Skip to main content

Showing 101–150 of 223 results for author: Sanyal, S

.
  1. arXiv:1703.06491  [pdf

    cs.SD q-bio.NC

    Gestalt Phenomenon in Music? A Neurocognitive Physics Study with EEG

    Authors: Shankha Sanyal, Archi Banerjee, Souparno Roy, Sourya Sengupta, Sayan Biswas, Sayan Nag, Ranjan Sengupta, Dipak Ghosh

    Abstract: The term gestalt has been widely used in the field of psychology which defined the perception of human mind to group any object not in part but as a unified whole. Music in general is polytonic i.e. a combination of a number of pure tones (frequencies) mixed together in a manner that sounds harmonius. The study of human brain response due to different frequency groups of acoustic signal can give u… ▽ More

    Submitted 19 March, 2017; originally announced March 2017.

    Comments: 14 Pages, 5 Figures, Presented in International Conference on Creativity and Cognition in Art and Design, NIMHANS, Bangalore; 19-21 January, 2017

  2. arXiv:1702.05228  [pdf, other

    cond-mat.mes-hall cond-mat.dis-nn cond-mat.stat-mech quant-ph

    Anomalous transport in the Aubry-André-Harper model in isolated and open systems

    Authors: Archak Purkayastha, Sambuddha Sanyal, Abhishek Dhar, Manas Kulkarni

    Abstract: We study the high temperature transport behavior of the Aubry-André-Harper (AAH) model, both in the isolated thermodynamic limit and in the open system. At the critical point of the AAH model, we find hints of super-diffusive behavior from the scaling of spread of an initially localized wavepacket. On the other hand, when connected to two baths with different chemical potentials at the two ends, w… ▽ More

    Submitted 20 February, 2018; v1 submitted 17 February, 2017; originally announced February 2017.

    Journal ref: Phys. Rev. B 97, 174206 (2018)

  3. arXiv:1612.06330  [pdf, other

    hep-th cond-mat.stat-mech

    Quantum Chaos and Holographic Tensor Models

    Authors: Chethan Krishnan, Sambuddha Sanyal, P. N. Bala Subramanian

    Abstract: A class of tensor models were recently outlined as potentially calculable examples of holography: their perturbative large-$N$ behavior is similar to the Sachdev-Ye-Kitaev (SYK) model, but they are fully quantum mechanical (in the sense that there is no quenched disorder averaging). These facts make them intriguing tentative models for quantum black holes. In this note, we explicitly diagonalize t… ▽ More

    Submitted 3 May, 2017; v1 submitted 19 December, 2016; originally announced December 2016.

    Comments: v3: Corrected footnote 13 and other minor improvements

  4. arXiv:1612.00172  [pdf

    cs.SD nlin.CD

    A Non Linear Approach towards Automated Emotion Analysis in Hindustani Music

    Authors: Shankha Sanyal, Archi Banerjee, Tarit Guhathakurata, Ranjan Sengupta, Dipak Ghosh

    Abstract: In North Indian Classical Music, raga forms the basic structure over which individual improvisations is performed by an artist based on his/her creativity. The Alap is the opening section of a typical Hindustani Music (HM) performance, where the raga is introduced and the paths of its development are revealed using all the notes used in that particular raga and allowed transitions between them wit… ▽ More

    Submitted 1 December, 2016; originally announced December 2016.

    Comments: 6 pages, 8 figures; Presented in International Symposium on Frontiers of Research in Speech and Music (FRSM)2016 held in North Orissa University, 11-12 November 2016

  5. arXiv:1612.00171  [pdf

    cs.SD nlin.CD

    A Non Linear Multifractal Study to Illustrate the Evolution of Tagore Songs Over a Century

    Authors: Shankha Sanyal, Archi Banerjee, Tarit Guhathakurata, Ranjan Sengupta, Dipak Ghosh

    Abstract: The works of Rabindranath Tagore have been sung by various artistes over generations spanning over almost 100 years. there are few songs which were popular in the early years and have been able to retain their popularity over the years while some others have faded away. In this study we look to find cues for the singing style of these songs which have kept them alive for all these years. For this… ▽ More

    Submitted 1 December, 2016; originally announced December 2016.

