Sunil Karforma

Sunil Karforma
University of Burdwan | B.U. · Department of Computer Science

About

91
Publications
74,833
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
365
Citations

Publications

Publications (91)
Article
Election provides an important opportunity to advance democratization and encourage political liberalization. Free and fair election is the foundation of every healthy democracy. But to have confidence, voters need to be assured that their elections are truly free, fair and secure. Now it is very essential to introduce recent technologies to conduc...
Article
The rapid advancement of Internet technology has led to an extensive increase in the popularity of online learning, also known as online learning. Despite the numerous advantages of online learning, some instructors and students still encounter significant limitations and challenges. One of the biggest threats to an e-learning system is resource se...
Article
Full-text available
In these crucial times of COVID-19, cryptographic and nature inspired innovations help to communicate confidential data in the wireless telemedicine. The novel corona virus had entirely shattered all segments of life in the entire world. In the medical sciences, patients are more advised to take telemedicine supports. Cardiac patients are very much...
Article
Full-text available
Supply chain management (SCM), an essential part of E-Commerce, is required to plan, control, and procurement raw materials, manufacturing, and distribution of the right product(s) to the end user at the right time with more economical way. In this regard, information or data security is a must in supply chain management between participants to inc...
Article
In mobile applications or the case of vehicles, the concept of Location-based Encryption is instrumental in increasing data security. Location-based encryption is one type of security algorithm where decryption or data access is bound to specified locations and times. This algorithm only provides an additional layer of security to the existing one....
Chapter
This book chapter contains the basics of generative AI, evaluation of generative AI, working process of generative AI, and applications of generative AI in Education 2030. In this chapter, the authors will introduce the emerging concept of large language model (LLM), reinforcement learning, response generation, neural network, and tokenization as t...
Article
Full-text available
Pseudorandom numbers have several uses in cryptography, including digital signatures, one-time passwords, hashing, and encryption techniques. The randomness of pseudo random number generators improves significantly when dynamical systems such as chaos maps are used. The two-dimensional ikeda map is an excellent option for exhibiting this random beh...
Chapter
When data travels through an insecure medium, security must be enforced. The confidentiality of the exchanged data must be guaranteed with the help of encryption techniques. Selective encryption is a very powerful tool for encrypting textual data in a resource constrained environment. In the context of e-governance, textual data is very important a...
Article
Full-text available
Transmission and storage of the medical images generated from various healthcare applications through the internet must be secured for the correct identification of diseases and successful treatment of them. The medical images of the patient’s data must be protected in transmission and storage phase from different types of security attacks. Therefo...
Article
Full-text available
In this exceptional COVID-19 crisis, telemedicine had arisen as a substitute technique for medicines. Even more unequivocally, pediatric children were at high risk to outside homes. The spread of COVID-19 has suddenly ascended. Because of lockdown conventions and isolation protocols, kids were confined to live inside their homes. Non-emergency youn...
Article
Full-text available
Methods of image encryption based on chaos maps are very useful and effective to provide information security. Based on mixed chaos maps, a novel image encoding method has been introduced. A novel procedure for PRN (known as Pseudo Random Number) generation taking the mixed chaotic Henon-Logistic-Tent map has been introduced, where the two dimensio...
Article
Full-text available
Cloud computing is defined as the distribution of computing including hardware and software to the consumer through the Internet. In the era of ICT, cloud computing has been influenced by many industries including technology, business, management, logistics and numerous other industry. But some new kinds of risks and vulnerabilities exist in cloud...
Article
Full-text available
Now-a-days the information security is the prime factor in wireless communication. One of the major and fruitful security techniques in cryptography is data encryption with keys. The efficiency of the encryption depends on the resistance ability of the encryption key and the encryption algorithm. Threshold cryptography is one type of cryptographic...
Article
Full-text available
Patients’ data security is an open challenge on any telemedicine system. The challenge has been extended enough in this unprecedented corona virus led pandemic. COVID-19 has brought abrupt adaptations in medical sciences. To reduce corona virus transmission, quarantine yourself and opting for online services is mostly apt even during “New Normal” s...
Article
Full-text available
Constraints imposed due to the cameo of the novel corona virus has abruptly changed the operative mode of medical sciences. Most of the hospitals have migrated towards the telemedicine mode of services for the non-invasive and non-emergency patients during the COVID-19 time. The advent of telemedicine services has remotely rendered health services...
Article
The volume of E-commerce transactions had accelerated on huge scale due to COVID-19. Telemedicine comes under the segment of E-commerce, where the patients can get their treatments from isolates. Patients’ information security is a basic challenge in this COVID-19 telemedicine segment. The majority of the non-obtrusive and non-emergency patients ar...
