Skip to main content

Hemanta Baruah

International Journal of Computer Science and Information Security (IJCSIS) proposes and fosters discussion on and dissemination of issues related to research and applications of computer science and security is an interdisciplinary field... more
International Journal of Computer Science and Information Security (IJCSIS) proposes and fosters discussion on and dissemination of issues related to research and applications of computer science and security is an interdisciplinary field including many fields such as wireless networks and communications, protocols, distributed algorithms, signal processing, embedded systems, and information management etc.
Other field coverage includes: security infrastructures, network security: Internet security, content protection, cryptography, steganography and formal methods in information security; multimedia systems, software, information systems, intelligent systems, web services, data mining, wireless communication, networking and technologies, innovation technology and management. (See monthly Call for Papers)
IJCSIS is published using an open access publication model, meaning that all interested readers will be able to freely access the journal online without the need for a subscription. The journal has a distinguished editorial board with extensive academic qualifications, ensuring that the journal maintains high scientific standards and has a broad international coverage.

https://sites.google.com/site/ijcsis/Home
Research Interests:
A modification of the sequential probability ratio test is proposed in which Wald's parallel boundaries are broken at some preassigned point of the sample number axis and Anderson's converging bound-aries are used prior to that.... more
A modification of the sequential probability ratio test is proposed in which Wald's parallel boundaries are broken at some preassigned point of the sample number axis and Anderson's converging bound-aries are used prior to that. Read's partial sequential probability ratio test can be ...
The formula available in the literature to find the sum of two discrete fuzzy numbers needs a major change. We have shown in this article with the help of numerical examples as to why the existing formula does not quite look logical. We... more
The formula available in the literature to find the sum of two discrete fuzzy numbers needs a major change. We have shown in this article with the help of numerical examples as to why the existing formula does not quite look logical. We are going to put forward a different formula to find the sum using the weighted average of the levels of presence of the discrete fuzzy numbers concerned. With numerical examples we have shown that our proposed formula does return expected results.
The main objective of this paper is to implement the classifications algorithms in Neo4j graph database using cypher query language. For implementing the classification algorithm, we have used Indian Premier League (IPL) dataset to... more
The main objective of this paper is to implement the classifications algorithms in Neo4j graph database using cypher query language. For implementing the classification algorithm, we have used Indian Premier League (IPL) dataset to predict the winner of the matches using some different features. The IPL is the most popular T20 cricket league in the world. The prediction models are based on the city where the matches were played, winner of the toss and decision of the toss.  In this paper we have implemented Naïve Bayes and K-Nearest Neighbors (KNN) classification algorithms using cypher query language. Different classifiers are used to predict the outcome of different games like football, volleyball, cricket etc, using python and R. In this paper we shall use cypher query language. We shall also compare and analysis the results which are given by Naïve Bayes and K-Nearest Neighbors algorithms to predict the winner of the matches.
In Russia, COVID-19 has currently been growing hyper-exponentially. This type of a spread pattern was not seen during the first wave of the pandemic the world over. Indeed when the disease had first appeared, in the accelerating stage the... more
In Russia, COVID-19 has currently been growing hyper-exponentially. This type of a spread pattern was not seen during the first wave of the pandemic the world over. Indeed when the disease had first appeared, in the accelerating stage the spread pattern was observed to have followed a highly nonlinear pattern that could be said to be approximately exponential or sub-exponential. As to why in the resurgence the growth has become hyper-exponential is another matter. But this has been happening in Europe and how long this would continue cannot be predicted. It may so happen that in the countries in which retardation has already been taking place, there may be resurgence of the disease. It was observed that in the World as a whole, retardation was on the threshold during the second half of September. But if the resurgence happens to follow the hyper-exponential growth pattern in different countries, there may be resurgence in the World as a whole.