    Comments: 6 PAGES, 5 FIGURES, Presented in International Symposium on Frontiers of Research in Speech and Music (FRSM)2016 held in North Orissa University, 11-12 November 2016. arXiv admin note: text overlap with arXiv:1601.07709

  6. arXiv:1607.01684  [pdf, ps, other

    cs.CC

    The zero-error randomized query complexity of the pointer function

    Authors: Jaikumar Radhakrishnan, Swagato Sanyal

    Abstract: The pointer function of G{ö}{ö}s, Pitassi and Watson \cite{DBLP:journals/eccc/GoosP015a} and its variants have recently been used to prove separation results among various measures of complexity such as deterministic, randomized and quantum query complexities, exact and approximate polynomial degrees, etc. In particular, the widest possible (quadratic) separations between deterministic and zero-er… ▽ More

    Submitted 6 July, 2016; originally announced July 2016.

  7. arXiv:1606.08711  [pdf, other

    hep-th hep-lat hep-ph

    Glueball Spectra from a Matrix Model of Pure Yang-Mills Theory

    Authors: Nirmalendu Acharyya, A. P. Balachandran, Mahul Pandey, Sambuddha Sanyal, Sachindeo Vaidya

    Abstract: We present variational estimates for the low-lying energies of a simple matrix model that approximates $SU(3)$ Yang-Mills theory on a three-sphere of radius $R$. By fixing the ground state energy, we obtain the (integrated) renormalization group (RG) equation for the Yang-Mills coupling $g$ as a function of $R$. This RG equation allows to estimate the masses of other glueball states, which we find… ▽ More

    Submitted 20 May, 2017; v1 submitted 28 June, 2016; originally announced June 2016.

    Comments: Significantly many more variational wavefunctions considered; RG arguments for estimating asymptotic mass values; Conclusions are unchanged but supporting arguments are conceptually more robust

    Journal ref: International Journal of Modern Physics A Vol. 33, No. 13 (2018) 1850073

  8. arXiv:1604.02250  [pdf

    cs.SD

    Variation of singing styles within a particular Gharana of Hindustani classical music A nonlinear multifractal study

    Authors: Archi Banerjee, Shankha Sanyal, Ranjan Sengupta, Dipak Ghosh

    Abstract: Hindustani classical music is entirely based on the "Raga" structures. In Hindustani music, a "Gharana" or school refers to the adherence of a group of musicians to a particular musical style. Gharanas have their basis in the traditional mode of musical training and education. Every Gharana has its own distinct features; though within a particular Gharana, significant differences in singing styles… ▽ More

    Submitted 26 May, 2021; v1 submitted 8 April, 2016; originally announced April 2016.

    Comments: 11 pages, 8 figures

    Journal ref: The Journal of Acoustical Society of India (ISSN: 0973-3302) : Vol. 48, No. 1-2, 2021 (pp. 35-45)

  9. arXiv:1604.02243  [pdf

    cs.SD

    Ragas in Bollywood music A microscopic view through multrifractal cross-correlation method

    Authors: Shankha Sanyal, Archi Banerjee, Souparno Roy, Sayan Nag, Ranjan Sengupta, Dipak Ghosh

    Abstract: Since the start of Indian cinema, a number of films have been made where a particular song is based on a certain raga. These songs have been taking a major role in spreading the essence of classical music to the common people, who have no formal exposure to classical music. In this paper, we look to explore what are the particular features of a certain raga which make it understandable to common p… ▽ More

    Submitted 26 May, 2021; v1 submitted 8 April, 2016; originally announced April 2016.

    Comments: 7 pages, 5 figures

    Journal ref: The Journal of Acoustical Society of India (ISSN: 0973-3302) Vol. 48, No. 1-2, 2021 (pp. 91-97)

  10. arXiv:1603.02852  [pdf, ps, other

    hep-ph

    Primordial Magnetic Field Via Weibel Instability In The Quark Gluon Plasma Phase

    Authors: Abhishek Atreya, Soma Sanyal

    Abstract: The origin of the observed large scale magnetic fields in the Universe is a mystery. The seed of these magnetic fields has been attributed to physical process in the early universe. In this work we provide a mechanism for the generation of a primordial magnetic field in the early universe via the Weibel instability in the quark gluon plasma. The Weibel instability occurs in the plasma if there is… ▽ More

    Submitted 9 September, 2016; v1 submitted 9 March, 2016; originally announced March 2016.

