Narayan C. Debnath
Winona State University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Narayan C. Debnath.
international symposium on computers and communications | 2008
Suman Deb Roy; Sneha Aman Singh; Subhrabrata Choudhury; Narayan C. Debnath
Wireless sensor networks consisting of spatially distributed autonomous devices required to survive in unprotected environments. They are always susceptible to attack by malicious behavior of its routers (nodes) or external enemy nodes which could negatively affect secured routing and QoS and hence, vital wireless multimedia applications. In recent times, a lot of specific severe attacks have been proposed that makes such networks highly vulnerable, such as Sinkholes, the Black hole Attack, etc. However, currently, most security protocols are based on resisting a single attack without a systematic defense against dual and continuous attacks. There is a high possibility that the enemy would try several methods i.e. multiple attacks to compromise the same system in case a particular attack is thwarted. In this paper, we use our dynamic trust management system [DTMS] to propose methods that could counter two such severe attacks on sensor networks. Our major intent is to analyze an attackerpsilas strategy, develop DTMS and show that it is integrated enough to counter both the threats single-handedly. This ensures that network architectures and protocols do not require redefinition for every specific attack. As a consequence, significant time, effort and cost is saved in refraining from relaying the network with different defenses for different attacks every time.
Journal of Computational Methods in Sciences and Engineering archive | 2009
Ennumeri A. Zanaty; Sultan Aljahdali; Narayan C. Debnath
In this paper, we present alternative Kernelized FCM algorithms (KFCM) that could improve magnetic resonance imaging (MRI) segmentation. Then we implement the proposed KFCM method with considering some spatial constraints on the objective function. The algorithms incorporate spatial information into the membership function and the validity procedure for clustering. We use the intra-cluster distance measure, which is simply the median distance between a point and its cluster centre. The number of the cluster increases automatically according the value of intra-cluster, for example when a cluster is obtained, it uses this cluster to evaluate intra-cluster of the next cluster as input to the KFCM and so on, stop only when intra-cluster is smaller than a prescribe value. The most important aspect of the proposed algorithms is actually to work automatically. Alterative is to improve automatic image segmentation. These methods are applied on two different sets: reference images, for objective evaluation based on estimation of segmentation accuracy and time, and non reference images, for objective evaluation based on combined judgment of opinions of specialists.
advances in recent technologies in communication and computing | 2009
Suvamoy Changder; Narayan C. Debnath; D. Ghosh
Steganography is the means of storing information inside another message in such a way that hides informations existence. A number of steganography algorithms have been introduced using text, image, audio, video files as the cover media. Among these, text documents have been widely used for a very long time. This paper presents a new approach for steganography in Hindi texts. Considering the structure of Hindi alphabet/words, in this approach, by shifting the specific matra towards left or right, we hide the secret message in the text. This approach can be categorized under feature coding methods. The approach shows good result on the sample collected from different Hindi newspaper.
acs/ieee international conference on computer systems and applications | 2006
Narayan C. Debnath; Ana Gabriela Garis; Daniel Riesco; German Montejano
Sometimes, UML is not enough expressive to describe patterns property. UML profiles allow extending UML syntax and semantic for modeling elements of particular domains. As profiles extend UML vocabulary, and design patterns define for designers a common vocabulary, so it is possible using profile for defining a pattern vocabulary in UML. Profiles can be used for solve particular problems in different domains. This work shows the way for defining design patterns with profile, proposing architecture in levels. It shows how the definition of a profile for a particular pattern is, and how an UML tool can be enough for introduce profile for patterns. It analyzes the advantages of using profiles to define, document, and visualize design patterns.
international conference on computer technology and development | 2010
Suvamoy Changder; D. Ghosh; Narayan C. Debnath
Steganography is the art and science of hiding a message inside another message without drawing any suspicion to the others so that the message can only be detected by its intended recipient. With the other Steganography methods such as Image, Audio, Video, a number of text Steganography algorithms have been introduced. This paper presents a new linguistic approach for Steganography through Indian Languages by considering the flexible grammar structure of Indian Languages. To add more security to the system, instead of hiding the original message it is converted to an irrelevant binary stream by comparing the message bits with the pixel values of an Image. Thereafter, the bits of this binary stream are encoded to some part-of-speech and by creating meaningful sentences starting with a suitable word belonging to the mapped part-of-speech, the proposed method hides the message inside a cover file containing some innocuous sentences. Similarly in receiving side, the algorithm finds the corresponding part-of-speech of the starting word of each sentence and place the bit stream of the mapped part-of-speech to recover the converted message. After comparing these bits with the Image pixels, the algorithm extracted the original message from the cover file. The proposed method exhibits satisfactory result on some Indian Languages like Bengali.
