Debi Acharjya | VIT University (original) (raw)
Papers by Debi Acharjya
Emerging Research in Computing, Information, Communication and Applications, 2015
ABSTRACT Graph representations have vast applications and are used for knowledge extraction. With... more ABSTRACT Graph representations have vast applications and are used for knowledge extraction. With increase in applications of graph, it has become more and more complex and larger in sizes. Visualization and analyzing large community graph are challenging. To study a large community graph, compression technique may be used. There should not be any loss of information or knowledge while compressing the community graph. This paper starts with a formal introduction followed by representing the graph models in compressed form. Greedy Algorithm is used for the purpose. The paper proceeds in the same direction and proposes a similar technique for compressing a large community graph, which is suitable for carrying out steps of graph mining. Observations show that the proposed technique reduces the iteration steps may leads to a better efficiency. Algorithm on the proposed technique has been elaborated followed by a suitable example.
International Journal of Intelligent Systems and Applications, 2013
The notion of rough set captures indiscernibility of elements in a set. But, in many real life si... more The notion of rough set captures indiscernibility of elements in a set. But, in many real life situations, an information system establishes the relation between different universes. This gave the extension of rough set on single universal set to rough set on two universal sets. In this paper, we introduce rough equality of sets on two universal sets and rough inclusion of sets employing the notion of the lower and upper approximation. Also, we establish some basic properties that refer to our knowledge about the universes.
The notion of intuitionistic fuzzy approximation space is introduced. Rough sets on such spaces a... more The notion of intuitionistic fuzzy approximation space is introduced. Rough sets on such spaces are defined and some of their properties are studied
Research Anthology on Multi-Industry Uses of Genetic Programming and Algorithms
This article describes how agriculture is the main occupation of India, and how the economy depen... more This article describes how agriculture is the main occupation of India, and how the economy depends on agricultural production. Most of the land in India is dedicated to agriculture and people depend on the production of agricultural products. Therefore, forecasting the accuracy of future events based on extracted patterns plays a vital role in improving agricultural productivity. By considering the availability of micronutrients and macronutrients of the soil and water in a particular place, the growth of a plant is determined. This helps people to determine the crops to be cultivated at a certain place. In this article, the forecasting is carried out using rough sets and genetic algorithms. Rough sets are used to produce the decision rules whereas genetic algorithms are used to refine the rules and improve classification accuracy. Accuracy of the classification rules is analyzed using different selection methods and crossover operators. Results show that genetic algorithms with a ...
Advances in Information Communication Technology and Computing
Lecture Notes in Networks and Systems
International Journal of Embedded Systems
International Journal of Ambient Computing and Intelligence
The growth of new technologies and ambient intelligence is an emerging technology that enhances o... more The growth of new technologies and ambient intelligence is an emerging technology that enhances our life by adding sensors and networks. Ambient technology is a revolution on smart devices that makes human life efficient. Smartwatches are one that provides flexibility in people's daily lives by adopting sensing and reasoning of their activities and the surrounding environment. Analyzing a customer's behaviour towards smartwatches that use ambient intelligence is a critical issue. This article analyses the behavioural intention of customer satisfaction towards smartwatch users in an ambient environment with the help of structured equation modeling using partial least squares and fuzzy rough sets. The structural equation modeling is used to check the reliability and validity of the constructs whereas a fuzzy rough set is used for rule generation and studying customer satisfaction. This enhances the personalization of human beings with the assistance of human-computer interacti...
International Journal of Information Security and Privacy
The topology changes randomly and dynamically in a mobile adhoc network (MANET). The composite ch... more The topology changes randomly and dynamically in a mobile adhoc network (MANET). The composite characteristics of MANETs makes it exposed to interior and exterior attacks. Avoidance support techniques like authentication and encryption are appropriate to prevent attacks in MANETs. Thus, an authoritative intrusion detection model is required to prevent from attacks. These attacks can be at either the layers present in the network or can be of a general attack. Many models have been developed for the detection of intrusion and detection. These models aim at any one of the layer present in the network. Therefore, effort has been made to consider either the layers for the detection of intrusion and detection. This article uses a multigranular rough set (MGRS) for the detection of intrusion and detection in MANET. The advantage of MGRS is that it can aim at either the layers present in the network simultaneously by using multiple equivalence relations on the universe. The proposed model ...