    Comments: Updated version. 23 pages, no figures. A new section added highlighting the role of Chromo-Weibel instability. Last line of abstract restructured, minor changes in Introduction and Discussion section

  11. arXiv:1602.09085  [pdf, other

    cond-mat.str-el cond-mat.mes-hall

    Vacancy-induced low-energy states in undoped graphene

    Authors: Sambuddha Sanyal, Kedar Damle, Olexei I. Motrunich

    Abstract: We demonstrate that a nonzero concentration $n_v$ of static, randomly-placed vacancies in graphene leads to a density $w$ of zero-energy quasiparticle states at the band-center $ε=0$ within a tight-binding description with nearest-neighbour hop** $t$ on the honeycomb lattice. We show that $w$ remains generically nonzero in the compensated case (exactly equal number of vacancies on the two sublat… ▽ More

    Submitted 10 June, 2016; v1 submitted 29 February, 2016; originally announced February 2016.

    Comments: revised in response to referee reports

    Journal ref: Phys. Rev. Lett. 117, 116806 (2016) - Published 9 September 2016

  12. arXiv:1601.07709  [pdf

    cs.SD nlin.CD physics.data-an

    Categorization of Stringed Instruments with Multifractal Detrended Fluctuation Analysis

    Authors: Archi Banerjee, Shankha Sanyal, Tarit Guhathakurata, Ranjan Sengupta, Dipak Ghosh

    Abstract: Categorization is crucial for content description in archiving of music signals. On many occasions, human brain fails to classify the instruments properly just by listening to their sounds which is evident from the human response data collected during our experiment. Some previous attempts to categorize several musical instruments using various linear analysis methods required a number of paramete… ▽ More

    Submitted 28 January, 2016; originally announced January 2016.

    Comments: 6 pages, 1 figures; Presented in Frontiers of Research in Speech and Music, held at IIT Kharagpur, 23-24 November 2015

  13. arXiv:1601.02489  [pdf

    cs.SD

    Categorization of Tablas by Wavelet Analysis

    Authors: Anirban Patranabis, Kaushik Banerjee, Vishal Midya, Shankha Sanyal, Archi Banerjee, Ranjan Sengupta, Dipak Ghosh

    Abstract: Tabla, a percussion instrument, mainly used to accompany vocalists, instrumentalists and dancers in every style of music from classical to light in India, mainly used for kee** rhythm. This percussion instrument consists of two drums played by two hands, structurally different and produces different harmonic sounds. Earlier work has done labeling tabla strokes from real time performances by test… ▽ More

    Submitted 3 January, 2016; originally announced January 2016.

    Comments: 12 pages

  14. arXiv:1510.04880  [pdf

    cs.SD physics.class-ph

    Harmonic and Timbre Analysis of Tabla Strokes

    Authors: Anirban Patranabis, Kaushik Banerjee, Vishal Midya, Sneha Chakraborty, Shankha Sanyal, Archi Banerjee, Ranjan Sengupta, Dipak Ghosh

    Abstract: Indian twin drums mainly bayan and dayan (tabla) are the most important percussion instruments in India popularly used for kee** rhythm. It is a twin percussion/drum instrument of which the right hand drum is called dayan and the left hand drum is called bayan. Tabla strokes are commonly called as `bol', constitutes a series of syllables. In this study we have studied the timbre characteristics… ▽ More

    Submitted 15 October, 2015; originally announced October 2015.

    Comments: 14 pages

  15. arXiv:1506.06399  [pdf, ps, other

    cs.CC

    Towards Better Separation between Deterministic and Randomized Query Complexity

    Authors: Sagnik Mukhopadhyay, Swagato Sanyal

    Abstract: We show that there exists a Boolean function $F$ which observes the following separations among deterministic query complexity $(D(F))$, randomized zero error query complexity $(R_0(F))$ and randomized one-sided error query complexity $(R_1(F))$: $R_1(F) = \widetilde{O}(\sqrt{D(F)})$ and $R_0(F)=\widetilde{O}(D(F))^{3/4}$. This refutes the conjecture made by Saks and Wigderson that for any Boolean… ▽ More

    Submitted 24 June, 2015; v1 submitted 21 June, 2015; originally announced June 2015.

    Comments: Reference added

  16. arXiv:1505.00172  [pdf

    cs.CR

    Technical Analysis of Security Infrastructure in RFID Technology

    Authors: Tuhin Borgohain, Sugata Sanyal

    Abstract: The paper is a technical analysis of the security infrastructure in the field of RFID technology. The paper briefly discusses the architecture of the RFID technology. Then it analyses the various features and advantages RFID technology has over the existing technologies like bar codes. This is followed by a discussion of the various disadvantages and security drawbacks of RFID technology that prev… ▽ More

    Submitted 1 May, 2015; originally announced May 2015.

