Use of Semantic Search to Enhance the Performance of Plagiarism Detection Tools
Research Paper | Journal Paper
Vol.07 , Issue.01 , pp.165-169, Jan-2019
Abstract
Plagiarism is a breach of copyright in the academic world. It has become a serious issue after explosion of digital information as copying has become easier due to huge amount of source but detection has become more difficult. Plagiarism can be of two types: source code plagiarism refers to copying the code from proprietary software and text plagiarism which deals with copying from others text and pretending it as own. There are several tools to detect both type of plagiarism. In this paper we have concentrated mainly on text plagiarism discussed about algorithms used in software available like Turnitin, iThenticate or SafeAssign to detect plagiarism and how NLP techniques and parallel processing can improve them. Mostly all software determine a similarity score for each pair of document and use SCAM (Standard Copy Analysis Mechanism) algorithm to calculate relative measure of overlapping during comparison of common set of words. We have tried to establish how semantic similarity can improve TRUE POSITIVE and TRUE NEGATIVE detection and reduce FALSE POSITIVE and FALSE NEGATIVE detection in our work.
Key-Words / Index Term
Plagiarism, Semantic Similarity, Semantic Search, Turnitin, WordNet, Ontologies, Natural Language Processing
References
[1] Tsatsaronis, George, et al. "Identifying free text plagiarism based on semantic similarity." Proceedings of the 4th International Plagiarism Conference. 2010.
[2] S. Fernando and M. Stevenson, “A semantic similarity approach to paraphrase detection”, Proceedings of the 11th Annual Research Colloquium of the UK Special Interest Group for Computational Linguistics, 2008.
[3] Shenoy, Manjula K., K. C. Shet, and U. Dinesh Acharya. "Semantic plagiarism detection system using ontology mapping." Advanced Computing 3.3 2012, pp 59.
[4] Le Huong T., et al. "Semantic text alignment based on topic modeling." Computing & Communication Technologies, Research, Innovation, and Vision for the Future (RIVF), 2016 IEEE
[5] Alzahrani, Salha and Naomie Salim. "Fuzzy semantic-based string similarity for extrinsic plagiarism detection." Braschler and Harman 1176 , 2010, pp 1-8
[6] Marsi, Erwin, and Emiel Krahmer. "Construction of an aligned monolingual treebank for studying semantic similarity." Language resources and evaluation 48.2, 2014, pp 279-306.
[7] Vrbanec, Tedo, and Ana Meštrović. "The struggle with academic plagiarism: Approaches based on semantic similarity." The 40th Jubilee International ICT Convention–MIPRO 2017.
[8] Zu Eissen, Sven Meyer, and Benno Stein. "Intrinsic plagiarism detection." European Conference on Information Retrieval. Springer, Berlin, Heidelberg, 2006.
[9] Stein, Benno, and Sven Meyer Zu Eissen. "Near similarity search and plagiarism analysis from data and information analysis to knowledge Engineering”. Springer, Berlin, Heidelberg, 2006, pp 430-437.
[10] Meuschke, Norman, and Bela Gipp. "State-of-the-art in detecting academic plagiarism." International Journal for Educational Integrity 9.1, 2013.
[11] Chong, Miranda, Lucia Specia, and Ruslan Mitkov. "Using natural language processing for automatic detection of plagiarism." Proceedings of the 4th International Plagiarism Conference, 2010.
[12] Gharavi, Erfaneh, et al. "A Deep Learning Approach to Persian Plagiarism Detection." FIRE (Working Notes), 2016.
[13] Agirre, Eneko, et al. "Semantic textual similarity, monolingual and cross-lingual evaluation." Proceedings of the 10th International Workshop on Semantic Evaluation, 2016.
[14] Kong, Leilei, et al. "Detecting High Obfuscation Plagiarism: Exploring Multi-Features Fusion via Machine Learning." International Journal of u-and e-Service, Science and Technology, 2014, pp 385-396.
[15] A Das and D Saha, "Improvement of Electronic Governance and Mobile Governance in Multilingual Countries with Digital Etymology Using Sanskrit Grammar," in Social Transformation – Digital Way. CSI 2018, 2018, pp. 523 - 530.
[16] Arijit Das, Tapas Halder, and Diganta Saha, "Automatic extraction of Bengali root verbs using Paninian grammar," 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), pp. 953 - 956.
[17] Arijit Das and Diganta Saha, "Improvement of electronic governance and mobile governance in multilingual countries with digital etymology using sanskrit grammar," 2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC), pp. 502 - 505.
Citation
A. Das, S.Shaw, "Use of Semantic Search to Enhance the Performance of Plagiarism Detection Tools", International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.165-169, 2019.
Detection of Blackhole Attack Using RMBOPB Based Agent
Research Paper | Journal Paper
Vol.07 , Issue.01 , pp.170-178, Jan-2019
Abstract
In this paper a novel technique has been introduce to detect black hole attack using Recursive Modulo 2 and Bitwise Operations of Paired Bits (RMBOPB) agent, where RMBOPB agent is fired from a monitoring nodes. The RMBOPB agent traverses throughout the network. If the RMBOPB agent reached to any Blackhole node then it will send the message to the monitor node for the malicious status signal to the monitor node. To implement Blackhole attack in Adhoc On Demane Distance Vector (AODV) routing protocol is taken as MANET routing protocol, and Network Simulator 2 (NS 2.34) is taken as simulation tool. Simulations are done through various node densities and various scenarios. Number of packet receive, packet delivery ratio and throughput is taken as the metric for the compassion of performance of the network. After comparing the every simulation it is seen that the proposed method detect the black hole attack in the network and increase the performance of the network.