International Journal of Fuzzy System Applications
International Journal of Ambient Computing and Intelligence
Information and technology revolution has brought a radical change in the way data are collected.... more Information and technology revolution has brought a radical change in the way data are collected. The data collected is of no use unless some useful information is derived from it. Therefore, it is essential to think of some predictive analysis for analyzing data and to get meaningful information. Much research has been carried out in the direction of predictive data analysis starting from statistical techniques to intelligent computing techniques and further to hybridize computing techniques. The prime objective of this paper is to make a comparative analysis between statistical, rough computing, and hybridized techniques. The comparative analysis is carried out over financial bankruptcy data set of Greek industrial bank ETEVA. It is concluded that rough computing techniques provide better accuracy 88.2% as compared to statistical techniques whereas hybridized computing techniques provides still better accuracy 94.1% as compared to rough computing techniques.
International Journal of Intelligent Information Technologies, 2016
Information and communication technology made shopping more convenient for common man. Additional... more Information and communication technology made shopping more convenient for common man. Additionally, customers compare both online and offline price of a commodity. For this reason, offline shopping markets think of customer satisfaction and try to attract customers by various means. But, prediction of customer's choice in an information system is a major issue today. Much research is carried out in this direction for single universe. But, in many real life applications it is observed that relation is established between two universes. To this end, in this paper the authors propose a model to identify customer choice of super markets using fuzzy rough set on two universal sets and radial basis function neural network. The authors use fuzzy rough set on two universal sets on sample data to arrive at customer choice of super markets. The information system with customer choice is further trained with radial basis function neural network for identification of customer choice of sup...
International Journal of Artificial Intelligence and Soft Computing
Enterprise Mobility has been increasing the reach over the years. Initially Mobile devices were a... more Enterprise Mobility has been increasing the reach over the years. Initially Mobile devices were adopted as consumer devices. However, the enterprises world over have rightly taken the leap and started using the ubiquitous technology for managing its employees as well as to reach out to the customers. While the Mobile ecosystem has been evolving over the years, the increased exposure of mobility in Enterprise framework have caused major focus on the security aspects of it. While a significant focus have been put on network security, this paper discusses on the approach that can be taken at Mobile application layer, which would reduce the risk to the enterprises.
Communications in Computer and Information Science, 2012
ABSTRACT
Achievements and Trends, 2014
ABSTRACT The amount of data being collected across a wide variety of fields today far exceeds our... more ABSTRACT The amount of data being collected across a wide variety of fields today far exceeds our ability to reduce and analyze without the use of automated analysis techniques. Also, the whole data may not be of user interest and may be imperfect. So, it is very challenging to organize these data in formal system that provides outputs in a more relevant, useful, and structured manner. There are many techniques available to retrieve knowledge from this voluminous amount of data. Rough sets are one among them. The notion of rough sets captures the indiscernibility of elements in a set. But in many real-life situations, an information system establishes the relation between different universes. This led to the extension of a rough set on a single universal set to a rough set on two universal sets. In this chapter, rough sets on two universal sets employing the notion of the lower and upper approximation are discussed. In addition to this, fuzzy rough sets and intuitionistic fuzzy rough sets on two universal sets are also discussed. Finally, a real-life example for the depth classification of the concept is provided.
The present age of internet and the rising of business have resulted into many folds of increase ... more The present age of internet and the rising of business have resulted into many folds of increase in the volume of data which are to be used for various applications on a day to day basis. Therefore, it is an obvious challenge to reduce the dataset and find useful information pertaining to the interest of the organisation. But another challenge lies in hiding sensitive information in order to provide privacy. Thus, attribute reduction and privacy preservation are two major challenges in privacy preserving data mining. In this paper, we propose a sensitive rule hiding model to hide sensitive fuzzy association rules. Proposed model uses rough set on intuitionistic fuzzy approximation spaces with ordering to reduce the dataset dimensionality. We use triangular and trapezoidal membership function to get the fuzzified information system. Finally, decreasing the support of right hand side of the rule is used to hide sensitive fuzzy association rules.
