Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Asesh Das is active.

Publication


Featured researches published by Asesh Das.


high-assurance systems engineering | 2007

Information Assurance Architecture with Storyboarding Models

Asesh Das

An architecture for information assurance is proposed, where storyboarding among the stakeholders takes a fundamental role. Storyboarding helps in process capturing that leads in assessing vulnerability and threat. The proposed architecture is a variant way for addressing ISO/IEC 17799, used to practice confidentiality, integrity and availability in information technology.


southeastcon | 2000

Computer organization teaching: a create your own workbook approach

Asesh Das

An approach to teaching computer architecture and organization is illustrated, where students are made aware of their college computing environment at an early stage of the course. Students are required to create a workbook of their own, which forms a solid basis to understanding of their own environment. This approach reduces cultural difficulties, usually observed in students with nontraditional background, and in students who are more prone to hands-on learning, or technology learning.


cyber security and information intelligence research workshop | 2009

Information intelligence in cloud computing: how can Vijjana, a collaborative, self-organizing, domain centric knowledge network model help

Asesh Das; Ramana Reddy; Luyi Wang; Sumitra Reddy

This research reports agent activities in a collaborative, self-organizing, domain centric knowledge network, called Vijjana. Vijjana means classified knowledge in Sanskrit language. This model has been designed and implemented to assist users engaged in web activities, limiting the data retrieval to desired material only. The model Vijjana sits on the top layer of the cloud computing architecture, and with its agent activities develops a body of intelligent reasoning system which can semantically connect different dispersed users with their own knowledge nets. Vijjana model makes the cloud computing intelligibly usable for connecting different people working with the same domain specific interest. This provides a high order of accountability with assurance on confidentiality, integrity and availability.


southeastcon | 2002

A cognitive science approach to metametric fuzziness

Asesh Das

Metametrics are mostly user given metrics to the product development team. This teams responsibility is to derive crisp, good, process-capturing metrics from the acquired metametrics, which provide fuzzy information about the users knowledge on the product, often in granular form. This paper presents a cognitive science approach using cue words to analyze these fuzzy information granules. A class of computing with words proposed by Lotfi Zadeh evolves.


southeastcon | 2001

A cognitive engineering approach to portal management

Asesh Das; N. Vonada

Within a basic cognitive engineering context, a systematic approach to threat assessment and security requirements in a client-server environment is presented. The platform discussed is portals, i.e., Internet stations, where various transactions are taking place. This approach facilitates structured elicitation of multiple-level security requirements, identification of operational knowledge, and human factor engineering, all contributing to portal security configuration and operations management.


southeastcon | 1999

Why machines prefer intelligent reasoning from all users? Amartya Sen: because they belong to the human functioning spaces

Asesh Das; N. Vonada

A machines functionings and peoples capability to use the machine are merged into a common platform tied with A. Sens (1995) basic principle of social welfare science. This principle says that a persons well-being depends on his or her capability to function in a given environment. This capability is earned by the person as a set of interrelated functionings. With this principle, it is argued that a machines operation and credibility can be understood with intelligent reasoning. This intelligence does not require much of the machines knowledge; instead, it requires awareness of the human functioning space and the capability set earned in this functioning space.


southeastcon | 2016

Context-aware architecture utilizing computing with words and ISO/IEC/IEEE 42010

Asesh Das

A context-aware system is an application system environment designed to sense and address user needs. In a human functioning space, architecting prescriptions from ISO/IEC/IEEE 42010 for systems and software engineering have been utilized to establish decision making strategies by the context-aware system. Such decision making has been done with the discipline of computing with words in Type-1 and Type-2 fuzzy environment. The system analyst needs metrics to work in the fuzzy context-aware environment.


southeastcon | 2013

Capstone courses as software engineering disciplines with IEEE 1471

Asesh Das; Michael Layton

A capstone course can be based on IEEE 1471 recommended practices on system architecture descriptions. Storyboarding helps in capturing all stake holders and associated activities, and leads to forming a context model. Using the context model, series of domain engineering worksets are performed for the completion of the project. Coupled rubrics can be very effectively used to evaluate the project developers coming from varying backgrounds and experiences.


southeastcon | 1999

Object-oriented design with competing metrics

Asesh Das; D. Derry; N.T. Al-Hamli; R. Howley; J. Roland; J. Tenant

It is claimed that while metrics quantify processes, competing metrics can capture future processes that will control the life-cycle of a designed system. To illustrate the issue, the basic premises of collaborative enabling technology are considered as the system design environment. In this case, capturing competing metrics is done on human functioning spaces. The earned capability of the system design personnel facilitates this capture. This amounts to having a system life-cycle evolving in parallel with human capability earning, while the system is being developed and maintained. Better human capabilities will bring better competing metrics for the system. This will enable the complexity of the system to be handled in a cost-effective way.


southeastcon | 2012

Cyber-physical operation security with a collaborative knowledge grid system

Asesh Das; Ramana Reddy; Luyi Wang; Sumitra Reddy

Collaboration


Dive into the Asesh Das's collaboration.

Top Co-Authors

Avatar

Luyi Wang

West Virginia University

View shared research outputs
Top Co-Authors

Avatar

Sumitra Reddy

West Virginia University

View shared research outputs
Top Co-Authors

Avatar

Ramana Reddy

West Virginia University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

D. Derry

Pennsylvania College of Technology

View shared research outputs
Top Co-Authors

Avatar

J. Roland

Pennsylvania College of Technology

View shared research outputs
Top Co-Authors

Avatar

J. Tenant

Pennsylvania College of Technology

View shared research outputs
Top Co-Authors

Avatar

Jacob R. Miller

Pennsylvania College of Technology

View shared research outputs
Top Co-Authors

Avatar

N.T. Al-Hamli

Pennsylvania College of Technology

View shared research outputs
Top Co-Authors

Avatar

R. Howley

Pennsylvania College of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge