Ripon Patgiri

Ripon Patgiri
National Institute of Technology, Silchar | NIT Silchar · Department of Computer Science and Engineering

Doctor of Philosophy

About

111
Publications
71,954
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
584
Citations
Introduction
Additional affiliations
April 2013 - March 2020
National Institute of Technology Silchar
Position
  • Professor (Assistant)

Publications

Publications (111)
Conference Paper
Full-text available
Size of the data used in today's enterprises has been growing at exponential rates from last few years. Simultaneously, the need to process and analyze the large volumes of data has also increased. To handle and for analysis of large datasets, an open-source implementation of Apache framework, Hadoop is used now-a-days. For managing and storing of...
Article
Full-text available
In this Exa Byte scale era, the data increases at an exponential rate. This is in turn generating a massive amount of metadata in the file system. Hadoop is the most widely used framework to deal with Big Data. But due to this growth of huge amount of metadata, the efficiency of Hadoop is questioned numerous time by many researchers. Therefore, it...
Conference Paper
Full-text available
Size of the data used in today's enterprises has been expanding at a huge range from last few years. Simultaneously, the need to process and analyze the large volumes of data has also increased. Hadoop Distributed File System (HDFS), is an open source implementation of Apache, designed for running on commodity hardware to handle applications having...
Conference Paper
Full-text available
Big Data, the buzz around the globe in recent days is used for large-scale data which have huge volume, variety and with some genuinely difficult complex structure. The last few years of internet technology as well as computer world has seen a lot of growth and popularity in the field of cloud computing. As a consequence, these cloud applications a...
Chapter
Full-text available
Size of the data used in todays enterprises has been growing at exponential rates from last few years. Simultaneously, the need to process and analyze the large volumes of data has also increased. To handle and for analysis of large scale datasets, an open-source implementation of Apache framework, Hadoop is used now-a-days. For managing and storin...
Preprint
Intrusion detection is an essential process to identify malicious incidents and continuously alert the many users of the Internet of Things (IoT). The constant monitoring of events generated from more than millions of devices connected to the IoT and the extensive analysis of every event based on predefined security policies consumes enormous resou...
Article
The advent of internet has been a boon to society. It has helped in information retrieval and is a great help in communication. Nowadays, communication comprises digital information in images, videos, GIFs, and many other formats. Amongst the digital data, images are one of the most transmitted data. Therefore, the security of image data has gained...
Article
Full-text available
The 6G communication network will be a sixth-sense next-generation communication network, which will increase the worthiness of the intelligent Internet of Things. With the advent of various fields of artificial intelligence, 6G will create enormous possibilities, that is, Augmentation of Human Intelligence, Internet of Everything, Quality of Exper...
Patent
Full-text available
The present invention generally relates to a public-key encryption system based on ECC for audio encryption comprises a conversion unit for converting audio file into integers, wherein the integers are organized into a number of groups according to a fixed group size, wherein the groups are again converted into a number of larger integers using bas...
Conference Paper
Memory (RAM) sizes are increasing day by day with cheaper costs due to emerging technologies, and it will continue to increase with a more affordable price. Therefore, in-memory database (IMDB) system exists as suitable choice for databases due to the high demands for the high-speed distributed database system. Moreover, with growing demand for rea...
Conference Paper
Recent developments suggest RSA suffers from integer factorization issues because it depends on two prime numbers. In this paper, we analyze the issues of integer factorization and suggest possible future solutions for RSA for conventional computers. Recent developments in Quantum Computing make integer factorization easier than ever. Therefore, RS...
Conference Paper
Cloud computing is an excellent alternative to desk computing. Cloud computing technology has a massive number of users as they provide a range of scalability, trustworthiness, and high performance with comparatively low cost. As cloud computing is growing day by day, the energy use in the cloud is also increasing. There is also a need for energy u...
Chapter
Today's digital era is facing an enormous obstacle called Big data. Every digital device is producing a huge volume of data. The exponential increment of the number of digital devices is leading to an exponential increment of generated data. One of the domains of Big data is Big graph, for instance, DNA structure. Currently, Bioinformatics is focus...
Chapter
Large-scale computing graphs hold a high capacity to manage the flow of big data circulated throughout the complex systems of the virtual world. Hence, big-graphs are becoming among the most prevalent research areas of hi-tech industries. Consequently, this chapter focuses on reviewing the recent works on the dominant issues and challenges of big-g...