Key-Words / Index Term
RMBOPB, Blackhole Attack, MANET, AODV, NS2, Wireless Security, etc
References
[1] C.Siva Ram Murthy and B.S manoj” Ad Hoc Wireless networks architecture and protocols” Pearson Education India 2005.
[2] PrasantMohapatra, Srikanth Krishnamurthy “Ad hoc networks: technologies and protocols” Springer 2005.
[3] Chai-KeongToh “Ad hoc mobile wireless networks: protocols and systems ” Prentice Hall.
[4] Amitava Mishra “Security and Quality of Service in Adhoc Wireless Network”, Cambridge University Press .
[5] Sarkar, S.K., Basavaraju, T.G., Puttamadappa, C.: Ad hoc Mobile Wireless Networks: Principles, Protocols and Applications.Auerbach Publications (2008).
[6] TeerawatIssariyakul, EkramHossain “Introduction to Network Simulator NS2” Springer (2009)
[7] Marc Greis` Tutorial http://www.isi.edu/nsnam/ns/tutorial/208 Computer Science & Information Technology (CS & IT) (last visited on 15/5/2017 at 15:02 IST).
[8] Mubashir Husain Rehmani, Sidney Doria, and Mustapha RedaSenouci “A Tutorial on the Implementation of Ad-hoc On Demand Distance Vector (AODV) Protocol in Network Simulator (NS-2)”
[9] Mandal, J. K.,Dutta, S.,Mal, S., “A Multiplexing Triangular Encryption Technique – A Move Towards Enhancing Security in E-Commerce, Proc. of Conference of Computer Association of Nepal, December, 2001.
[10] Mandal, J. K., Chatterjee R, “Authentication of PCSs with Triangular Encryption Technique”, Proceedings of 6th Philippine Computing Science Congress(PCSC 2006), Ateneo de Manila University, Manila, Philippine, March 28-29,2006.
[11] Dokurer, S. Ert, Y.M. ;Acar, C.E.” Performance analysis of ad-hoc networks under black hole attacks”, Proceedings. IEEE. pp. 148 – 153, 2007.
[12] Perkins, C.E., Royer, E.M., "Ad-hoc on-demand distance vector routing", www.cs.ucsb.edu/~ravenben/classes/papers/aodv-wmcsa99.pdf (last visited on 18/5/2017 at 09:45 IST).
[13] Deng, H., Li, W., Agrawal, D., "Routing Security in Wireless Ad Hoc Networks" IEEE Communication Magazine ( October 2002) pp. 70-75.
[14] Al-Shurman, M., Yoo, S., Park, S., "Black hole Attack in Mobile Ad Hoc Networks", ACM Southeast Regional Conference (2004) pp. 96-97.
[15] Mishra, A., Nadkarni, K., Patcha, A., "Intrusion detection in wireless ad-hoc networks", IEEE Wireless Communications, February 2004, pp. 48-60.
[16] MangeshGhonge, Prof. S. U. Nimbhorkar, “Simulation of AODV under Blackhole Attack in MANET” IJCSIR, Volume 2, Issue 2, February 2012.
[17] Johnson DB, Maltz DA: Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing. Volume 353. Edited by Imielinski T, Korth H. Kluwer Academic Publishers; 1996:153–181. 10.1007/978-0-585-29603-6_5.
[18] Park V, Corson S: Temporally-Ordered Routing Algorithm (TORA) Version 1 Functional Specification. Internet Draft, Internet Engineering Task Force MANET Working Group 1998.
[19] Deng H, Li W, Agrawal DP: Routing Security in Wireless Ad-hoc Networks. IEEE Communications Magazine 2002,40(10):70–75. doi: 10.1109/MCOM.2002.1039859. 94 .
[20] Sun B, Guan Y, Chen J, Pooch UW: Detecting Black-hole Attack in Mobile Ad Hoc Networks. Paper presented at the 5th European Personal Mobile Communications Conference, Glasgow, United Kingdom, 22–25 April 2003.
[21] Al-Shurman M, Yoo S-M, Park S: Black Hole Attack in Mobile Ad Hoc Networks. Paper presented at the 42nd Annual ACM Southeast Regional Conference (ACM-SE`42), Huntsville, Alabama, 2–3 April 2004.
[22] Tamilselvan L, Sankaranarayanan V: Prevention of Blackhole Attack in MANET. Paper presented at the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, Sydney, Australia, 27–30 August 2007.
[23] Djenouri D, Badache N: Struggling Against Selfishness and Black Hole Attacks in MANETs. Wireless Communications & Mobile Computing 2008,8(6):689–704. doi: 10.1002/wcm.v8:6.
[24] Kozma W, Lazos L: REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits. Paper presented at the Second ACM Conference on Wireless Network Security, Zurich, Switzerland, 16–18 March 2009.
[25] Raj PN, Swadas PB: DPRAODV: A Dynamic Learning System Against Blackhole Attack in AODV based MANET. International Journal of Computer Science 2009, 2: 54–59. doi: abs/0909.2371.