international conference on industrial informatics | 2010
Baisakhi Chakraborty; D. Ghosh; Ranjan; Saswati Garnaik; Narayan C. Debnath
Case-Based Reasoning is a Knowledge Management mechanism that allows knowledge acquisition through learning and experience undergone in the process of problem solving applying similarity-based reasoning. Problem representation is by means of metadata representation of certain knowledge items stored in a repository termed Case-Base. This paper discusses on a Fire Emergency Handling System where fire cases have ontological representation implemented in Object-oriented Java platform that assists fire fighters or administrators to take a decision on the resources required to handle or control fire.
international conference on industrial informatics | 2011
Prasenjit Choudhury; Anirban Sarkar; Narayan C. Debnath
Service Oriented architecture (SOA) on Mobile Ad hoc NETwork (MANET) promotes the effort to deploy the day to day business and other services over the ad hoc mobile environments. In this paper several research challenges have been summarized related to the service publishing, registration indexing, availability, discovery and composition on dynamic environment of MANET. Several general issues related to SOA which may affect the functionality of MANET, also have been raised. Moreover, various security issues related to service deployment in MANET have been discussed. The research issues have been categorized based on the related underlying architectures of MANET like, centralized, distributed and peer-to-peer (P2P).
electro information technology | 2007
Narayan C. Debnath; F. A. Zorzan; German Montejano; Daniel Riesco
The workflow automate the business process of a organization. Software process engineering metamodel (SPEM) is a standard as a specification of any software development process. In particular, the software development processes are business process. This work proposes a solution to automate the management of activities of a software development process specified by SPEM. The SPEM activities are transformed in subprocesses of the standard BPMN. The transformation is done by the language query/views/ transformations (QVT). The SPEM, BPMN and QVT have been standardized by Object Management Group (OMG). The target (BPMN) subprocess definition is turned into a specification in a standard language to put in action the workflow processes, such as business process execution language for web services (BPEL4WS) and XML process definition language (XPDL). In this way, the specification of subprocesses of software development process will executed by Workflow engine. The engine automates any software development process specified by SPEM through its transformation into BPMN subprocesses.
international conference on industrial technology | 2013
Amit Kr Mandal; Suvamoy Changder; Anirban Sarkar; Narayan C. Debnath
Software as a service or (SaaS) is a new software development and deployment paradigm over the cloud. It offers Information Technology services dynamically as “on-demand” basis over the internet. The related application data are stored in the large data centers managed by the Cloud Service Providers. Therefore the user need not to bother about the data storage or data management techniques and they can be able to access their applications from anywhere on the globe via a standard web browser. Many enterprises are facing a major research challenge due to the unavailability of generic cloud architecture for designing, developing and deploying of cloud services. In this paper flexible cloud architecture has been proposed, specifically for data centric applications which are suitable for heterogeneous types of applications. This paper also has aimed to establish the future research agendas related to design and management of data centric applications over the cloud infrastructure.
international symposium on computers and communications | 2008
Narayan C. Debnath; Lorena Baigorria; Daniel Riesco; German Montejano
The aspect oriented design (AOD) surges from the continuous search of improving the software systems development. The AOD is a methodology that emerges from the aspect oriented programming (AOP), which intents to improve the concerns of the components in software programming; this methodology is based on existing technologies like object oriented (OO). Calculate the resources, is an activity that can improve the software development, because of this there are a big amount of investigation made on metrics. There is a great quantity of works about metrics applied to OO design but a few about metrics applied to AOD. Softwares metrics are ways of qualify the software designs. The application of metrics is essential to qualify the effectiveness of AOD. AOD is a methodology based OO therefore we can applied some metrics traditionally for OO design. This paper shows the definition of the C&K metrics applied to AOD using UML profiles.