Article
In this COVID-19 crucial stage, cryptographic developments help to convey secret information inside the digital telemedicine frameworks. The novel corona virus had broken all configurations of our life. In the clinical medical sciences, patients are encouraged to select the remote based telemedicine services. Cardiac patients are especially defense...
Chapter
Cloud computing is defined as the distribution of computing which include hardware and software program to the patron through the Internet. In the technology of ICT, cloud computing has encouraged via many industries which includes technology, enterprise, management, logistics, and numerous other enterprises. But some new kind of risks and vulnerab...
Article
Full-text available
Application of different water identification indices and their modified form with a threshold is a common practice in surface water identification from multispectral images. Implementation of the statistical features of water present in such images to improve the accuracy of existing approaches is a novel application. A dynamic threshold selection...
Article
Full-text available
The revolutionary and retrospective changes in the use of ICT have propelled the introduction of telecare health services in the crucial corona virus pandemic times. There have been revolutionary changes that happened with the advent of this novel corona virus. The proposed technique is based on secured glycemic information sharing between the serv...
Article
Full-text available
Current pandemic has immensely disrupted the entire world in the field of medical science. The novel corona virus has not only brought physical sufferings but also huge psychiatric complications on the patients. Treating the psychiatric issues from remote locations can be best done through telepsychiatry. Patients can virtually consult with psychia...
Chapter
In the healthcare industry privacy and security of patient’s information is the most crucial issue at present. Considering current legal regulations, every healthcare organization should impose a prominent security technique to maintain a secure electronic health records system. On the other hand the realization of Internet of Things is the most no...
Article
Full-text available
The outbreak of novel corona virus had led the entire world to make severe changes. A secured healthcare data transmission has been proposed through Telecare Medical Information System (TMIS) based on metaheuristic salp swarm. Patients need proper medical remote treatments in this Post-COVID-19 time from their quarantines. Secured transmission of m...
Article
A second wave of COVID-19 has immensely affected the entire community. In the face of COVID-19 second wave scenario, geriatric patients with allied morbidities are most vulnerable under the COVID-19 threats. They suffer a lot from different mental complications. In this manuscript, secured telepsychiatry for geriatric patients (TGP) services are be...
Article
Cancer is one of the highly-rated causes that lead to human mortality. Nowadays with the greater affect of the COVID-19 pandemic, co-morbid patients are at the dual risk of death. Therefore, the main aim of this paper is the specific detection of the cancer cells using nanoparticles further, report analysis using Artificial intelligence, and then t...
Article
Consumer’s behaviour is often studied because certain decisions are significantly affected by their behaviour or expected actions. For this reason consumer behaviour is said to be applied discipline.In a general sense, the most important reason for studying consumer behaviour is the significant role it plays in our lives. Much of our time is spent...
Chapter
In this generation of advanced Internet of Things-based e-health systems, medical data communication is a significant component of concern. Dementia, anxiety, schizophrenia, depression, major depressive disorder, etc. are the most common mental complications. In this chapter, a chaotic symmetric key of 128 bits has been generated by the key distrib...
Article
In India, the Management Aptitude Test (MAT) score is taken as the primary indicator of a student’s ability to be enrolled in the management courses. It has been observed in many cases during the group discussion and personal interview phases for MBA course admission, that candidate with poor MAT scores do well than those with higher scores. Hence,...
Article
Full-text available
In an e-learning environment, security plays an important role while transmitting information in form of image or text through an open access network like Internet. In a lowbandwidth channel, it becomes difficult to download large image files and also the checking for authentication becomes cumbersome. In our proposed methodology, the sender can su...
Article
Full-text available
Universities offering e-learning courses often provide their students with a hard copy of the marksheet. When that same student wants to apply for a job through the online application portal of a company, he/she must scan the marksheet and upload the scanned copy. This is a nuisance because there can be many such marksheets and not everyone has acc...
Article
Full-text available
Over the wide expansion of internet and e-Governance, many services of government are nowadays provided online. In any online services, confidentiality, authentication and non-repudiation are of foremost priority in setting up any e-Governance framework. Strong cryptographic security protocols and framework must be deployed for large scale e-Govern...
Article
Full-text available
In an e-Learning environment, the communication between sender and receiver has been done via Internet. In general, while the sender sends their important documents to receiver through Internet, he/she encrypts the document which is decrypted by the receiver(s) at their end. In case of large images, decryption causes some sort of distortion, which...
Chapter
Mobile Ad hoc Network (MANET) is mostly a decentralized, dynamic configured approach. With the changing of time instances, the topological change in the position of MANET nodes is one of the massive challenges for transmitting data packets. As the MANET nodes move, the distances between these nodes change. Due to changing distances, observation of...
Article
Full-text available
The main objective of Distance Education (DE) is to spread quality education regardless of time and space. This objective is easily achieved with the help of technology. With the development of World Wide Web and high-speed internet the quality of DE is improved because now Digital Content (DC) can be easily and in no time distributed to many learn...