Chapter
In the last few decades, the influence of the internet on human civilization is worth remembering. Today, starting from an individual to a big organization, everyone is dependent on the internet. The rise in numbers of computers, sensor devices, IoT devices, and the expansion of the network has made the internet and internet users prone to cyber-at...
Patent
Full-text available
A device for generating one-way secure hash algorithm (OSHA), wherein the device comprises of: an input module (102) for acquiring at least two inputs in form of a message and a value, wherein the message includes a secret key and the value includes a seed value; a number generator (104) associated with the input value for generating a pseudo rando...
Chapter
Deep learning has brought a lot of changes in the digital era. Big data and deep learning models have broad research scope for future researchers since data is represented in different forms like audio, video, image, text and graph, etc. Out of which, handling Graph data is the cumbersome approach, as the hidden patterns are in plenty. Capturing hi...
Chapter
Today, cyber crime has done much to harm individuals, organizations and public authorities. Cyber crime detection and classification methods have succeeded in protecting and preventing data against these attacks by varying degrees. Many rules and procedures to combat cyber crimes were put in place and offenders were subjected to severe sanctions. H...
Chapter
The sparse nature of BigGraphs makes tasks like Graph Classification, Node Classification, and Link Prediction very challenging. Furthermore, homogeneous or heterogeneous characteristics of data in BigGraph make it challenging to do real-time operations. This paper examines some approaches for the mentioned tasks on BigGraph that outperform the pre...
Patent
Full-text available
The present disclosure relates to a method and system for generating a truly random number for conventional computing devices. The present disclosure proposed a new method for the generator of truly random number, wherein the algorithm is called "Ran do". The proposed algorithm used Clock CPU for bit generation and murmur and xx Hash string has fu...
Conference Paper
Designing and developing a true random number generator is a grand challenge for all time. It is highly necessitated in cryptography and various domains, such as simulation and other scientific applications. Therefore, various random number generators are emerging. Many true random number algorithms have already been proposed, which are very comple...
Patent
Full-text available
The present invention generally relates to a system and method for storing user's data securely in a cloud storage. The system comprisesan identity management module associated with the cloud storage for maintaining identity of a user using an Elliptic-curve Diffie Hellman (ECDH) key exchange protocol, wherein symmetric cryptography is obtained usi...
Preprint
Full-text available
Machine unlearning for security is studied in this context. Several spam email detection methods exist, each of which employs a different algorithm to detect undesired spam emails. But these models are vulnerable to attacks. Many attackers exploit the model by polluting the data, which are trained to the model in various ways. So to act deftly in s...
Book
Bloom Filter: A Data Structure for Computer Networking, Big Data, Cloud Computing, Internet of Things, Bioinformatics, and Beyond focuses on both the theory and practice of the most emerging areas for Bloom filter application, including Big Data, Cloud Computing, Internet of Things, and Bioinformatics. Sections provide in-depth insights on structur...
Preprint
Full-text available
Big Graph is a graph having thousands of vertices and hundreds of thousands of edges. The study of graphs is crucial because the interlinkage among the vertices provides various insights and uncovers the hidden truth developed due to their relationship. The graph processing has non-linear time complexity. The overwhelming number of vertices and edg...
Book
This book presents new and innovative current discoveries in social networking which contribute enough knowledge to the research community. The book includes chapters presenting research advances in social network analysis and issues emerged with diverse social media data. The book also presents applications of the theoretical algorithms and networ...
Preprint
Full-text available
In the last decade or so, we have witnessed deep learning reinvigorating the machine learning field. It has solved many problems in the domains of computer vision, speech recognition, natural language processing, and various other tasks with state-of-the-art performance. The data is generally represented in the Euclidean space in these domains. Var...
Patent
Full-text available
The present disclosure relates to a method to construct a HEX-BLOOM model to verify authenticity and integrity with privacy-preserving computing for diverse applications. The method comprises: constructing a Bloom Filter wherein, the Bloom Filter requires an insertion operation with a non-cryptographic string hash functions wherein the non cryptog...
Preprint
Full-text available
Edge technology aims to bring Cloud resources (specifically, the compute, storage, and network) to the closed proximity of the Edge devices, i.e., smart devices where the data are produced and consumed. Embedding computing and application in Edge devices lead to emerging of two new concepts in Edge technology, namely, Edge computing and Edge analyt...