[26] Jaisankar N, Saravanan R, Swamy KD: A Novel Security Approach for Detecting Black Hole Attack in MANET. Paper presented at the International Conference on Recent Trends in Business Administration and Information Processing, Thiruvananthapuram, India, 26–27 March 2010.
[27] Mistry N, Jinwala DC, IAENG, Zaveri M: Improving AODV Protocol Against Blackhole Attacks. Paper presented at the International MultiConference of Engineers and Computer Scientists, Hong Kong, 17–19 March, 2010.
[28] Su M-Y: Prevention of Selective Black Hole Attacks on Mobile Ad Hoc Networks Through Intrusion Detection Systems. IEEE Computer Communications 2011,34(1):107–117. doi:10.1016/j.comcom.2010.08.007.
[29] Oliveira R, Bhargava B, Azarmi M, Ferreira EWT, Wang W, Lindermann M: Developing Attack Defense Ideas for Ad Hoc Wireless Networks. Paper presented at the 2nd International Workshop on Dependable Network Computing and Mobile Systems (DNCMS 2009) (in Conjunction with IEEE SRDS 2009), New York, USA, 27 September 2009.
[30] Ramaswamy S, Fu H, Sreekantaradhya M, Dixon J, Nygard K: Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks. Paper presented at the International Conference on Wireless Networks, Las Vegas, Nevada, USA, 23–26 June 2003.
Citation
Khondekar Lutful Hassan, J.K. Mandal , Md Saquib Zia, Deepshikha Shaw, "Detection of Blackhole Attack Using RMBOPB Based Agent", International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.170-178, 2019.
Metaheuristic Guided Secured Transmission of E-Prescription of Dental Disease
Research Paper | Journal Paper
Vol.07 , Issue.01 , pp.179-183, Jan-2019
Abstract
This paper presents a novel and secured approach of transmission using the Cuckoo search metaheuristic algorithm. Dental disease is mostly caused by the colonization of the bacteria inside the oral cavity. Colonization of bacteria affects our teeth, gums, nerves, etc. Such patients are very common and to be cured appropriately. If left untreated, it may lead to severe damages inside the oral cavity. Cardiovascular and metabolic activities are also affected due to dental diseases. To transmit such information of any patient, here an encryption technique has been proposed preceded by generation of suitable key. Fittest session key has been generated by implementing the Cuckoo search metaheuristic algorithm. A mask matrix has been created for the proposed ciphering technique. Patient’s E-prescription proposed by the dentist would be fragmented into multiple fragments. In this paper, serial test has been used for testing the robustness of key and test results obtained reflects the good randomness in nature.
Key-Words / Index Term
Cuckoo Search, Fragments, Encryption
References
[1]. Mandal, B. K., Bhattacharyya, D., & Bandyopadhyay, S. K.,
Designing and Performance Analysis of a Proposed Symmetric
Cryptography Algorithm, In the Proceedings of the International
Conference on Communication Systems and Network Technologies
(CSNT 2013), April 6-8 2013, Gwalior, India, pp. 453-461.
[2]. Christian Blum, Ant Colony Optimization: Introduction and recent
trends,Physics of Life Review, Elsevier, Vol. 2, Issue 4, December
2005, pp. 353-373
[3]. Ping Duan, Yong AI, Research on an Improved Ant Colony
Optimization Algorithm and its application, International Journal of
Hybrid Information Technology Vol.9, No.4 (2016), pp. 223-234.
[4]. Clark, J.A., Nature-Inspired Cryptography: Past, Present and
Future, In Proceedings of Conference on Evolutionary Computation,
December 8-12, 2003, Canberra, Australia.
[5]. M. Mareli, B. Twala, An adaptive cuckoo search algorithm for
optimisation, Applied Computing and Informatics, Volume 14, Issue 2, pp. 107-115, July. 2018.
[6]. Prabir Kr. Naskar, Hari Narayan Khan, Atal Chaudhuri, A Key Based
Secure Threshold Cryptography for Secret Image, International
Journal of Network Security, Vol.18, No.1, PP.68-81, Jan. 2016
[7]. Preeti Singh et al, “Symmetric Key Cryptography: Current Trends”, International Journal of Computer Science and Mobile Computing,
Vol.3 Issue.12, December- 2014, pg. 410-415.
[8]. H. F. Hua ng and C.C. Chang “A novel efficient (t, n) threshold
proxy signature scheme”, Information Sciences 176(10): 1338-1349, 2006.
[9]. Bozkurt, Kaya, Selcuk, Guloglu ,“Threshold Cryptography Based
On Blakely Secret Sharing”, Information Sciences 177(19):4148–
4160, 2008.
[10]. Stallings William, “Cryptography and Network Security”, Pearson India Education Service Pvt. Ltd., pp.111-155, 2015
Citation
Joydeep Dey, Sunil Karforma, Arindam Sarkar, Anirban Bhowmik, "Metaheuristic Guided Secured Transmission of E-Prescription of Dental Disease", International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.179-183, 2019.
