-
Gestalt Phenomenon in Music? A Neurocognitive Physics Study with EEG
Authors:
Shankha Sanyal,
Archi Banerjee,
Souparno Roy,
Sourya Sengupta,
Sayan Biswas,
Sayan Nag,
Ranjan Sengupta,
Dipak Ghosh
Abstract:
The term gestalt has been widely used in the field of psychology which defined the perception of human mind to group any object not in part but as a unified whole. Music in general is polytonic i.e. a combination of a number of pure tones (frequencies) mixed together in a manner that sounds harmonius. The study of human brain response due to different frequency groups of acoustic signal can give u…
▽ More
The term gestalt has been widely used in the field of psychology which defined the perception of human mind to group any object not in part but as a unified whole. Music in general is polytonic i.e. a combination of a number of pure tones (frequencies) mixed together in a manner that sounds harmonius. The study of human brain response due to different frequency groups of acoustic signal can give us an excellent insight regarding the neural and functional architecture of brain functions. In this work we have tried to analyze the effect of different frequency bands of music on the various frequency rhythms of human brain obtained from EEG data of 5 participants. Four (4) widely popular Rabindrasangeet clips were subjected to Wavelet Transform method for extracting five resonant frequency bands from the original music signal. These resonant frequency bands were presented to the subjects as auditory stimulus and EEG signals recorded simultaneously in 19 different locations of the brain. The recorded EEG signals were noise cleaned and subjected to Multifractal Detrended Fluctuation Analysis (MFDFA) technique on the alpha, theta and gamma frequency range. Thus, we obtained the complexity values (in the form of multifractal spectral width) in alpha, theta and gamma EEG rhythms corresponding to different frequency bands of music. We obtain frequency specific arousal based response in different lobes of brain as well as in specific EEG bands corresponding to musical stimuli. This revelation can be of immense importance when it comes to the field of cognitive music therapy.
△ Less
Submitted 19 March, 2017;
originally announced March 2017.
-
Anomalous transport in the Aubry-André-Harper model in isolated and open systems
Authors:
Archak Purkayastha,
Sambuddha Sanyal,
Abhishek Dhar,
Manas Kulkarni
Abstract:
We study the high temperature transport behavior of the Aubry-André-Harper (AAH) model, both in the isolated thermodynamic limit and in the open system. At the critical point of the AAH model, we find hints of super-diffusive behavior from the scaling of spread of an initially localized wavepacket. On the other hand, when connected to two baths with different chemical potentials at the two ends, w…
▽ More
We study the high temperature transport behavior of the Aubry-André-Harper (AAH) model, both in the isolated thermodynamic limit and in the open system. At the critical point of the AAH model, we find hints of super-diffusive behavior from the scaling of spread of an initially localized wavepacket. On the other hand, when connected to two baths with different chemical potentials at the two ends, we find that the critical point shows clear sub-diffusive scaling of current with system size. We provide an explanation of this by showing that the current scaling with system-size is entirely governed by the behavior of the single particle eigenfunctions at the boundary sites where baths are attached. We also look at the particle density profile in non-equilibrium steady state of the open system when the two baths are at different chemical potentials. We find that the particle density profile has distinctly different behavior in the delocalized, critical and localized phases of the AAH model.
△ Less
Submitted 20 February, 2018; v1 submitted 17 February, 2017;
originally announced February 2017.
-
Quantum Chaos and Holographic Tensor Models
Authors:
Chethan Krishnan,
Sambuddha Sanyal,
P. N. Bala Subramanian
Abstract:
A class of tensor models were recently outlined as potentially calculable examples of holography: their perturbative large-$N$ behavior is similar to the Sachdev-Ye-Kitaev (SYK) model, but they are fully quantum mechanical (in the sense that there is no quenched disorder averaging). These facts make them intriguing tentative models for quantum black holes. In this note, we explicitly diagonalize t…
▽ More
A class of tensor models were recently outlined as potentially calculable examples of holography: their perturbative large-$N$ behavior is similar to the Sachdev-Ye-Kitaev (SYK) model, but they are fully quantum mechanical (in the sense that there is no quenched disorder averaging). These facts make them intriguing tentative models for quantum black holes. In this note, we explicitly diagonalize the simplest non-trivial Gurau-Witten tensor model and study its spectral and late-time properties. We find parallels to (a single sample of) SYK where some of these features were recently attributed to random matrix behavior and quantum chaos. In particular, after a running time average, the spectral form factor exhibits striking qualitative similarities to SYK. But we also observe that even though the spectrum has a unique ground state, it has a huge (quasi-?)degeneracy of intermediate energy states, not seen in SYK. If one ignores the delta function due to the degeneracies however, there is level repulsion in the unfolded spacing distribution hinting chaos. Furthermore, the spectrum has gaps and is not (linearly) rigid. The system also has a spectral mirror symmetry which we trace back to the presence of a unitary operator with which the Hamiltonian anticommutes. We use it to argue that to the extent that the model exhibits random matrix behavior, it is controlled not by the Dyson ensembles, but by the BDI (chiral orthogonal) class in the Altland-Zirnbauer classification.
△ Less
Submitted 3 May, 2017; v1 submitted 19 December, 2016;
originally announced December 2016.