Preprint
Full-text available
Bloom Filter is a probabilistic data structure for the membership query, and it has been intensely experimented in various fields to reduce memory consumption and enhance a system's performance. Bloom Filter is classified into two key categories: counting Bloom Filter (CBF), and non-counting Bloom Filter. CBF has a higher false positive probability...
Preprint
Full-text available
Bloom Filter is an important probabilistic data structure to reduce memory consumption for membership filters. It is applied in diverse domains such as Computer Networking, Network Security and Privacy, IoT, Edge Computing, Cloud Computing, Big Data, and Biometrics. But Bloom Filter has an issue of the false positive probability. To address this is...
Article
Today is the era of smart devices. Through smart devices, people remain connected with each other across the globe. But, it led the current Internet towards scalability issues. Therefore, leaving IP-based Internet behind, the world is moving to the Future Internet Architecture, called Named Data Networking (NDN). Currently, the number of nodes conn...
Preprint
Full-text available
Secure hash functions are widely used cryptographic algorithms to secure diverse attacks. A one-way secure hash function is used in the various cryptographic area, for instance, password protection. However, most of the hash functions provide security based on static parameters and publicly known operations. Therefore, it becomes easier to attack b...
Preprint
Full-text available
Symmetric key cryptography is applied in almost all secure communications to protect all sensitive information from attackers, for instance, banking, and thus, it requires extra attention due to diverse applications. Moreover, it is vulnerable to various attacks, for example, cryptanalysis attacks. Cryptanalysis attacks are possible due to a single...
Preprint
Full-text available
RSA cryptography is an asymmetric communication protocol, and it is facing diverse issues. Recent research works suggest that RSA security has already broken. On the contrary, AES is the most used symmetric-key cryptography protocol, and it is also facing issues. Literature search suggests that there is an issue of cryptanalysis attacks. A shared s...
Preprint
Full-text available
Symmetric-key cryptography is used widely due to its capability to provide a strong defense against diverse attacks; however, it is prone to cryptanalysis attacks. Therefore, we propose a novel and highly secure symmetric-key cryptography, symKrypt for short, to defend against diverse attacks and provide absolute security. Our proposed algorithm ch...
Conference Paper
Key-value data structure is well-known data structure which is used, ranging from the small applications to the extremely large systems. A plenty of key-value data structures are available. Moreover, implementation of bidirectional keyvalues are also available. The key-value data structure is easy to implement. These data structures are one-to-one...
Preprint
Full-text available
Malicious URL detection is an emerging research area due to continuous modernization of various systems, for instance, Edge Computing. In this article, we present a novel malicious URL detection technique, called deepBF (deep learning and Bloom Filter). deepBF is presented in two-fold. Firstly, we propose a learned Bloom Filter using 2-dimensional...
Chapter
Full-text available
Data generation and consumption is growing at an radical pace and will continue to grow as we step into the next decade. Efficient data storage and retrieval methods are in dire need. Moreover, the generated data is generally complex and multi categorical. Thus, Bloom Filter is an excellent choice for this scenario. Bloom Filter is a probabilistic...
Chapter
These days, Malware has become a significant andMuppalaneni, Babu developing warning to safety, identification of malware has become tough. Numerous experiments were conducted on intelligent malware identification by using Machine Learning and Data Mining techniques. However, greatPatgiri, Ripon outcomes have been produced with these practices, mos...
Chapter
6G is a promising communication technology that will dominate the entire health market from 2030 onward. It will dominate not only health sector but also diverse sectors. It is expected that 6G will revolutionize many sectors including healthcare. Healthcare will be fully AI-driven and dependent on 6G communication technology, which will change our...
Book
This book presents innovative research works to demonstrate the potential and the advancements of computing approaches to utilize healthcare centric and medical datasets in solving complex healthcare problems. Computing technique is one of the key technologies that are being currently used to perform medical diagnostics in the healthcare domain, th...
Book
This book includes selected peer-reviewed papers presented at the International Conference on Modeling, Simulation and Optimization, organized by National Institute of Technology, Silchar, Assam, India, during 3–5 August 2020. The book covers topics of modeling, simulation and optimization, including computational modeling and simulation, system mo...