  17. Comparative Analysis of Cryptography Library in IoT

    Authors: Uday Kumar, Tuhin Borgohain, Sugata Sanyal

    Abstract: The paper aims to do a survey along with a comparative analysis of the various cryptography libraries that are applicable in the field of Internet of Things (IoT). The first half of the paper briefly introduces the various cryptography libraries available in the field of cryptography along with a list of all the algorithms contained within the libraries. The second half of the paper deals with cry… ▽ More

    Submitted 16 April, 2015; originally announced April 2015.

    Comments: 5 pages, 14 tables

  18. arXiv:1504.02517  [pdf

    cs.OS

    Survey of Operating Systems for the IoT Environment

    Authors: Tuhin Borgohain, Uday Kumar, Sugata Sanyal

    Abstract: This paper is a comprehensive survey of the various operating systems available for the Internet of Things environment. At first the paper introduces the various aspects of the operating systems designed for the IoT environment where resource constraint poses a huge problem for the operation of the general OS designed for the various computing devices. The latter part of the paper describes the va… ▽ More

    Submitted 13 April, 2015; v1 submitted 9 April, 2015; originally announced April 2015.

    Comments: 5 pages, 7 tables

  19. arXiv:1503.05992  [pdf

    cs.CR

    Application Security framework for Mobile App Development in Enterprise setup

    Authors: Subhamoy Chakraborti, D. P. Acharjya, Sugata Sanyal

    Abstract: Enterprise Mobility has been increasing the reach over the years. Initially Mobile devices were adopted as consumer devices. However, the enterprises world over have rightly taken the leap and started using the ubiquitous technology for managing its employees as well as to reach out to the customers. While the Mobile ecosystem has been evolving over the years, the increased exposure of mobility in… ▽ More

    Submitted 20 March, 2015; originally announced March 2015.

    Comments: 7 pages

  20. arXiv:1503.00369  [pdf

    cs.CY

    Heuristic Algorithm using Internet of Things and Mobility for solving demographic issues in Financial Inclusion projects

    Authors: Subhamoy Chakraborti, Sugata Sanyal

    Abstract: All over the world, the population in rural and semi-urban areas is a major concern for policy makers as they require technology enablement most to get elevated from their living conditions. Financial Inclusion projects are meant to work in this area as well. However the reach of financial institutions in those areas is much lesser than in urban areas in general. New policies and strategies are be… ▽ More

    Submitted 1 March, 2015; originally announced March 2015.

    Comments: 5 pages, 1 figure

  21. arXiv:1502.00870  [pdf

    cs.CR

    Authentication Systems in Internet of Things

    Authors: Tuhin Borgohain, Amardeep Borgohain, Uday Kumar, Sugata Sanyal

    Abstract: This paper analyses the various authentication systems implemented for enhanced security and private re-position of an individual's log-in credentials. The first part of the paper describes the multi-factor authentication (MFA) systems, which, though not applicable to the field of Internet of Things, provides great security to a user's credentials. MFA is followed by a brief description of the wor… ▽ More

    Submitted 3 February, 2015; originally announced February 2015.

    Comments: 5 pages, 2 figures

  22. arXiv:1502.00724  [pdf

    cs.CR

    Review of Considerations for Mobile Device based Secure Access to Financial Services and Risk Handling Strategy for CIOs, CISOs and CTOs

    Authors: Amal Saha, Sugata Sanyal

    Abstract: The information technology and security stakeholders like CIOs, CISOs and CTOs in financial services organization are often asked to identify the risks with mobile computing channel for financial services that they support. They are also asked to come up with approaches for handling risks, define risk acceptance level and mitigate them. This requires them to articulate strategy for supporting a hu… ▽ More

    Submitted 2 February, 2015; originally announced February 2015.

  23. arXiv:1501.02211  [pdf

    cs.CR

    Survey of Security and Privacy Issues of Internet of Things

    Authors: Tuhin Borgohain, Uday Kumar, Sugata Sanyal

    Abstract: This paper is a general survey of all the security issues existing in the Internet of Things (IoT) along with an analysis of the privacy issues that an end-user may face as a consequence of the spread of IoT. The majority of the survey is focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks ha… ▽ More

    Submitted 9 January, 2015; originally announced January 2015.

