Asesh Das
Pennsylvania College of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Asesh Das.
high-assurance systems engineering | 2007
Asesh Das
An architecture for information assurance is proposed, where storyboarding among the stakeholders takes a fundamental role. Storyboarding helps in process capturing that leads in assessing vulnerability and threat. The proposed architecture is a variant way for addressing ISO/IEC 17799, used to practice confidentiality, integrity and availability in information technology.
southeastcon | 2000
Asesh Das
An approach to teaching computer architecture and organization is illustrated, where students are made aware of their college computing environment at an early stage of the course. Students are required to create a workbook of their own, which forms a solid basis to understanding of their own environment. This approach reduces cultural difficulties, usually observed in students with nontraditional background, and in students who are more prone to hands-on learning, or technology learning.
cyber security and information intelligence research workshop | 2009
Asesh Das; Ramana Reddy; Luyi Wang; Sumitra Reddy
This research reports agent activities in a collaborative, self-organizing, domain centric knowledge network, called Vijjana. Vijjana means classified knowledge in Sanskrit language. This model has been designed and implemented to assist users engaged in web activities, limiting the data retrieval to desired material only. The model Vijjana sits on the top layer of the cloud computing architecture, and with its agent activities develops a body of intelligent reasoning system which can semantically connect different dispersed users with their own knowledge nets. Vijjana model makes the cloud computing intelligibly usable for connecting different people working with the same domain specific interest. This provides a high order of accountability with assurance on confidentiality, integrity and availability.
southeastcon | 2002
Asesh Das
Metametrics are mostly user given metrics to the product development team. This teams responsibility is to derive crisp, good, process-capturing metrics from the acquired metametrics, which provide fuzzy information about the users knowledge on the product, often in granular form. This paper presents a cognitive science approach using cue words to analyze these fuzzy information granules. A class of computing with words proposed by Lotfi Zadeh evolves.
southeastcon | 2001
Asesh Das; N. Vonada
Within a basic cognitive engineering context, a systematic approach to threat assessment and security requirements in a client-server environment is presented. The platform discussed is portals, i.e., Internet stations, where various transactions are taking place. This approach facilitates structured elicitation of multiple-level security requirements, identification of operational knowledge, and human factor engineering, all contributing to portal security configuration and operations management.
southeastcon | 1999
Asesh Das; N. Vonada
A machines functionings and peoples capability to use the machine are merged into a common platform tied with A. Sens (1995) basic principle of social welfare science. This principle says that a persons well-being depends on his or her capability to function in a given environment. This capability is earned by the person as a set of interrelated functionings. With this principle, it is argued that a machines operation and credibility can be understood with intelligent reasoning. This intelligence does not require much of the machines knowledge; instead, it requires awareness of the human functioning space and the capability set earned in this functioning space.
southeastcon | 2016
Asesh Das
A context-aware system is an application system environment designed to sense and address user needs. In a human functioning space, architecting prescriptions from ISO/IEC/IEEE 42010 for systems and software engineering have been utilized to establish decision making strategies by the context-aware system. Such decision making has been done with the discipline of computing with words in Type-1 and Type-2 fuzzy environment. The system analyst needs metrics to work in the fuzzy context-aware environment.
southeastcon | 2013
Asesh Das; Michael Layton
A capstone course can be based on IEEE 1471 recommended practices on system architecture descriptions. Storyboarding helps in capturing all stake holders and associated activities, and leads to forming a context model. Using the context model, series of domain engineering worksets are performed for the completion of the project. Coupled rubrics can be very effectively used to evaluate the project developers coming from varying backgrounds and experiences.
southeastcon | 1999
Asesh Das; D. Derry; N.T. Al-Hamli; R. Howley; J. Roland; J. Tenant
It is claimed that while metrics quantify processes, competing metrics can capture future processes that will control the life-cycle of a designed system. To illustrate the issue, the basic premises of collaborative enabling technology are considered as the system design environment. In this case, capturing competing metrics is done on human functioning spaces. The earned capability of the system design personnel facilitates this capture. This amounts to having a system life-cycle evolving in parallel with human capability earning, while the system is being developed and maintained. Better human capabilities will bring better competing metrics for the system. This will enable the complexity of the system to be handled in a cost-effective way.
southeastcon | 2012
Asesh Das; Ramana Reddy; Luyi Wang; Sumitra Reddy