A Dynamic Key Generation Scheme based on Metaheuristic Cuckoo Search
Survey Paper | Journal Paper
Vol.07 , Issue.01 , pp.184-187, Jan-2019
Abstract
Nature inspired food foraging features by the cuckoo species promotes the proposed methodology to generate a true random session key. To make more complex for the intruders, a key based on the behavior of cuckoo species creates the fittest solution out of the sample population. Metaheuristic based optimization algorithms are good enough to encapsulate information during the wireless communication in more secured approach. Statistical fitness function ensuring with randomized expansion of bits in the session key have been tested. The key which has been generated dynamically using cuckoo search passed through different statistical tests in order to synthesize the randomness. In this paper run test is used for examining the robustness of key and test result shows the good randomness.
Key-Words / Index Term
Cuckoo Search, Levy flights, Statistical tests
References
[1]. Younsung Choi, Cryptanalysis on Privacy-Aware Two-Factor Authentication Protocol for Wireless Sensor Networks, Indonesian Journal of Electrical Engineering and Computer Science Vol. 8, Issue 2, pp. 296 – 301, 2017
[2]. Xin-She Yang, Suash Deb, Cuckoo Search via Levy Flights, In the Proceedings of the 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC 2009), IEEE Publications, USA, pp.210-214, 2009.
[3]. T. El-Ghazali, Metaheuristics: From Design to Implementation, vol. , John Wiley & Sons,
[4]. T. El-Ghazali, Metaheuristics: From Design to Implementation, vol. , John Wiley & Sons,
[5]. Gove Nitinkumar Rajendra, Bedi Rajneesh kaur , “A New Approach for Data Encryption Using Genetic Algorithms and Brain Mu Waves”, International Journal Of Scientific And Engineering Research Volume 2, Issue 5, May-2011.
[6]. Baumjohann, W., and R. A. Treumann (1997), Basic Space Plasma Physics, Imperial College Press, London.
[7]. Abramowitz, M., and I. A. Stegun (1965), Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables, Dover.
[8]. Iztok Fister Jr., Dusan Fister, Iztok Fister, A comprehensive review of cuckoo search: variants and hybrids, Int. J. Mathematical Modelling and Numerical Optimisation, Vol. 4, Issue. 4, pp.387-409, 2013.
[9]. 7.C.Asmuth and J.Bloom, A modular to key safeguarding, IEEE Transaction on Information Theory, vol.29, no. 2, pp. 208-210, 1983.
[10]. G.R. Blakley, Safeguarding cryptographic keys,in Proceedings of AFIPS International Worhshop on Managing Requirements Knowledge, pp. 313, 1979.
[11]. Whitfield Diffman and Martin Hellman New Directions of
cryptography, Bulletin of the American Mathematical Society 42 (2005), 3-38; online in 2004. ISSN 0273-0979.
[12]. M. L Wu and T. Y. Hwang, 1984, Access control with single key-lock, IEEE Transaction on Software Engineering, Vol. SE- , No. 2, pp.185-191.
Citation
Arindam Sarkar, Joydeep Dey, Anirban Bhowmik, Sk. Samim Ferdows, "A Dynamic Key Generation Scheme based on Metaheuristic Cuckoo Search", International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.184-187, 2019.
A Symmetric Key based Secret Data Sharing Scheme
Research Paper | Journal Paper
Vol.07 , Issue.01 , pp.188-192, Jan-2019
Abstract
Data security over the Internet communication is the prime concern in this technological fast era. One of the major and fruitful security techniques is data encryption with keys. The efficiency of the encryption depends on the resistance ability of the encryption key. This paper presents an attack resistant symmetric key encryption model. In this paper, the threshold cryptographic technique provides a reliable and robust key and cipher text management system. The novelty of this system is it reconstructs the key and cipher text even in the case of destruction of difference between total shares and threshold shares on the contrary end. Thus secret sharing with symmetric key provides a robust encryption technique. The implemented symmetric key is the unique group symmetric key. The existing techniques available in world lead to high computational complexity during both sharing and reconstructing of plain text. A proposed masking method, share generation using that mask and transmission has been deployed. The symmetric key is used to impose proposed authenticity of data by implementation of the proposed key expansion technique. A secret sharing technique along with conventional cryptography technique for symmetric key validation and management make this methodology more robust. Statistical type of test results proves the robustness of our technique.
Key-Words / Index Term
Secret Sharing, Key Expansion, Symmetric key encryption
References
[1]. Stallings William ,“Cryptography and Network Security”, Pearson India Education Service Pvt. Ltd., pp.111-155, 2015.
[2]. Preeti Singh et al, “Symmetric Key Cryptography: Current Trends”, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.12, pp. 410-415, 2014.
[3]. G.R. Blakley, “Safeguarding cryptographic key”, In Proceedings of AFIPS International Worhshop on Managing Requirements Knowledge, pp. 313, 1979.
[4]. Shamir: “How to share a secret?”,Comm ACM 22(11): 612-613, 1979.
[5]. A. De Santis, Y. Desmedt, Y. Frankel and Y. Yung “How to share a function securely?” ,In proceeding of STOC 94, pp. 522-533, 1994.
[6]. C. Asmuth and J.Bloom, “A modular to key safeguarding”, IEEE Transaction on Information Theory, vol.29, no. 2, pp. 208-210, 1983.
[7]. Prabir Kr. Naskar, Hari Narayan Khan, Ayan Chaudhuri, Atal Chaudhuri “Ultra Secured and Authentic Key Distribution Protocol using a Novel Secret Sharing Technique”, International Journal of Computer Applications (0975 – 8887) Volume 19– No.7, April 2011.