    Comments: 7 pages, 3 figures

  24. Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment

    Authors: Tuhin Borgohain, Amardeep Borgohain, Rajdeep Borgohain, Sugata Sanyal

    Abstract: The purpose of this paper is to do a general survey on the existing communication modes inside a smart grid, the existing security loopholes and their countermeasures. Then we suggest a detailed countermeasure, building upon the Jigsaw based secure data transfer [8] for enhanced security of the data flow inside the communication system of a smart grid. The paper has been written without the consid… ▽ More

    Submitted 31 December, 2014; originally announced January 2015.

    Comments: 5 pages, 2 figures

  25. arXiv:1412.2845  [pdf

    cs.CR

    Survey of Strong Authentication Approaches for Mobile Proximity and Remote Wallet Applications - Challenges and Evolution

    Authors: Amal Saha, Sugata Sanyal

    Abstract: Wallet may be described as container application used for configuring, accessing and analysing data from underlying payment application(s). There are two dominant types of digital wallet applications, proximity wallet and remote wallet. In the payment industry, one often hears about authentication approach for proximity or remote wallets or the underlying payment applications separately, but there… ▽ More

    Submitted 8 December, 2014; originally announced December 2014.

  26. arXiv:1412.2463  [pdf

    cs.CR

    Applicability of DUKPT Key Management Scheme to Cloud Wallet and other Mobile Payments

    Authors: Amal Saha, Sugata Sanyal

    Abstract: After discussing the concept of DUKPT based symmetric encryption key management (e.g., for 3DES) and definition of cloud or remote wallet, the paper analyses applicability of DUKPT to different use cases like mobile banking, NFC payment using EMV contactless card and mobile based EMV card emulation, web browser based transaction and cloud or remote wallet. Cloud wallet is an emerging payment met… ▽ More

    Submitted 8 December, 2014; originally announced December 2014.

  27. arXiv:1411.3089  [pdf

    cs.CR cs.NI

    Application Layer Intrusion Detection with Combination of Explicit-Rule- Based and Machine Learning Algorithms and Deployment in Cyber- Defence Program

    Authors: Amal Saha, Sugata Sanyal

    Abstract: There have been numerous works on network intrusion detection and prevention systems, but work on application layer intrusion detection and prevention is rare and not very mature. Intrusion detection and prevention at both network and application layers are important for cyber-security and enterprise system security. Since application layer intrusion is increasing day by day, it is imperative to g… ▽ More

    Submitted 12 November, 2014; originally announced November 2014.

  28. arXiv:1411.2939  [pdf

    cs.CR

    Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop Mobile Payment Systems

    Authors: Amal Saha, Sugata Sanyal

    Abstract: Payment transactions initiated through a mobile device are growing and security concerns must be ad-dressed. People coming from payment card industry often talk passionately about porting ISO 9564 PIN standard based authentication in open-loop card payment to closed-loop mobile financial transactions and certification of closed-loop payment product or solution against this standard. In reality, so… ▽ More

    Submitted 11 November, 2014; originally announced November 2014.

    Comments: 8 pages

  29. arXiv:1407.3500  [pdf, ps, other

    cs.CC

    Sub-linear Upper Bounds on Fourier dimension of Boolean Functions in terms of Fourier sparsity

    Authors: Swagato Sanyal

    Abstract: We prove that the Fourier dimension of any Boolean function with Fourier sparsity $s$ is at most $O\left(s^{2/3}\right)$. Our proof method yields an improved bound of $\widetilde{O}(\sqrt{s})$ assuming a conjecture of Tsang~\etal~\cite{tsang}, that for every Boolean function of sparsity $s$ there is an affine subspace of $\mathbb{F}_2^n$ of co-dimension $O(\poly\log s)$ restricted to which the fun… ▽ More

    Submitted 13 July, 2014; originally announced July 2014.

  30. arXiv:1406.2146  [pdf

    cs.CR

    Digital Watermarking Techniques in Spatial and Frequency Domain

    Authors: Tanmoy Sarkar, Sugata Sanyal

    Abstract: Digital watermarking is the act of hiding information in multimedia data, for the purposes of content protection or authentication. In ordinary digital watermarking, the secret information is embedded into the multimedia data (cover data) with minimum distortion of the cover data. Due to these watermarking techniques the watermark image is almost negligible visible. In this paper we will discuss a… ▽ More

    Submitted 13 October, 2014; v1 submitted 9 June, 2014; originally announced June 2014.