There are standard techniques of forecasting the spread of pandemics. Uncertainty however is always associated with such forecasts. In this article, we are going to discuss the uncertain situation currently prevailing in the COVID-19... more
There are standard techniques of forecasting the spread of pandemics. Uncertainty however is always associated with such forecasts. In this article, we are going to discuss the uncertain situation currently prevailing in the COVID-19 spread in India. For statistical analysis, we have considered the total number of cases for 60 consecutive days, from June 23 to August 21. We have seen that instead of taking data of all 60 days together, a better picture of uncertainty can be observed if we consider the data separately in three equal parts from June 23 to July 12, from July 13 to August 1, and from August 2 to August 21. For that we would first need to ascertain that the current spread pattern in India is almost exponential. Thereafter we shall show that the data regarding the total number of cases in India are not really behaving in an expected way, making forecasting the time to peak very difficult. We have found that the pandemic would perhaps change its pattern of growth from near...
In this expository article, we are aiming to show with an example that even short term forecasts regarding the COVID-19 spread pattern may sometimes not be very reliable. We have studied data published by Worldometers.info to get... more
In this expository article, we are aiming to show with an example that even short term forecasts regarding the COVID-19 spread pattern may sometimes not be very reliable. We have studied data published by Worldometers.info to get numerically an approximate formula of the spread pattern for a short period. We have observed that in the United States of America, there was a nearly exponential spread pattern for a very short period from May 3 to May 8, 2020. From May 9 to May 13, the nearly exponential character of the spread was found to be absent. Hence it can be concluded that the COVID-19 spread pattern, even after more than four months from the start of the outbreak, is not quite predictable. Therefore even short term forecasts regarding the spread may not be very reliable. We have found that forecasts using the assumption of an exponential pattern of spread may actually lead to overestimation.
We are going to show that the pattern of spread of COVID-19 outside China is not monotonic. We have considered the data outside China because we are going to study the data starting from March 21, and by that time the spread had almost... more
We are going to show that the pattern of spread of COVID-19 outside China is not monotonic. We have considered the data outside China because we are going to study the data starting from March 21, and by that time the spread had almost come to a stop in China. We have used for our analysis data on total cases outside China till April 25, 2020, and data from April 26 to April 30 for comparison of forecasts and observed values. Right from the beginning the spread pattern was nonlinear, and by the end of the third week of March the nonlinearity became nearly exponential. The exponential pattern thereafter has changed by around March 28, April 5, April 11 and April 18. Since March 21, the spread is following a nearly exponential pattern of growth changing observably at almost regular intervals of seven days. It is but natural that at some point of time the countries that had been contributing in observably large numbers to the total cases would start to show diminishing growth patterns....
"In this paper a numerical method has been developed to project the total population of a geographical region. The method has been applied to the Indian situation. It is found that the total... more
"In this paper a numerical method has been developed to project the total population of a geographical region. The method has been applied to the Indian situation. It is found that the total population of India was expected to lie between [836 million and 850 million in 1991 and between 986 million and 1,042 million] in 2001."
In this article, we are going to show how to find out short term forecasts of the total number of COVID-19 cases in India in an easy way. Initially the spread of the disease was observably slow in India. Since the first week of May a... more
In this article, we are going to show how to find out short term forecasts of the total number of COVID-19 cases in India in an easy way. Initially the spread of the disease was observably slow in India. Since the first week of May a highly nonlinear pattern has started to take shape. It can be observed that currently in India the spread pattern is nearly exponential. It can be seen further that the number of cases is still continuing to grow very fast. Therefore, instead of going for rigorous time series analysis, we may opt for looking at the data from a recent date downwards, and short term forecasts based on simple numerical analytical methods can be made accordingly.
In Europe the Corona Virus spread had started to retard months ago, but after some time it has started to accelerate again. In this article, we are going to analyze the current COVID-19 spread patterns in Italy, the UK, Germany, Russia,... more
In Europe the Corona Virus spread had started to retard months ago, but after some time it has started to accelerate again. In this article, we are going to analyze the current COVID-19 spread patterns in Italy, the UK, Germany, Russia, Spain and France. We have found that the current spread has perhaps been underestimated as just the second wave. As per our analysis, as on 7 October the resurgence is much more vigorous than the first wave of spread of the disease. It is going to be most serious in Russia, followed by Italy, Germany and the UK, while in Spain and France the patterns are yet to take inferable shapes.
