve a more optimal result, small BERT models (Bidirectional Encoder Representations from Transformers) were used. Results: Upon study and testing...
In simple words, cloud computing is the delivery of computing services—servers, storage, database... more In simple words, cloud computing is the delivery of computing services—servers, storage, databases, networking, software, analytics and more—over the Internet (“the cloud”) which has ubiquitous access, virtually infinite elasticity and economy of scale. Cloud computing has given IT companies almost infinite elasticity in respect to computing power, storage capacity, networking capability and many more but with associated price like downtime, security & privacy, vulnerability to attack, limited control & flexibility, unpredictable final cost which may exceed the traditional cost. Security concern for the cloud computing is much more as because traditional grid computing has only outside threat but cloud computing has also inside threat. And also when you as IT company don’t possess data on your own computer there are trust and compliance issues as well.
Non functional requirements define how a system is supposed to be rather do. On the other hand, security requirements can be seen on different abstraction levels. According to Open Security Architecture(OSA) security requirements might be divided in 4 different types: Secure Functional Requirements, Functional Security Requirements, Non-Functional Security Requirements, Secure Development Requirements. In this study, objective is to study non functional security requirements in the context of cloud computing.
Confidentiality, integrity, availability, accountability, privacy, trust, audit & compliance are the main non functional security requirements but this study is limited to confidentiality, integrity and availability.
Bacteria contaminated water is one of the reasons of water pollution which causes different disea... more Bacteria contaminated water is one of the reasons of water pollution which causes different
diseases. This single celled microscopic organisms which thrive in diverse environment & stay in
colonies. Counting those colonies it can be said the amount of bacteria available on a specific
sample. To grow these colonies different culture & filtration procedures are used. After the
growth colonies are usually being counted on naked eye. This paper represents an automated
counting system the number of colonies which are present in a sample using image processing
techniques. Colonies are considered as circular objects or discs and clustered as a colony with
respect to its shape & ratio.
Complexity of water quality is growing higher day by day. General criterion used to measure
water quality relate to the security of human contact. Most of those criterions involves a lot
amount time and money and also have some availability issues. In this paper there is described a
new way of measuring water quality completely based on the image processing techniques which
assures simplicity & affordability everywhere. Just one 250X+ zoom lens is all you need which
could be attached to the phone which compares particles of water pixel by pixel & search for the
impure particle of a water image. This procedure can be used as pre laboratory test for its costeffective
design, field-portability this sensitive and specific contamination measurement
procedure running on mobile could be rather useful as pre-laboratory water test at anyplace
anywhere.
Research Square (Research Square), May 7, 2021
Objectives: The COVID-19 pandemic is among the most serious global threats, and it is still a sig... more Objectives: The COVID-19 pandemic is among the most serious global threats, and it is still a significant concern. The people of Bangladesh are undergoing one of the world's largest vaccination drive. With the recent launch and introduction of the COVID-19 vaccines, many of us are curious about the general opinion or view of the vaccine. While the vaccine has ignited new hope in the battle against COVID-19, it has also sparked militant anti-vaccine campaigns, so the need to analyze public opinion on the COVID-19 vaccine has emerged. Methods: Traditional machine learning methods were used to obtain a benchmark result for the experiment. The recurrent neural network (RNN) algorithm was used next. Several different types of recurrent neural networks were used, including simple RNNs, Gated Recurrent Units (GRUs), and LSTMs. Finally, to achieve
Research Square (Research Square), Jan 4, 2022
Online News media which is more accessible, cheaper, and faster to consume, is also of questionab... more Online News media which is more accessible, cheaper, and faster to consume, is also of questionable quality as there is less moderation. Anybody with a computing device and internet connection can take part in creating, contributing, and spreading news in online portals. Social media has intensified the problem further. Due to the high volume, velocity, and veracity, online news content is beyond traditional moderation, also known as moderation through human experts. So different machine learning method is being tested and used to spot fake news. One of the main challenges for fake-news classification is getting labeled instances for this high volume of real-time data. In this study, we examined how semi-supervised machine learning can help to decrease the need for labeled instances with an acceptable drop of accuracy. The accuracy difference between the supervised classifier and the semisupervised classifier is around 0.05 while using only five percent of label instances of the supervised classifier. We tested with logistic regression, SVM, and random forest classifier to prove our hypothesis.
Objectives: The COVID-19 pandemic is among the most serious global threats, and it is still a sig... more Objectives: The COVID-19 pandemic is among the most serious global threats, and it is still a significant concern. The people of Bangladesh are undergoing one of the world's largest vaccination drive. With the recent launch and introduction of the COVID-19 vaccines, many of us are curious about the general opinion or view of the vaccine. While the vaccine has ignited new hope in the battle against COVID-19, it has also sparked militant anti-vaccine campaigns, so the need to analyze public opinion on the COVID-19 vaccine has emerged. Methods: Traditional machine learning methods were used to obtain a benchmark result for the experiment. The recurrent neural network (RNN) algorithm was used next. Several different types of recurrent neural networks were used, including simple RNNs, Gated Recurrent Units (GRUs), and LSTMs. Finally, to achieve a more optimal result, small BERT models (Bidirectional Encoder Representations from Transformers) were used. Results: Upon study and testing...