    Comments: 5 pages, 5 figures

  31. arXiv:1405.5119  [pdf

    cs.MM cs.CR

    Steganalysis: Detecting LSB Steganographic Techniques

    Authors: Tanmoy Sarkar, Sugata Sanyal

    Abstract: Steganalysis means analysis of stego images. Like cryptanalysis, steganalysis is used to detect messages often encrypted using secret key from stego images produced by steganography techniques. Recently lots of new and improved steganography techniques are developed and proposed by researchers which require robust steganalysis techniques to detect the stego images having minimum false alarm rate.… ▽ More

    Submitted 20 May, 2014; originally announced May 2014.

    Comments: 5 pages, 1 figure

  32. arXiv:1405.2684  [pdf

    cs.CR

    Reversible and Irreversible Data Hiding Technique

    Authors: Tanmoy Sarkar, Sugata Sanyal

    Abstract: Steganography (literally meaning covered writing) is the art and science of embedding secret message into seemingly harmless message. Stenography is practice from olden days where in ancient Greece people used wooden blocks to inscribe secret data and cover the date with wax and write normal message on it. Today stenography is used in various field like multimedia, networks, medical, military etc.… ▽ More

    Submitted 20 May, 2014; v1 submitted 12 May, 2014; originally announced May 2014.

    Comments: 4 pages, 3 figures

  33. arXiv:1401.4721  [pdf

    cs.NI cs.ET

    Energy Harvesting in M2M and WSN Space

    Authors: Sugata Sanyal

    Abstract: Energy harvesting or power harvesting or energy scavenging is a process where energy is derived from external sources (e.g. solar power, thermal energy, wind energy, salinity gradients, kinetic energy etc.), captured, and stored for small, wireless autonomous devices, like those used in wearable electronics and wireless sensor networks. This paper is focused to applications of Energy Harvesting in… ▽ More

    Submitted 19 January, 2014; originally announced January 2014.

    Comments: 3 pages

  34. arXiv:1312.2237  [pdf

    cs.SI physics.soc-ph

    Clustering online social network communities using genetic algorithms

    Authors: Mustafa H. Hajeer, Alka Singh, Dipankar Dasgupta, Sugata Sanyal

    Abstract: To analyze the activities in an Online Social network (OSN), we introduce the concept of "Node of Attraction" (NoA) which represents the most active node in a network community. This NoA is identified as the origin/initiator of a post/communication which attracted other nodes and formed a cluster at any point in time. In this research, a genetic algorithm (GA) is used as a data mining method where… ▽ More

    Submitted 8 December, 2013; originally announced December 2013.

    Comments: 7 pages, 9 figures, 2 tables

  35. arXiv:1312.2175   

    cs.NI

    Ant Colony based Routing for Mobile Ad-Hoc Networks towards Improved Quality of Services

    Authors: Bibhas Roy, Suman Banik, Parthi Dey, Sugata Sanyal, Nabendu Chaki

    Abstract: Mobile Ad Hoc Network (MANET) is a dynamic multihop wireless network which is established by a set of mobile nodes on a shared wireless channel. One of the major issues in MANET is routing due to the mobility of the nodes. Routing means the act of moving information across an internet work from a source to a destination. When it comes to MANET, the complexity increases due to various characteristi… ▽ More

    Submitted 10 December, 2013; v1 submitted 7 December, 2013; originally announced December 2013.

    Comments: This paper has been withdrawn by the author due to a crucial sign error in equation 1

  36. arXiv:1312.1629  [pdf

    cs.CR

    Detection and prevention of botnets and malware in an enterprise network

    Authors: Manoj Rameshchandra Thakur, Divye Raj Khilnani, Kushagra Gupta, Sandeep Jain, Vineet Agarwal, Suneeta Sane, Sugata Sanyal, Prabhakar S Dhekne

    Abstract: One of the most significant threats faced by enterprise networks today is from Bots. A Bot is a program that operates as an agent for a user and runs automated tasks over the internet, at a much higher rate than would be possible for a human alone. A collection of Bots in a network, used for malicious purposes is referred to as a Botnet. Bot attacks can range from localized attacks like key-loggin… ▽ More

    Submitted 5 December, 2013; originally announced December 2013.

    Comments: 12 pages, 7 figures

  37. arXiv:1312.0883  [pdf

    cs.NI

    Impact of Mobile Transmitter Sources on Radio Frequency Wireless Energy Harvesting

    Authors: Antonio Hernandez Coarasa, Prusayon Nintanavongsa, Sugata Sanyal, Kaushik R. Chowdhury

    Abstract: Wireless energy harvesting sensor networks constitute a new paradigm, where the motes deployed in the field are no longer constrained by the limited battery resource, but are able to re-charge themselves through directed electromagnetic energy transfer. The energy sources, which we call actors, are mobile and move along pre-decided patterns while radiating an appropriate level of energy, sufficien… ▽ More

    Submitted 3 December, 2013; originally announced December 2013.