Emerging Research in Computing, Information, Communication and Applications, 2015
ABSTRACT Graph representations have vast applications and are used for knowledge extraction. With... more ABSTRACT Graph representations have vast applications and are used for knowledge extraction. With increase in applications of graph, it has become more and more complex and larger in sizes. Visualization and analyzing large community graph are challenging. To study a large community graph, compression technique may be used. There should not be any loss of information or knowledge while compressing the community graph. This paper starts with a formal introduction followed by representing the graph models in compressed form. Greedy Algorithm is used for the purpose. The paper proceeds in the same direction and proposes a similar technique for compressing a large community graph, which is suitable for carrying out steps of graph mining. Observations show that the proposed technique reduces the iteration steps may leads to a better efficiency. Algorithm on the proposed technique has been elaborated followed by a suitable example.
International Journal of Intelligent Systems and Applications, 2013
The notion of rough set captures indiscernibility of elements in a set. But, in many real life si... more The notion of rough set captures indiscernibility of elements in a set. But, in many real life situations, an information system establishes the relation between different universes. This gave the extension of rough set on single universal set to rough set on two universal sets. In this paper, we introduce rough equality of sets on two universal sets and rough inclusion of sets employing the notion of the lower and upper approximation. Also, we establish some basic properties that refer to our knowledge about the universes.
The notion of intuitionistic fuzzy approximation space is introduced. Rough sets on such spaces a... more The notion of intuitionistic fuzzy approximation space is introduced. Rough sets on such spaces are defined and some of their properties are studied
Research Anthology on Multi-Industry Uses of Genetic Programming and Algorithms
This article describes how agriculture is the main occupation of India, and how the economy depen... more This article describes how agriculture is the main occupation of India, and how the economy depends on agricultural production. Most of the land in India is dedicated to agriculture and people depend on the production of agricultural products. Therefore, forecasting the accuracy of future events based on extracted patterns plays a vital role in improving agricultural productivity. By considering the availability of micronutrients and macronutrients of the soil and water in a particular place, the growth of a plant is determined. This helps people to determine the crops to be cultivated at a certain place. In this article, the forecasting is carried out using rough sets and genetic algorithms. Rough sets are used to produce the decision rules whereas genetic algorithms are used to refine the rules and improve classification accuracy. Accuracy of the classification rules is analyzed using different selection methods and crossover operators. Results show that genetic algorithms with a ...
Advances in Information Communication Technology and Computing
Lecture Notes in Networks and Systems
International Journal of Embedded Systems
International Journal of Ambient Computing and Intelligence
The growth of new technologies and ambient intelligence is an emerging technology that enhances o... more The growth of new technologies and ambient intelligence is an emerging technology that enhances our life by adding sensors and networks. Ambient technology is a revolution on smart devices that makes human life efficient. Smartwatches are one that provides flexibility in people's daily lives by adopting sensing and reasoning of their activities and the surrounding environment. Analyzing a customer's behaviour towards smartwatches that use ambient intelligence is a critical issue. This article analyses the behavioural intention of customer satisfaction towards smartwatch users in an ambient environment with the help of structured equation modeling using partial least squares and fuzzy rough sets. The structural equation modeling is used to check the reliability and validity of the constructs whereas a fuzzy rough set is used for rule generation and studying customer satisfaction. This enhances the personalization of human beings with the assistance of human-computer interacti...
International Journal of Information Security and Privacy
The topology changes randomly and dynamically in a mobile adhoc network (MANET). The composite ch... more The topology changes randomly and dynamically in a mobile adhoc network (MANET). The composite characteristics of MANETs makes it exposed to interior and exterior attacks. Avoidance support techniques like authentication and encryption are appropriate to prevent attacks in MANETs. Thus, an authoritative intrusion detection model is required to prevent from attacks. These attacks can be at either the layers present in the network or can be of a general attack. Many models have been developed for the detection of intrusion and detection. These models aim at any one of the layer present in the network. Therefore, effort has been made to consider either the layers for the detection of intrusion and detection. This article uses a multigranular rough set (MGRS) for the detection of intrusion and detection in MANET. The advantage of MGRS is that it can aim at either the layers present in the network simultaneously by using multiple equivalence relations on the universe. The proposed model ...