In this article, based on Zadeh's extension principle we have apply the parametric programming approach to construct the membership functions of the performance measures when the interarrival time and the service time are fuzzy... more
In this article, based on Zadeh's extension principle we have apply the parametric programming approach to construct the membership functions of the performance measures when the interarrival time and the service time are fuzzy numbers based on the Baruah's Randomness- Fuzziness Consistency Principle. The Randomness-Fuzziness Consistency Principle leads to defining a normal law of fuzziness using two different laws of randomness. In this article, two fuzzy queues FM/M/1 and M/FM/1 has been studied and constructed their membership functions of the system characteristics based on the aforesaid principle. The former represents a queue with fuzzy exponential arrivals and exponential service rate while the latter represents a queue with exponential arrival rate and fuzzy exponential service rate.
Intrusion Detection System (IDS) is designed to monitor a protected network for the authentication of malicious activities by analysing the network traffic and classifying the records as either normal or abnormal. After identifying a... more
Intrusion Detection System (IDS) is designed to monitor a protected network for the authentication of malicious activities by analysing the network traffic and classifying the records as either normal or abnormal. After identifying a suspicious traffic, IDS generates and logs an alert. There are various approaches being utilized in intrusion detections, but unluckily any of the systems so far is not completely perfect. Most of the alerts generated using this prediction process is false positive. The abundance of false positive alerts makes it difficult for the security analyst to find successful attacks and take remedial action. This paper proposes an intrusion detection system that applies genetic algorithm and fuzzy logic to efficiently detect various types of intrusive activities within a network. The proposed method employs a two phase automatic alert classification system to support the human analyst in identifying the false positives. In the first phase, the alerts collected f...
Kernelized Fuzzy C-Means clustering technique is an attempt to improve the performance of the conventional Fuzzy C-Means clustering technique. Recently this technique where a kernel-induced distance function is used as a similarity... more
Kernelized Fuzzy C-Means clustering technique is an attempt to improve the performance of the conventional Fuzzy C-Means clustering technique. Recently this technique where a kernel-induced distance function is used as a similarity measure instead of a Euclidean distance which is used in the conventional Fuzzy C-Means clustering technique, has earned popularity among research community. Like the conventional Fuzzy C-Means clustering technique this technique also suffers from inconsistency in its performance due to the fact that here also the initial centroids are obtained based on the randomly initialized membership values of the objects. Our present work proposes a new method where we have applied the Subtractive clustering technique of Chiu as a preprocessor to Kernelized Fuzzy CMeans clustering technique. With this new method we have tried not only to remove the inconsistency of Kernelized Fuzzy C-Means clustering technique but also to deal with the situations where the number of...
Clustering techniques are mostly unsupervised methods that can be used to organize data into groups based on similarities among the in- dividual data items. Fuzzy c-means (FCM) clustering is one of well known unsupervised clustering tech-... more
Clustering techniques are mostly unsupervised methods that can be used to organize data into groups based on similarities among the in- dividual data items. Fuzzy c-means (FCM) clustering is one of well known unsupervised clustering tech- niques, which can also be used for unsupervised web document clustering. In this chapter we will intro- duce a modified method of clustering where the data to be clustered will be represented by graphs instead of vectors or other models. Specifically, we will ex- tend the classical FCM clustering algorithm to work with graphs that represent web documents (Phukon, K. K. (2012), Zadeh, L. A. (1965). Dunn, J. C.(1974)). We wish to use graphs because they can allow us to retain information which is often discard- ed in simpler models.