    Comments: 5 pages, 9 figures

  38. arXiv:1311.6047  [pdf, ps, other

    math.AC

    Irrational behavior of algebraic discrete valuations

    Authors: Soumya D. Sanyal

    Abstract: We study algebraic discrete valuations dominating normal local domains of dimension two. We construct a family of examples to show that the Hilbert-Samuel function of the associated graded ring of the valuation can fail to be asymptotically of the form: quasi-polynomial plus a bounded function. We also show that the associated multiplicity can be irrational, or even transcendental.

    Submitted 10 June, 2014; v1 submitted 23 November, 2013; originally announced November 2013.

    MSC Class: 13D40; 13H15

  39. Baryon inhomogeneities in a charged quark gluon plasma

    Authors: Avijeet Ray, Soma Sanyal

    Abstract: We study the generation of baryon inhomogeneities in regions of the quark gluon plasma which have a charge imbalance. We find that the overdensity in the baryon lumps for positively charged particles is different from the overdensity due to the negatively charged particles. Since quarks are charged particles, the probability of forming neutrons or protons in the lumps would thus be changed. The pr… ▽ More

    Submitted 5 September, 2013; originally announced September 2013.

    Comments: 13 pages, 2 figures, Accepted for publication in Physics Letters B

    Journal ref: Physics Letters B 726 (2013) 83

  40. arXiv:1308.0824  [pdf

    cs.CR

    Secure Authentication of Cloud Data Mining API

    Authors: Rohit Bhadauria, Rajdeep Borgohain, Abirlal Biswas, Sugata Sanyal

    Abstract: Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. This has made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multi-fold benefits to the users moving to a cloud, while posing unknown security and privacy issues. User authentication is one such growing concern and is greatly needed in order to ensure priv… ▽ More

    Submitted 4 August, 2013; originally announced August 2013.

    Comments: 7 pages, 2 figures

  41. arXiv:1307.7833  [pdf

    cs.CR cs.NI

    RISM -- Reputation Based Intrusion Detection System for Mobile Ad hoc Networks

    Authors: Animesh Kr Trivedi, Rishi Kapoor, Rajan Arora, Sudip Sanyal, Sugata Sanyal

    Abstract: This paper proposes a combination of an Intrusion Detection System with a routing protocol to strengthen the defense of a Mobile Ad hoc Network. Our system is Socially Inspired, since we use the new paradigm of Reputation inherited from human behavior. The proposed IDS also has a unique characteristic of being Semi-distributed, since it neither distributes its Observation results globally nor keep… ▽ More

    Submitted 30 July, 2013; originally announced July 2013.

    Comments: 4 pages, 3 figures, 1 table. arXiv admin note: substantial text overlap with arXiv:1006.1956; and with arXiv:1005.4023 by other authors

    Journal ref: 3rd International Conference on Computers and Devices for Communication (CODEC-06) Institute of Radio Physics and Electronics, University of Calcutta, December 18-20, 2006, pp. 234-237

  42. arXiv:1306.0896  [pdf

    cs.NE cs.ET

    Finding Numerical Solutions of Diophantine Equations using Ant Colony Optimization

    Authors: Siby Abraham, Sugata Sanyal, Mukund Sanglikar

    Abstract: The paper attempts to find numerical solutions of Diophantine equations, a challenging problem as there are no general methods to find solutions of such equations. It uses the metaphor of foraging habits of real ants. The ant colony optimization based procedure starts with randomly assigned locations to a fixed number of artificial ants. Depending upon the quality of these positions, ants deposit… ▽ More

    Submitted 4 June, 2013; originally announced June 2013.

    Comments: 14 pages, 8 figures

  43. arXiv:1304.7728  [pdf

    cs.CL cs.CY

    Machine Translation Systems in India

    Authors: Sugata Sanyal, Rajdeep Borgohain

    Abstract: Machine Translation is the translation of one natural language into another using automated and computerized means. For a multilingual country like India, with the huge amount of information exchanged between various regions and in different languages in digitized format, it has become necessary to find an automated process from one language to another. In this paper, we take a look at the various… ▽ More

    Submitted 29 April, 2013; originally announced April 2013.