Book
This book covers selected high-quality research papers presented at the International Conference on Big Data, Machine Learning, and Applications (BigDML 2019). It focuses on both theory and applications in the broad areas of big data and machine learning. It brings together the academia, researchers, developers and practitioners from scientific org...
Article
Full-text available
In 2030, we are going to evidence the 6G mobile communication technology, which will enable the Internet of Everything. Yet 5G has to be experienced by people worldwide and B5G has to be developed; the researchers have already started planning, visioning, and gathering requirements of the 6G. Moreover, many countries have already initiated the rese...
Article
Full-text available
Emergency service is the most important research field for welfare of human kind. Some examples are ambulances and fire control truck. However, these conventional emergency services are not equipped with appropriate equipment to provide high QoS. For instance, conventional medical emergency services include ambulances with drivers and oxygen suppli...
Chapter
The Big Data, a massive amount of data, is the most popular buzzword and popular paradigm to change a game of any data-intensive field. The engagement of Big Data technology provides a new direction to an organization and the Big Data gives a vision to biomedical data engineering. Numerous data-intensive fields engage Big Data technology to achieve...
Article
A Bloom filter is a probabilistic data structure for approximate membership filtering. It is applied in diverse Network systems to enhance a system’s performance and reduce the memory consumption, for instance, Named-Data Networking, Software-Defined Networks, and Wireless Sensor Networking. Bloom filters consumes a tiny amount of RAM space to stor...
Preprint
Full-text available
The world has been evolving with new technologies and advances day-by-day. With the advent of various learning technologies in every field, the research community is able to provide solution in every aspect of life with the applications of Artificial Intelligence, Machine Learning, Deep Learning, Computer Vision, etc. However, with such high achiev...
Preprint
Full-text available
6G communication technology is a revolutionary technology that will revolutionize many technologies and applications. Furthermore, it will be truly AI-driven and will carry on intelligent space. Hence, it will enable Internet of Everything (IoE) which will also impact many technologies and applications. 6G communication technology promises high Qua...
Preprint
Full-text available
6G is a promising communication technology that will dominate the entire health market from 2030 onward. It will dominate not only health sector but also diverse sectors. It is expected that 6G will revolutionize many sectors including healthcare. Healthcare will be fully AI-driven and dependent on 6G communication technology, which will change our...
Preprint
Full-text available
Big Data is defined as high volume of variety of data with an exponential data growth rate. Data are amalgamated to generate revenue, which results a large data silo. Data are the oils of modern IT industries. Therefore, the data are growing at an exponential pace. The access mechanism of these data silos are defined by metadata. The metadata are d...
Article
Full-text available
This paper presents the overview of the current trends of Big data against the computing scenario from different aspects. Some of the important aspect includes the Exascale, the computing power and the kind of applications which offer the Big data. This starts with the current computing hardware constraint against the need of the rising Big data ap...
Preprint
Full-text available
This paper presents the overview of the current trends of Big data against the computing scenario from different aspects. Some of the important aspect includes the Exascale, the computing power and the kind of applications which offer the Big data. This starts with the current computing hardware constraint against the need of the rising Big data ap...
Preprint
Full-text available
In 2030, we are going to evidence the 6G mobile communication technology, which will enable the Internet of Everything. Yet 5G has to be experienced by people and B5G has to be developed; the researchers have already started planning, visioning, and gathering requirements of the 6G. 6G promises to take everyone to a different era of technology. It...
Preprint
Full-text available
Today is the era of smart devices. Through the smart devices, people remain connected with systems across the globe even in mobile state. Hence, the current Internet is facing scalability issue. Therefore, leaving IP based Internet behind due to scalability, the world is moving to the Future Internet Architecture, called Named Data Networking (NDN)...
Preprint
Full-text available
The Big Data analytics are a logical analysis of very large scale datasets. The data analysis enhances an organization and improve the decision making process. In this article, we present Airline Delay Analysis and Prediction to analyze airline datasets with the combination of weather dataset. In this research work, we consider various attributes t...
Chapter
The Cancer research is the utmost important research field nowadays for the well being of human being. Every year, thousands of people die in Cancer. Therefore, there is a high demand for Cancer research. The Cancer research requires both computing and medical knowledge. The Computer Scientists are engaged in Big Cancer Computing for storing, proce...