In this article, we intend to revisit the coherence established between possibility and probability from some functions which are density functions and would like to draw attention of the fact that since a possibility distribution of a... more
In this article, we intend to revisit the coherence established between possibility and probability from some functions which are density functions and would like to draw attention of the fact that since a possibility distribution of a normal fuzzy number can be expressed as two distribution functions by using set superimpositions, it seems that the efforts of finding the density functions which are possibility distributions and probability distributions at the same time would have no logical meaning from our standpoints so far. This paper also revisits the variable transformation established in accordance with some existing transformations. The aim of this paper is to contribute towards the development of a formal technique as well as methodological foundations that could deal with the outlined problems. A new procedure is proposed which disagree with all the existing principles. Further, logic behind our claim is put forward in details and it is expected that this would be able to...
In this article, the Four Color Conjecture has been discussed from a standpoint outside the graph theoretic realm. It has first been shown that in a map with four regions, every region connected to every other, at least one of the regions... more
In this article, the Four Color Conjecture has been discussed from a standpoint outside the graph theoretic realm. It has first been shown that in a map with four regions, every region connected to every other, at least one of the regions would be enveloped. With the help of this result, it has been shown that at most three colors are needed to color the boundary regions of a planar map. Finally, it has been proved by induction that four colors are sufficient to color a map, such that no two adjacent regions have the same color. We claim that this is the proper mathematical proof of the four color conjecture, for which the world of mathematics had been waiting for nearly one hundred and sixty years.
Imprecise vector is a vector containing imprecise elements. An array or a vector $$X=(X_{1}, X_{2},\ldots,X_{n})$$X=(X1,X2,…,Xn) is an imprecise vector if the elements $$X_{i}, i=1,2,\ldots,n,$$Xi,i=1,2,…,n, are imprecise numbers. Two... more
Imprecise vector is a vector containing imprecise elements. An array or a vector $$X=(X_{1}, X_{2},\ldots,X_{n})$$X=(X1,X2,…,Xn) is an imprecise vector if the elements $$X_{i}, i=1,2,\ldots,n,$$Xi,i=1,2,…,n, are imprecise numbers. Two laws of randomness are necessary and sufficient to define a normal law of impreciseness. Based on the method of superimposition of sets, the construction of the membership surface of normal imprecise vector has been developed with reference to probability measure. A normal imprecise vector is a special case of a subnormal imprecise vector in the sense that a subnormal imprecise vector is nothing but a generalized imprecise vector. The method of construction of the membership surface of subnormal imprecise vector with reference to Lebesgue–Stieltjes measure is explained in this paper.
In the recent past Kernelized Fuzzy C-Means clustering technique has earned popularity especially in the machine learning community. This technique has been derived from the conventional Fuzzy C-Means clustering technique of Bezdek by... more
In the recent past Kernelized Fuzzy C-Means clustering technique has earned popularity especially in the machine learning community. This technique has been derived from the conventional Fuzzy C-Means clustering technique of Bezdek by defining the vector norm with the Gaussian Radial Basic Function instead of a Euclidean distance. Subsequently the fuzzy cluster centroids and the partition matrix are defined using this new vector norm. In our present work we have tried to show the effect of random initialization of the membership values on the performances of both these techniques. In addition to this we have tried to show the variation of the performance of Kernelized Fuzzy C-Means clustering technique with different values of the adjustable parameter of its vector norm. Using Partition Coefficient and Clustering Entropy as validity indices we have tried to make a comparison of the performances of these two clustering techniques.
In this article, we are going to study the current COVID-19 spread patterns in India and the United States. We are interested to show how the daily increase in the total number of cases in these two countries is affecting the COVID-19... more
In this article, we are going to study the current COVID-19 spread patterns in India and the United States. We are interested to show how the daily increase in the total number of cases in these two countries is affecting the COVID-19 spread pattern in the World. For the study, we have considered the cumulative total numbers of cases in India, the United States and the World. We have found that the situation in the United States is already on the threshold of a change towards retardation. In the World as a whole also we have observed that a similar conclusion can be made. In India, the situation can be expected to move towards betterment soon, and once that happens the situation in the World as a whole would start improving. We shall demonstrate that as long as the rate of change of the logarithm of the cumulative total number of cases with respect to time in a pandemic continues to reduce, the pattern of growth would continue to remain nearly exponential, and as soon as it is seen ...