[8]. Y. Desmedt “Some recent research aspects of threshold Cryptography”,In proceeding of ISW’97 1st International Information Security Workshop vol.1196 of LNCS pp. 158-173 Springer-Verlag 1997.
[9]. H. F. Hua ng and C.C. Chang A “novel efficient (t, n) threshold proxy signature scheme”, Information Sciences 176(10): 1338-1349, 2006.
[10]. A. Peinado, J. Munilla, and A. F ´uster-Sabater. EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen. Sensors, 14(4):6500-6515, 2014
[11]. F. Zheng, X. Tian, J. Song, and X. Li. “Pseudo-random sequence generator based on the generalized henon map”, The Journal of China Universities of Posts and Telecommunications, 15(3):pp.64–68, 2008.
Citation
Anirban Bhowmik, Arindam Sarkar, Sunil Karforma, Joydeep Dey, "A Symmetric Key based Secret Data Sharing Scheme", International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.188-192, 2019.
Cloud ERP: An Overview
Review Paper | Journal Paper
Vol.07 , Issue.01 , pp.193-200, Jan-2019
Abstract
In the current market practice, cloud ERP application has gained momentum with the changing market scenario. Companies are evolving with cloud platform with low initial investment. This study aims to depict the current scenario of the cloud ERP market and their offerings and further implementing issues with a greater focus on strategic business process.
Key-Words / Index Term
Enterprise Resource Planning (ERP), Cloud ERP, Cloud offerings
References
[1]. V. K.Garg, , & N. K.Venkitakrishnan," Enterprise Resourcs Planning : Concepts and Practice".
[2]. G. F.Raihana," Cloud erp – a solution model", International Journal of Computer Science and Information Technology & Security , Vol 2, Issue 1.
[3]. F. J.Riggins, "Toward a Unified View of Electronic Commerce",Communications of the ACM ,Vol 41 Issue 10, Pp 88-95,1998.
[4]. C.Sullivan,"Beyond Traditional EDI: Electronic Commerce Demystified", Inform , Vol 12, Issue 10, Pp 22-25, 1998.
[5]. H. W. Sunu, R. P. Norman, K. S. Kamen, L. P. Schifferand and A. B.Perri," Recent developments in e-commerce", Tort & Insurance Law Journal , Vol 37 Issue 2,2002.
[6]. F.Weng, M.C. Hung,"Competition and Challenge on Adopting Cloud ERP",International Journal of Innovation, Management and Technology , Vol 5 Issue 4, 2014.
Citation
D.Rakshit, P. Chatterjee, "Cloud ERP: An Overview", International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.193-200, 2019.
Volatility spillover between Gold Spot & future market in India: An Experiment with Multi commodity Exchange
Research Paper | Journal Paper
Vol.07 , Issue.01 , pp.201-207, Jan-2019
Abstract
In economics spillover effects are economic events in one context that occur because something else in a seemingly unrelated context. When more information about someone generates more information about people related to her and that information helps to eliminate asymmetries in information, then the spillover effects are positive. Spillover from disequilibrium in one market may influence effective demand in other market. In the present initiative we venture to investigate whether the volatility in the spot price have a spill over effect on futures price or vice-versa. As India is one of the largest market markets for gold and growing affluence is driving growth in demand, we focus on Gold spot and future market. We have collected daily data from MCX for the period from 1 st April 2008 to 31 st March 2018. Our basic objective is to investigate the spill over effect of spot market volatility on futures prices volatility or vice versa. In order to complete our experiment we have done descriptive statistics, unit root test, ARCH test, GARCH test on our sample data. Having completed our experiments and obtaining results on measurement of price volatility in both segments of the market we take further initiatives to run exponential GARCH (Nelson and Cao, 1991) and threshold GARCH (Zakoian,1994) models. The reasons behind our model selection are in the pursuit of usefulness in asset pricing Exponential GARCH (EGARCH). Threshold GARCH (TGARCH) is different from Jagannathan-Runkel GARCH (1993) only in one parameter. In TGARCH model specification is on conditional standard deviation instead of conditional variance. Our TGARCH has captured asymmetric effects of positive and negative shocks of the gold futures market in India. We are confident that our research contributes towards greater understanding of (i) direction of spill over effect and (ii) asset pricing and leverage effects in the gold futures market. The results of our experiment provided evidence that effect of negative shock have less effective than positive shocks. This result is quite contradictory to Barreto & Ramesh (2018) and Srinivasan & Ibrahim (2012). Besides the study results shows that spilllover of certain information takes place from future price to spot price. Our result is similar to Barreto & Ramesh (2018) and Mahalik et al (2009). However, unlike these two research papers our result claims spilllover of certain information takes place from spot market to future market. This is quite identical to the findings of Srinivasan & Ibrahim (2012).
Key-Words / Index Term
Spillover effect, Gold Future, Price volatility, GARCH (1,1), EGARCH, TGARCH
References
[1] D. Asteriou, S.G. Hall, “Applied Econometrics A Modern Approach”, Palgrave Macmillan, New York , pp.249-270,2007.
[2] C. Brooks, “Introductory econometrics for finance”, Cambridge University Press, New York, pp.425-443,2014.
[3] W.H.Greene, “Econometric Analysis”, Pearson Education, Inc., publishing as Prentice Hall, One Lake Street, Upper Saddle River,2012.