Article
Full-text available
Clustering is the technique of finding useful patterns in a dataset by effectively grouping similar data items. It is an intense research area with many algorithms currently available, but practically most algorithms do not deal very efficiently with noise. Most real-world data are prone to containing noise due to many factors, and most algorithms,...
Article
Full-text available
Mobile Ad-hoc Network (MANET) is mostly decentralized and self-adjustable network system. It is significant to optimize the overall network energy utilization and improve packet sending performance by reducing the errors, generated due to different real-life environmental effects. In this paper, considering atmospheric, environmental change and var...
Article
Full-text available
In this paper, a two-stage neural network consisting of a feed-forward neural network and a Kohonen self-organizing map, has been used to predict secondary structure. We have applied our methods to determine the structure of 245 proteins containing neurotoxins, cytotoxins, cardiotoxins and three-finger toxins, derived from venoms of Elapid snakes....
Article
Full-text available
E-learning is an application of information and communication technology in the field of learning. Through steganography the e-learning institution can provide security to other participants of e-learning like teacher and learner. Here we use text steganography with modified SNOW algorithm while passing secret texts from the administrator to the le...
Article
Full-text available
With the increasing availability of Internet, the e-learning is also getting popularity at a high speed. But for a secure and efficient e-learning system security is a great matter of concern. Some of the important documents transmit between the participants of e-learning are text files like the user id of the learner or the teacher, password, priv...
Article
Full-text available
Objectives: We present an algorithm to quickly identify conserved patterns from a set of aligned protein sequences. Method: Using contribution statistics, the proposed method identifies a motif describing the given set of sequences, and it is flexible enough to identify variable-length wildcard regions and also identifying motif elements based on...
Article
Full-text available
In the present day scenario, security plays a vital role in e-learning system. In an e-learning system, all kinds of transmissions and communications between the participants of any e-learning system are done via Internet. Since, Internet is publicly accessible; authenticity has a major role to play. Steganography is one of such techniques through...
Article
Full-text available
This paper introduces a simple and fast lossless compression algorithm, called CAD, for the compression of protein sequences. The proposed algorithm is specially suited for compressing proteomes, which are the collection of all proteins expressed by an organism. Maintaining a changing dictionary of actively used amino-acid residues, the algorithm u...
Conference Paper
Full-text available
Clustering is the process of grouping together objects based on some notion of similarity. One such basis for grouping is the concept of density - wherein clusters or groups are formed where several objects exist or in other words, are densely packed. In this short paper, we propose a simple and fast density-based clustering method called DENGRID,...
Article
Full-text available
Snake toxins are a group of peptides found in snake venoms, which have some form of adverse physiological effects on humans and/or animals. Primarily these consist of neurotoxins, cytotoxins and cardiotoxins, which directly affect the nervous system, skin and muscle tissues, and the heart muscle tissues respectively. In this short paper, we show ho...
Article
Full-text available
In this paper we propose a very fast randomized heuristic algorithm for multiple sequence alignment (MSA) that is memory efficient and is capable of aligning 8000 sequences of average length 500 under 1 minute on a PC. From the MSA, a fast algorithm for the construction of a phylogenetic tree is also presented, using the concepts of aligned blocks...
Article
With the increasing popularity of e-learning, the organizations, those are providing the facility of e-learning, facing too many challenges regarding the security. In case of e-learning, the main area, where the security is so much needed, is the transmission of any online documents like marks sheets, study materials, registration numbers, admit ca...
Conference Paper
Full-text available
In this paper, we propose an algorithm that automatically generates a consensus motif identifying a protein family given an alignment of a set of protein sequences. The algorithm also assigns probabilistic scores to each amino-acid choice at each position in the sequence that will better aid in matching the motif against a protein database. Using a...
Conference Paper
Full-text available
Sequence alignment is one of the most important tools available to molecular biologists in order to find similarities between two or more DNA or protein sequences. However, despite several advances in this field, multiple sequence alignment (MSA) is often a slow process, and still, optimum results cannot be guaranteed. MSA is an important prerequis...
Article
Full-text available
In this paper, we have proposed a new data hiding approach using Pixel Value Difference (PVD) seganography for digital image. PVD steganography, proposed by Wu and Tsai, use non-overlapping block of two pixels to find the edge areas to hide secret message by adjusting the pixel pairs. In PVD method only the edge between two pixels within a block is...
Article
E-learning system involves an open participation of student, teacher, and administrator among different regions in the world. Due to the use of Internet as electronic communication media, there are several types of risks and threats such as alternation or deletion of student's marks given by a teacher may hamper the E-learning environment in differ...