Fuzzy equations were solved by using different standard methods. One of the well-known methods is the method of α-cut. The method of superimposition of sets has been used to define arithmetic operations of fuzzy numbers. In this article,... more
Fuzzy equations were solved by using different standard methods. One of the well-known methods is the method of α-cut. The method of superimposition of sets has been used to define arithmetic operations of fuzzy numbers. In this article, it has been shown that the fuzzy equation , where A, X, B are fuzzy numbers can be solved by using the method of superimposition of sets. It has also been shown that the method gives same result as the method of α-cut.
Research Interests:
In this article, based on Zadeh’s extension principle we have apply the parametric programming approach to construct the membership functions of the performance measures when the interarrival time and the service time are fuzzy numbers... more
In this article, based on Zadeh’s extension principle we have apply the parametric programming approach to construct the membership functions of the performance measures when the interarrival time and the service time are fuzzy numbers based on the Baruah’s Randomness- Fuzziness Consistency Principle. The Randomness-Fuzziness Consistency Principle leads to defining a normal law of fuzziness using two different laws of randomness. In this article, two fuzzy queues FM/M/1 and M/FM/1 has been studied and constructed their membership functions of the system characteristics based on the aforesaid principle. The former represents a queue with fuzzy exponential arrivals and exponential service rate while the latter represents a queue with exponential arrival rate and fuzzy exponential service rate.
In this article, a randomness based approach of analyzing sensitivity of a fuzzy variable with reference to independent fuzzy variables based on the randomness-fuzziness consistency principle has been explained. The randomness-fuzziness... more
In this article, a randomness based approach of analyzing sensitivity of a fuzzy variable with reference to independent fuzzy variables based on the randomness-fuzziness consistency principle has been explained. The randomness-fuzziness consistency principle leads to defining a normal law of fuzziness using two different laws of randomness. For the two laws of randomness defined for every normal law of fuzziness, we can therefore have a pair of Correlation Coefficients. This leads to an analysis of sensitivity of the parameter of the Gaussian Plume Model with reference to various fuzzy parameters defining concentration.
In this article, a method has been developed to construct the membership surfaces of row and column vectors of an imprecise matrix. A matrix with imprecise elements would be called an imprecise matrix. Nothing however is available in the... more
In this article, a method has been developed to construct the membership surfaces of row and column vectors of an imprecise matrix. A matrix with imprecise elements would be called an imprecise matrix. Nothing however is available in the literature about the membership surface when an imprecise matrix is defined. In this article, the authors have shown the row and column membership surfaces of imprecise matrix and demonstrated with the help of real life example.
We have studied the current COVID-19 spread situation in Assam, a State of India. We have found that currently the spread pattern is indeed exponential and that it is not going to show a reducing trend soon. As a result, it is not... more
We have studied the current COVID-19 spread situation in Assam, a State of India. We have found that currently the spread pattern is indeed exponential and that it is not going to show a reducing trend soon. As a result, it is not possible yet to forecast about the time of peaking of the epidemic in Assam. It can be said that the COVID-19 situation in this Indian State is very alarming even after five and a half months of the start of the epidemic in the State. It may so happen that in Assam the spread would continue to grow exponentially even after the situation changes in India as a whole.
There are standard computational and statistical techniques of forecasting the spread pattern of a pandemic. In this article, we are going to show how close the forecasts can be if we use a simple numerical approach that can be worked out... more
There are standard computational and statistical techniques of forecasting the spread pattern of a pandemic. In this article, we are going to show how close the forecasts can be if we use a simple numerical approach that can be worked out using just a scientific calculator. Using a few recent data, short term forecasts can be found very easily. In this numerical technique, we need not make any assumptions, unlike in the cases of using computational and statistical methods. Such numerical forecasts would be nearly perfect unless the pandemic suddenly starts retarding during the period of the forecasts naturally or otherwise.

And 60 more