International Journal of Fuzzy System Applications
International Journal of Ambient Computing and Intelligence
Information and technology revolution has brought a radical change in the way data are collected.... more Information and technology revolution has brought a radical change in the way data are collected. The data collected is of no use unless some useful information is derived from it. Therefore, it is essential to think of some predictive analysis for analyzing data and to get meaningful information. Much research has been carried out in the direction of predictive data analysis starting from statistical techniques to intelligent computing techniques and further to hybridize computing techniques. The prime objective of this paper is to make a comparative analysis between statistical, rough computing, and hybridized techniques. The comparative analysis is carried out over financial bankruptcy data set of Greek industrial bank ETEVA. It is concluded that rough computing techniques provide better accuracy 88.2% as compared to statistical techniques whereas hybridized computing techniques provides still better accuracy 94.1% as compared to rough computing techniques.
International Journal of Intelligent Information Technologies, 2016
Information and communication technology made shopping more convenient for common man. Additional... more Information and communication technology made shopping more convenient for common man. Additionally, customers compare both online and offline price of a commodity. For this reason, offline shopping markets think of customer satisfaction and try to attract customers by various means. But, prediction of customer's choice in an information system is a major issue today. Much research is carried out in this direction for single universe. But, in many real life applications it is observed that relation is established between two universes. To this end, in this paper the authors propose a model to identify customer choice of super markets using fuzzy rough set on two universal sets and radial basis function neural network. The authors use fuzzy rough set on two universal sets on sample data to arrive at customer choice of super markets. The information system with customer choice is further trained with radial basis function neural network for identification of customer choice of sup...
International Journal of Artificial Intelligence and Soft Computing
Enterprise Mobility has been increasing the reach over the years. Initially Mobile devices were a... more Enterprise Mobility has been increasing the reach over the years. Initially Mobile devices were adopted as consumer devices. However, the enterprises world over have rightly taken the leap and started using the ubiquitous technology for managing its employees as well as to reach out to the customers. While the Mobile ecosystem has been evolving over the years, the increased exposure of mobility in Enterprise framework have caused major focus on the security aspects of it. While a significant focus have been put on network security, this paper discusses on the approach that can be taken at Mobile application layer, which would reduce the risk to the enterprises.
Communications in Computer and Information Science, 2012
ABSTRACT
Achievements and Trends, 2014
ABSTRACT The amount of data being collected across a wide variety of fields today far exceeds our... more ABSTRACT The amount of data being collected across a wide variety of fields today far exceeds our ability to reduce and analyze without the use of automated analysis techniques. Also, the whole data may not be of user interest and may be imperfect. So, it is very challenging to organize these data in formal system that provides outputs in a more relevant, useful, and structured manner. There are many techniques available to retrieve knowledge from this voluminous amount of data. Rough sets are one among them. The notion of rough sets captures the indiscernibility of elements in a set. But in many real-life situations, an information system establishes the relation between different universes. This led to the extension of a rough set on a single universal set to a rough set on two universal sets. In this chapter, rough sets on two universal sets employing the notion of the lower and upper approximation are discussed. In addition to this, fuzzy rough sets and intuitionistic fuzzy rough sets on two universal sets are also discussed. Finally, a real-life example for the depth classification of the concept is provided.
The present age of internet and the rising of business have resulted into many folds of increase ... more The present age of internet and the rising of business have resulted into many folds of increase in the volume of data which are to be used for various applications on a day to day basis. Therefore, it is an obvious challenge to reduce the dataset and find useful information pertaining to the interest of the organisation. But another challenge lies in hiding sensitive information in order to provide privacy. Thus, attribute reduction and privacy preservation are two major challenges in privacy preserving data mining. In this paper, we propose a sensitive rule hiding model to hide sensitive fuzzy association rules. Proposed model uses rough set on intuitionistic fuzzy approximation spaces with ordering to reduce the dataset dimensionality. We use triangular and trapezoidal membership function to get the fuzzified information system. Finally, decreasing the support of right hand side of the rule is used to hide sensitive fuzzy association rules.