    Comments: 5 pages, 5 figures, 1 table

  44. arXiv:1303.1417  [pdf

    cs.CR

    Inter-Cloud Data Security Strategies

    Authors: Sugata Sanyal, Parthasarathy P. Iyer

    Abstract: Cloud computing is a complex infrastructure of software, hardware, processing, and storage that is available as a service. Cloud computing offers immediate access to large numbers of the world's most sophisticated supercomputers and their corresponding processing power, interconnected at various locations around the world, proffering speed in the tens of trillions of computations per second. Infor… ▽ More

    Submitted 6 March, 2013; originally announced March 2013.

    Comments: 5 pages, 1 Table. arXiv admin note: text overlap with arXiv:0907.2485, arXiv:0903.0694 by other authors without attribution

  45. arXiv:1303.1048  [pdf

    cs.CR

    Cloud Computing -- An Approach with Modern Cryptography

    Authors: Sugata Sanyal, Parthasarathy P. Iyer

    Abstract: In this paper we are proposing an algorithm which uses AES technique of 128/192/256 bit cipher key in encryption and decryption of data. AES provides high security as compared to other encryption techniques along with RSA. Cloud computing provides the customer with the requested services. It refers to applications and services that run on distributed network using virtualized resources and accesse… ▽ More

    Submitted 5 March, 2013; originally announced March 2013.

    Comments: 4 pages, 1 figure

  46. arXiv:1301.0315  [pdf

    cs.CR

    Increasing Security in Cloud Environment

    Authors: Priyanka Naik, Sugata Sanyal

    Abstract: The concept of cloud computing was introduced to meet the increase in demand for new application for a project, and to provide a large storage facility whenever or wherever a user needs it. The cloud system facility helped many industries as well as individual users to get authentic software at a very low cost. But with this new system comes the major concern of security, as the connection to the… ▽ More

    Submitted 2 January, 2013; originally announced January 2013.

    Comments: 8 pages, 1 table

  47. arXiv:1212.6059  [pdf

    cs.CR

    Prover and Verifier Based Password Protection: PVBPP

    Authors: Priyanka Naik, Sugata Sanyal

    Abstract: In today's world password are mostly used for authentication. This makes them prone to various kinds of attacks like dictionary attacks. A dictionary attack is a method of breaking the password by systematically entering every word in a dictionary as a password. This attack leads to an overload on the server leading to denial of service attack. This paper presents a protocol to reduce the rate of… ▽ More

    Submitted 25 December, 2012; originally announced December 2012.

    Comments: 8 pages, 1 figure, 1 table

  48. arXiv:1212.1914  [pdf

    cs.CR

    A Heuristic Reputation Based System to Detect Spam activities in a Social Networking Platform, HRSSSNP

    Authors: Manoj Rameshchandra Thakur, Sugata Sanyal

    Abstract: The introduction of the social networking platform has drastically affected the way individuals interact. Even though most of the effects have been positive, there exist some serious threats associated with the interactions on a social networking website. A considerable proportion of the crimes that occur are initiated through a social networking platform [5]. Almost 33% of the crimes on the inter… ▽ More

    Submitted 9 December, 2012; originally announced December 2012.

    Comments: 5 Pages, 1 Figure

  49. arXiv:1207.2617  [pdf

    cs.CR

    A Review of Techniques to Mitigate Sybil Attacks

    Authors: Nitish Balachandran, Sugata Sanyal

    Abstract: Any decentralised distributed network is particularly vulnerable to the Sybil attack wherein a malicious node masquerades as several different nodes, called Sybil nodes, simultaneously in an attempt to disrupt the proper functioning of the network. Such attacks may cause damage on a fairly large scale especially since they are difficult to detect and there has been no universally accepted scheme t… ▽ More

    Submitted 11 July, 2012; originally announced July 2012.

    Comments: 6 pages, 1 table

  50. Load Balancing with Reduced Unnecessary Handoff in Energy Efficient Macro/Femto-cell based BWA Networks

    Authors: Prasun Chowdhury, Anindita Kundu, Iti Saha Misra, Salil K Sanyal

    Abstract: The hierarchical macro/femto cell based BWA networks are observed to be quite promising for mobile operators as it improves their network coverage and capacity at the outskirt of the macro cell. However, this new technology introduces increased number of macro/femto handoff and wastage of electrical energy which in turn may affect the system performance. Users moving with high velocity or undergoi… ▽ More

    Submitted 11 July, 2012; originally announced July 2012.

    Comments: 14 pages

    Journal ref: International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 3, June 2012