Article
Full-text available
Protein similarity searches are a routine job for molecular biologists where a query sequence of amino acids needs to be compared and ranked against an ever-growing database of proteins. All available algorithms in this field can be grouped into two categories – either solving the problem using sequence alignment through dynamic programming, or, em...
Article
E-Commerce recommender systems are vulnerable to different types of profile-injection attacks where a number of fake user profiles are inserted into the system to influence the recommendations made to the users. In this paper, we have used two proximity-based outlier detection strategies in identifying fake user profiles inserted into the recommend...
Chapter
While providing several benefits of e-Learning, different organizers and the technology group are facing several challenges like configuration, security issues and standard framework etc. Researchers are also discussing many ways regarding security implementation issues or secured framework for e-Learning system. Considering Object Oriented Approac...
Article
Full-text available
The Digital Signature Algorithm (DSA) has become the de facto standard for authentication of transacting entities since its inception as a standard by NIST. An integral part of the signing process in DSA is the generation of a random number called a nonce or an ephemeral key. If sufficient caution is not taken while generating the nonce, it can lea...
Article
Full-text available
The development of communication technology have motivated the Citizen and the Government to communicate through electronic medium. For successful communication, a multifaceted electronic instrument must act as an interface between the participants, which will uniquely identify the Citizen. A brief literature review of several relevant research wor...
Article
In the current climate of global economic decline, the developing countries are facing severe challenges in maintaining an efficient administration within an affordable budget. If this economic slowdown continues, there will be serious difficulties which will hamper the socio-economic development of the entire region. To respond to the situation, t...
Article
Full-text available
E-Commerce recommender systems are vulnerable to different types of profile-injection attacks where a number of fake user profiles are inserted into the system to influence the recommendations made to the users. In this paper, we have proposed three strategies of detecting such attacks with the help of outlier analysis. In all these strategies, the...
Data
E-Governance is the electronic mechanism used for deployment of administration by the state-owned agencies under its jurisdiction using Information and Communication Technology (ICT). The security of this entire mechanism is very much susceptible to the attempts of the hackers made initially to breach the system and escalate its privileges in the s...
Data
Full-text available
In comparison to the conventional form of administration, nowadays the E-Governance have become the smart way of deployment of administration by the authority under its jurisdiction. Since this technique requires the transmission of sensitive information between the Government and the Citizen through the Internet, information scientists take pain t...
Article
Full-text available
In the recent years, with the huge popularity of Web based Social Networks, the trust and trust related issues become more and more important. Many trust metrics have been designed in literature for calculating propagated trust in social networks. They are either of type global or local. Global trust metrics build a global rank or trust value for t...
Article
Full-text available
We know that large amount of data and information should be transmitted through internet during transactions in E-Governance. Smart E-Governance system should deliver speedy, space efficient, cost effective and secure services among other governments and its citizens utilizing benefits of Information and Communication Technologies (ICT). This paper...
Conference Paper
Full-text available
The successful implementation of E-Governance depends on the secured transmission of information between the Citizen and the Government. Intruders are generating smart ways to listen the information un-authentically, whereas the information scientists have to find even smarter ways for neutralizing these attempts. Citizens being the digital identit...
Article
Full-text available
Nowadays different state and central government in India as well as abroad are taking initiative to deliver different kind of services electronically specially using Information and Communication Technology (ICT). Intruders or hackers can steal or modify the information communicated between Government and consumer through internet. To implement pri...
Article
Full-text available
One of the most effective applications of Information and Communication Technology (ICT) is the emergence of E-Learning. Considering the importance and need of E-Learning, recent years have seen a drastic change of learning methodologies in Higher Education. Undoubtedly, the three main entities of E-Learning system can be considered as Student, Tea...
Article
Full-text available
The success rate of various electronic mechanisms such as E-Governance, E-Learning, E-Shopping, E-Voting, etc. is absolutely dependent on the security, authenticity and the integrity of the information that is being transmitted between the users of sending end and the users of receiving end. To attain all these parameters, these sensitive informati...
Article
Full-text available
E-commerce gained popularity as a sophisticated transaction system for buying and selling of products and services efficiently through Internet. Due to lack of privacy and security, customers are unwilling to participate in E-commerce transaction system. To combat such inefficiency in transaction of E-commerce and to regain the customers trust an a...
Article
Full-text available
In the current era of science and advance technologies, Electronic-Governance (
Article
Full-text available
Nowadays different states and central governments throughout the world are making efforts in implementing smart government services among its consumers. It becomes more critical for developing countries like India having wide spread geographical presence and limited infrastructures. During transactions in e-Governance there exists a possibility of...
Article
Full-text available
To provide ownership of media and to protect it from unwanted changes, encryption & control access techniques were used in earlier days. But, with the advancement of digital communication and easy availability of cheap recording and storing devices, the security of digital in formation is under threat. Any one can easily obtain, replicate and distr...