Chapter
IP address lookup is a crucial part of router in Computer Network. There are millions of IP addresses to be searched per second. Hence, it is immensely necessitated to enhance the performance of the IP address lookup. Therefore, this paper presents a novel approach of IP address lookup using 3D Bloom Filter, called ipBF. ipBF inherits the propertie...
Chapter
The replication system attracts many researchers to rethink of Patgiri, Ripon tactics of data Nayak, Sabuzima in the various devices, namely RAM and HDD/SSD. Dev, Dipayan advantages of a replication system are (a) parallelism, (b) data availability, (c) fault tolerance, (d) data recovery, and (e) failover. However, the replication system poses some...
Book
This book constitutes refereed proceedings of the First International First International Conference on Big Data, Machine Learning, and Applications, BigDML 2019, held in Silchar, India, in December. The 6 full papers and 3 short papers were carefully reviewed and selected from 152 submissions. The papers present research on such topics as computi...
Chapter
Full-text available
Blockchains play a vital role in FARMAR to track and trace the origin of food products in food supply chain. Supply Chain Management (SCM) is an essential business process in all spheres of the economy. SCM uses specific processes to connect from producer to consumer requirement through a chain. In a BCT(Blockchain Technology) based system, “record...
Article
Bloom Filter is a data structure for membership query which is deployed in diverse research domains to boost up system’s performance and to lower on-chip memory consumption. However, there are still lacking of a high accuracy Bloom Filterwithoutcompromisingtheperformanceandmemoryspace. Moreover, the scalability causes more memory consumption as wel...
Conference Paper
Bloom Filter is a data structure for member-ship filter that deployed in diverse domains. Bloom Filter isable to reduce on-chip memory consumption on an order ofmagnitude. Therefore, Bloom Filter has been deployed in BigData, Networking, Bioinformatics, Cloud Computing and IoT.However, there is a critical issue in Bloom Filter, called falsepositive...
Conference Paper
A Bloom Filter (BF) is a probabilistic data structure for approximate membership filtering. Besides, the Bloom Filter is applied in diverse Network systems to enhance a system's performance and reduce the memory consumption, for instance, Named-Data Networking, Software-Defined Networks, and Wireless Sensor Networking. Bloom Filter consumes a tiny...
Chapter
Network motifs are the building blocks of complex networks. Studying these frequently occurring patterns disclose a lot of information about these networks. The applications of Network motifs are very much evident now-a-days, in almost every field including biological networks, World Wide Web (WWW), etc. Some of the important motifs are feed forwar...
Article
The advancement of DNA Assembly techniques have greatly boosted up the Bioinformatics research and discovery. More precisely, DNA Assembly has achieved tremendous popularity due to the ability to decode the hidden information in the DNA. DNA Assembly is the process of finding the correct sequence of the nucleotide bases in DNA. The key challenges a...
Chapter
With the growth of the inter-connectivity of the world, Big Graph has become a popular emerging technology. For instance, social media (Facebook, Twitter). Prominent examples of Big Graph include social networks, biological network, graph mining, big knowledge graph, big web graphs and scholarly citation networks. A Big Graph consists of millions o...
Preprint
Cancer analysis and prediction is the utmost important research field for well-being of humankind. The Cancer data are analyzed and predicted using machine learning algorithms. Most of the researcher claims the accuracy of the predicted results within 99%. However, we show that machine learning algorithms can easily predict with an accuracy of 100%...
Preprint
Full-text available
Bloom Filter is a probabilistic membership data structure and it is excessively used data structure for membership query. Bloom Filter becomes the predominant data structure in approximate membership filtering. Bloom Filter extremely enhances the query response time, and the response time is very fast. Bloom filter (BF) is used to detect whether an...
Article
Full-text available
Bloom Filter is extensively deployed data structure in various applications and research domain since its inception. Bloom Filter is able to reduce the space consumption in an order of magnitude. Thus, Bloom Filter is used to keep information of a very large scale data. There are numerous variants of Bloom Filters available, however, scalability is...
Article
Bloom Filter is a data structure for membership filtering that is deployed in various domains to boost up the lookup performance and to lower the memory consumption. Bloom Filter has gained a massive popularity nowadays, and thus, it is deployed in diverse domains, namely, Big Data, Cloud Computing, Networking and Security, Bioinformatics, and IoT....