[4] B.E.Barreto, B.Ramesh, “Price discovery and Volatility Spillover in Metal Commodity Market in India”, Indian Journal of accounting, Vol. 50, Issue.1, pp. 97-106, 2018.
[5] M.H.Bilgin, G.Gozgor, G. Karabulut, “The impact of world energy price volatility on aggregate economic activity in developing Asian economies” The Singapore Economic Review,Vol. 60, Issue.1,2015. DOI: 10.1142/S0217590815500095.
[6] T.E.Day, C.M. Lewis, “Initial Margin Policy and Stochastic Volatility in the Crude Oil futures market”, The Review of Financial Studies, Vol.10, Issue.2, pp. 303-332, 1997.
[7] Y.Ge, H.H.Wang, S.K.Ahn, “Cotton market integration and the impact of china’s new exchange rate regime”, Agricultural Economics, Vol.41, pp. 443–451, 2010.
[8] D.V.Gakhar, “Indian Derivatives Market: A Study of Impact on Volatility and Investor Perception”. International Journal of Social Science and Humanity, Vol. 6, Issue.12, 2016.
[9] E.Haugom, R.Ray, “Heterogeneous traders, liquidity, and volatility in crude oil futures market”, Journal of Commodity Markets, Issue.5, pp. 36–49, 2017.
[10] M.K.Mahalik, D.Acharya, M.S.Babu, “Price discovery and volatility spillovers in futures and spot commodity markets: Some empirical evidence from India”, 4th Annual international Conference on Public policy and Management(IIMB), pp.062-10, 2009. http://www.igidr.ac.in/pdf/publication/PP-062-10.pdf
[11] S.Sehgal, N.Rajput, R.K.Dua, “Futures trading and spot market volatility: Evidence from Indian commodity markets”, Asian Journal of Finance and Accounting, Vol. 4, Issue.2, 2012.
[12] P.Srinivasan, P.Ibrahim, “Price discovery and Asymmetric Volatility Spillovers in indian Spot-Futures Gold Markets”, International journal of Economic Sciences and applied Research, Vol. 5, Issue.3, pp. 65-80, 2012.
[13] R.Sendhil, A.Kar, V.C.Mathur, G.K.Jha, “Price Discovery, Transmission and Volatility: Evidence from Agricultural commodity futures”, Agricultural Economics Research Review, Vol. 26, Issue.1, pp. 41-54, 2013.
[14] A.A.Salisu, I.O.Fasanya, “Comparative performance of Volatility Models for Oil Price”. International Journal of Energy Economics and Policy, Vol. 2, Issue.3, pp. 167-183, 2012.
[15] www.goldcouncil.org
[16] www.mcxindia.com.
Citation
A. Saha, S. Chakraborty, G. Mitra, "Volatility spillover between Gold Spot & future market in India: An Experiment with Multi commodity Exchange", International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.201-207, 2019.
Object Oriented Modeling of Optimal LSB-based Steganography for Secure Transmission of E-learning Documents
Research Paper | Journal Paper
Vol.07 , Issue.01 , pp.208-214, Jan-2019
Abstract
In an e-learning system, all communications take places through Internet. When sender sends some secret documents to the receiver hiding them into the cover image, the image incorporates some sort of distortion, at the time of decompression. This LSB based steganographic approach will help the sender to send the documents after making compression and the receiver will receive the documents without having any sort of distortion. Here the proposed model has been wrapped in object oriented models to achieve the benefits of the object oriented approach.
Key-Words / Index Term
e-Learning, LSB-based steganography, Use case diagram, Timing diagram
References
[1] Weippl, E. R. (2005). Security in E-learning. USA: Springer.
[2] F.Y.Shih. (2008). Digital watermarking and Steganography. London: CRC Press.
[3] Halder, T., & S.Karforma. (2013). A lsb-indexed steganographic approach to secure e-governance data. Second International Conference on Computing and Systems-2013 (pp. 158-163). Burdwan: Department of computer science, The University of Burdwan.
[4] S.Banerjee, S.Karforma, & A.Nag. (2017). Applying LSB steganography for disseminating academic testimonials in e-
learning and its authentication purpose. International journal of computer trends and technology , 170-175.
[5] E.Balagurusamy. (2006). Object oriented programming with C++. New York: Tata McGraw-Hill.
[6] Mall, R. (2014). Fundamentals of Software engineering. Delhi: Prentice Hall India.
[7] Karforma, S., & Banerjee, S. (2015). Object Oriented Modeling of ElGamal Digital Signature for Authenitcation of Study Material in E-learning System. IJARSE , 455-460.
[8] OOAD Object oriented paradigm. (n.d.). Retrieved November 20, 2018, from tutorialspoint: https://www.tutorialspoint.com/uml/index.htm
Citation
Soumendu Banerjee, "Object Oriented Modeling of Optimal LSB-based Steganography for Secure Transmission of E-learning Documents", International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.208-214, 2019.
Object-Oriented Modelling Of Kerberos Based Authentication Process In E-Banking Transaction
Research Paper | Journal Paper
Vol.07 , Issue.01 , pp.215-219, Jan-2019
Abstract
The exponential growth and the success rate of different electronic application areas like E-Services, E-Governance, E-Payment, E-Banking, E-Shopping etc is enormously dependant on security, authenticity and integrity of the most confidential information which is sent across the network by the sender. With the increasing menace of several cyber threats, the sender has to feel safe in sending across their identity details over the communication medium. On the other hand, the receiver must receive the same, without any loss or tampering of information as there are several intruders or eavesdroppers waiting to steal the financial data/information. The security parameters cannot be compromised at any cost. Hence, to combat the pilferage of data, different types of authentication protocols and mechanisms have been in use. For example, the banking sector often uses a two-factor authentication, e-commerce merchants go for different layers of authentication and so on. This paper focuses on the use of the most popular authentication protocol, Kerberos, which could be applied for logging in for e-banking system, in order to achieve the highest level of security. Furthermore, we have tried an attempt to use object-oriented modeling to show the working of the authentication with the help of Kerberos and IDEA encryption algorithm as an added level of protection.
Key-Words / Index Term
Authentication, Object-oriented modeling, Kerberos protocol, IDEA, E-Banking
References
[1] B. Schneier, “Applied Cryptography, Second Edition: Protocols, Algorithms and Source Code in C”, Wiley Computer Publishing, John Wiley & Sons,Inc.,pp. 266-271,470-475,2007.
[2]W. Stallings, “Cryptography and Network Security”, Pearson,5th Edition, 2011.
[3] J.T. Kohl,. "The use of encryption in Kerberos for network authentication." In Conference on the Theory and Application of Cryptology, pp. 35-43. Springer, New York, NY, 1989.
[4] A.Fox, and S D. Gribble. "Security on the move: indirect authentication using Kerberos." In Proceedings of the 2nd Annual International Conference on Mobile Computing and Networking, Berkeley, USA, ACM pp.155-164, 1996.
[5] E.El-Emam,M. Koutb, H.M. Kelash, and O.S. Faragallah. "An Authentication Protocol Based on Kerberos 5." IJ Network Security ,Vol.12,No. 3,pp.159-170, 2011.
[6] G. Dua, N. Gautam, D. Sharma, and A. Arora. "Replay attack prevention in Kerberos authentication protocol using triple password", International Journal of Computer Networks & Communications (IJCNC) , Vol.5, No.2, March 2013.
[7] E.El-Emam, M.Koutb, H.Kelash, and O. Farag Allah. "An optimized Kerberos authentication protocol", International Conference on Computer Engineering & Systems 2009, ICCES 2009,Cairo, Egypt, pp. 508-513,IEEE, 2009.
[8] J.T Kohl, B. Clifford Neuman and Y. Theodore. "The evolution of the Kerberos authentication service", 1994.
[9] S.Patil & V. Bhusari,” An enhancement in international data encryption algorithm for increasing security”, Intl. J. of Application or Innovation in Engineering & Management, Vol.3.No.8, pp. 64- 70,2014.
[10]S. F. Shazmeen,S. Prasad,”A Practical Approach for Secure Internet Banking based on Cryptography”, International Journal of Scientific and Research Publications, Volume 2, Issue 12, December 2012, ISSN 2250-3153.
[11]S. Artheeswari, Dr. RM. Chandrasekaran, “INTERNATIONAL DATA ENCRYPTION ALGORITHM (IDEA) FOR DATA SECURITY IN CLOUD”, “International Journal of Technology and Engineering System” (IJTES),Vol 8. No.1, Pp. 06- 11,Jan- Mar 2016, ISSN: 0976-1345.
[12] P.Bhadauriya, F. Suthar & S. Chaudhary, “A Novel Technique for Secure Communication in Cryptography”. IJARCCE, pp.328-331, 2017.
[13] S. Basu, “INTERNATIONAL DATA ENCRYPTION ALGORITHM (IDEA) – A TYPICAL ILLUSTRATION”, International Journal Of Global Research in Computer Science, July 2011.
[14] J. R. Rumbaugh , M. R. Blaha, W. Premerlani, F. Eddy,W. Lorensen,“Object-Oriented Modeling And Design”, Prentice Hall of India Private Limited, India,pp.16-17,1998.
[15] R. Mall, “Fundamentals Of Software Engineering” Fourth Edition, Prentice Hall of India Private Limited, India pp.276-334, 2014.
Citation
M. Das Nath, S. Karforma, "Object-Oriented Modelling Of Kerberos Based Authentication Process In E-Banking Transaction", International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.215-219, 2019.
A Comparative Study of Three IR models for Bengali Document Retrieval
Research Paper | Journal Paper
Vol.07 , Issue.01 , pp.220-225, Jan-2019
Abstract
In this paper, we studied and examined some selected information retrieval approaches for Bengali information retrieval. These approaches used keyword to describe the content of each document. We choose three models to understand their working mechanisms and shortcomings. These models are TFIDF Vector Space model, Latent Semantic Indexing (LSI) model, and BM25 model. This understanding is important to overcome these shortcomings. These models are examined on our created Bengali dataset and Bengali queries and the results are stated in the result section in this paper. Our study reveals that Okapi BM25 model performs best among the three IR models studied for Bengali document retrieval.
Key-Words / Index Term
Information Retrieval, Bengali language, LSI, BM25, probabilistic, Query
References
[1] R. Banerjee, & S. Pal, “ISM @ FIRE - 2011: Monolingual Task”, In Working Notes of the Forum for Information Retrieval Evaluation (FIRE 2011). Available at http://www.isical.ac.in/~fire/2011/workingnotes. html (visited May 2015),2011.
[2] U. Barman, P. Lohar, P. Bhaskar, & S. Bandyopadhyay, “ Ad-hoc Information Retrieval focused on Wikipedia based Query Expansion and Entropy Based Ranking” ,Working Notes of the Forum for Information Retrieval Evaluation, Available at http://www.isical.ac.in/~fire/2012/working-notes.html, 2012.
[3] P. Bhaskar, Das, A. Pakra & S. Bandyopadhyay , “Theme Based English and Bengali Ad-hoc Monolingual Information Retrieval in FIRE 2010”, In Working Notes of the Forum for Information Retrieval Evaluation (FIRE 2010), Available at http://www.isical.ac.in/~fire/2010/working_notes.html (visited May 2015), 2010.
[4] S. Deerwester, S. T. Dumais, G. W. Furnas, T. K. Landauer, & R. Harshman, “Indexing by latent semantic analysis”, Journal of the American society for information science, Vol. 41, No. (6), 391. 1990.
[5] L. Dolamic & J. Savoy, “UniNE at FIRE 2008: Hindi, Bengali, and Marathi IR” , In: Working Notes of the Forum for Information Retrieval Evaluation (FIRE 2008). Available at http://www.isical.ac.in/~fire/2008/working_notes.html (visited May 2015) ,2008.
[6] D. Ganguly, J. Leveling, & G. J. F. Jones, “A Case Study in Decompounding for Bengali Information Retrieval. Information Access Evaluation, Multilinguality, Multimodality, and Visualization, Lecture Notes in Computer Science, Vol. 8138, pp. 108-119,2013.
[7] M. Kantrowitz, B. Mohit, & V. Mittal ,“Stemming and Its Effects on TFIDF Ranking” In Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Athens, Greece ,pages 357–359, 2000.
[8] W. Kraaij & R. Pohlmann, “Viewing stemming as recall enhancement” In Proceedings of the 19th annual international ACM SIGIR conference on Research and development in information retrieval, ACM ,pp. 40-48,1996.
[9] P. J. Loponen, , & K. Jarvelin, “UTA Stemming and Lemmatization Experiments in the Bengali ad hoc Track at FIRE 2010”, In Working Notes of the Forum for Information Retrieval Evaluation (FIRE 2010). Available at http://www.isical.ac.in/~fire/2010/working_notes.html (visited May 2015), 2010.
[10] P. Majumdar, M. Mitra,S.K. Parui & G. Kole, “YASS: Yet Another Suffix Stripper”, ACM Transactions on Information Systems, Vol. 25 , No.4, Article 18,2007.
[11] R. Marcus, “Computer and Human Understanding in Intelligent Retrieval Assistance”, American Society for Information Science, 28, 1998.
[12] P. McNamee, “N-gram Tokenization for Indian Language Text Retrieval”, In Working Notes of the Forum for Information Retrieval Evaluation (FIRE 2008), Available at http://www.isical.ac.in/~fire/2008/working_notes.html (visited May 2015), 2008.
[13] J. H. Paik & S. K. Parui, “A Simple Stemmer for Inflectional Language” , In Working Notes of the Forum for Information Retrieval Evaluation (FIRE 2008), Available at http://www.isical.ac.in/~fire/2008/working_notes.html (visited May 2015), 2008.
[14] S. .E. Robertson, “The probability ranking principle in IR”, Journal of Documentation, 33, 294-304, 1977.
[15] G. Salton, A. Wong & C. S. Yang, “A vector space model for automatic indexing” , Communications of the ACM, Vol.18, No.11, PP.613-620, 1975.
[16] K. Sarkar & A. Gupta, “An Empirical Study of Some Selected IR Models for Bengali Monolingual Information Retrieval”, In Proceedings of ICBIM, NIT, Durgapur, 2016.
[17] K. Jones Spärck , S. Walker & S. E. Robertson, “A probabilistic model of information retrieval Development and comparative experiments”, IP&M, Vol. 36, No. 6, pp.779–808, 809–840.
[18] H. Turtle & W. Bruce Croft, “Inference networks for document retrieval”, InProc. SIGIR, pp. 1–24, 1989
[19] H. Turtle & W. Bruce Croft, “Evaluation of an inference network-based Retrieval model”, TOIS ,Vol.9, No. 3, pp.187–222, 1991.
[20] C. J. Van Rijsbergen, “Information Retrieval”, 2nd edition, Butterworths, LONDON, 1979.
[21] A. Singhal and F. Pereira, “Document expansion for speech retrieval” , In procedding of ACM SIGIR, Berkeley, CA, USA, pages 223-232,1999.
[22] M. Berry, S. Dumais and G. W. O’Brien, “Using linear algebra for intelligent information retrieval, SIAM Review, pp.573-595, 1995.
[23] D.R Radev, H. Jing, M. Sty´s, and D. Tam. Centroid-based summarization of multiple documents. Information Processing and Management,Vol. 40, No. 6,pp.919–938, 2004.
[24] S. Chatterjee & K. Sarkar, Combining “IR Models for Bengali Information Retrieval”, International Journal of Information Retrieval Research (IJIRR), vol.8 issue 3 article 5, pp.68-83, 2017.
Citation
Soma Chatterjee, Kamal Sarkar, "A Comparative Study of Three IR models for Bengali Document Retrieval", International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.220-225, 2019.