-
A Non Linear Approach towards Automated Emotion Analysis in Hindustani Music
Authors:
Shankha Sanyal,
Archi Banerjee,
Tarit Guhathakurata,
Ranjan Sengupta,
Dipak Ghosh
Abstract:
In North Indian Classical Music, raga forms the basic structure over which individual improvisations is performed by an artist based on his/her creativity. The Alap is the opening section of a typical Hindustani Music (HM) performance, where the raga is introduced and the paths of its development are revealed using all the notes used in that particular raga and allowed transitions between them wit…
▽ More
In North Indian Classical Music, raga forms the basic structure over which individual improvisations is performed by an artist based on his/her creativity. The Alap is the opening section of a typical Hindustani Music (HM) performance, where the raga is introduced and the paths of its development are revealed using all the notes used in that particular raga and allowed transitions between them with proper distribution over time. In India, corresponding to each raga, several emotional flavors are listed, namely erotic love, pathetic, devotional, comic, horrific, repugnant, heroic, fantastic, furious, peaceful. The detection of emotional cues from Hindustani Classical music is a demanding task due to the inherent ambiguity present in the different ragas, which makes it difficult to identify any particular emotion from a certain raga. In this study we took the help of a high resolution mathematical microscope (MFDFA or Multifractal Detrended Fluctuation Analysis) to procure information about the inherent complexities and time series fluctuations that constitute an acoustic signal. With the help of this technique, 3 min alap portion of six conventional ragas of Hindustani classical music namely, Darbari Kanada, Yaman, Mian ki Malhar, Durga, Jay Jayanti and Hamswadhani played in three different musical instruments were analyzed. The results are discussed in detail.
△ Less
Submitted 1 December, 2016;
originally announced December 2016.
-
A Non Linear Multifractal Study to Illustrate the Evolution of Tagore Songs Over a Century
Authors:
Shankha Sanyal,
Archi Banerjee,
Tarit Guhathakurata,
Ranjan Sengupta,
Dipak Ghosh
Abstract:
The works of Rabindranath Tagore have been sung by various artistes over generations spanning over almost 100 years. there are few songs which were popular in the early years and have been able to retain their popularity over the years while some others have faded away. In this study we look to find cues for the singing style of these songs which have kept them alive for all these years. For this…
▽ More
The works of Rabindranath Tagore have been sung by various artistes over generations spanning over almost 100 years. there are few songs which were popular in the early years and have been able to retain their popularity over the years while some others have faded away. In this study we look to find cues for the singing style of these songs which have kept them alive for all these years. For this we took 3 min clip of four Tagore songs which have been sung by five generation of artistes over 100 years and analyze them with the help of latest nonlinear techniques Multifractal Detrended Fluctuation Analysis (MFDFA). The multifractal spectral width is a manifestation of the inherent complexity of the signal and may prove to be an important parameter to identify the singing style of particular generation of singers and how this style varies over different generations. The results are discussed in detail.
△ Less
Submitted 1 December, 2016;
originally announced December 2016.
-
The zero-error randomized query complexity of the pointer function
Authors:
Jaikumar Radhakrishnan,
Swagato Sanyal
Abstract:
The pointer function of G{ö}{ö}s, Pitassi and Watson \cite{DBLP:journals/eccc/GoosP015a} and its variants have recently been used to prove separation results among various measures of complexity such as deterministic, randomized and quantum query complexities, exact and approximate polynomial degrees, etc. In particular, the widest possible (quadratic) separations between deterministic and zero-er…
▽ More
The pointer function of G{ö}{ö}s, Pitassi and Watson \cite{DBLP:journals/eccc/GoosP015a} and its variants have recently been used to prove separation results among various measures of complexity such as deterministic, randomized and quantum query complexities, exact and approximate polynomial degrees, etc. In particular, the widest possible (quadratic) separations between deterministic and zero-error randomized query complexity, as well as between bounded-error and zero-error randomized query complexity, have been obtained by considering {\em variants}~\cite{DBLP:journals/corr/AmbainisBBL15} of this pointer function.
However, as was pointed out in \cite{DBLP:journals/corr/AmbainisBBL15}, the precise zero-error complexity of the original pointer function was not known. We show a lower bound of $\widetildeΩ(n^{3/4})$ on the zero-error randomized query complexity of the pointer function on $Θ(n \log n)$ bits; since an $\widetilde{O}(n^{3/4})$ upper bound is already known \cite{DBLP:conf/fsttcs/MukhopadhyayS15}, our lower bound is optimal up to a factor of $\polylog\, n$.
△ Less
Submitted 6 July, 2016;
originally announced July 2016.
-
Glueball Spectra from a Matrix Model of Pure Yang-Mills Theory
Authors:
Nirmalendu Acharyya,
A. P. Balachandran,
Mahul Pandey,
Sambuddha Sanyal,
Sachindeo Vaidya
Abstract:
We present variational estimates for the low-lying energies of a simple matrix model that approximates $SU(3)$ Yang-Mills theory on a three-sphere of radius $R$. By fixing the ground state energy, we obtain the (integrated) renormalization group (RG) equation for the Yang-Mills coupling $g$ as a function of $R$. This RG equation allows to estimate the masses of other glueball states, which we find…
▽ More
We present variational estimates for the low-lying energies of a simple matrix model that approximates $SU(3)$ Yang-Mills theory on a three-sphere of radius $R$. By fixing the ground state energy, we obtain the (integrated) renormalization group (RG) equation for the Yang-Mills coupling $g$ as a function of $R$. This RG equation allows to estimate the masses of other glueball states, which we find to be in excellent agreement with lattice simulations.
△ Less
Submitted 20 May, 2017; v1 submitted 28 June, 2016;
originally announced June 2016.
-
Variation of singing styles within a particular Gharana of Hindustani classical music A nonlinear multifractal study
Authors:
Archi Banerjee,
Shankha Sanyal,
Ranjan Sengupta,
Dipak Ghosh
Abstract:
Hindustani classical music is entirely based on the "Raga" structures. In Hindustani music, a "Gharana" or school refers to the adherence of a group of musicians to a particular musical style. Gharanas have their basis in the traditional mode of musical training and education. Every Gharana has its own distinct features; though within a particular Gharana, significant differences in singing styles…
▽ More
Hindustani classical music is entirely based on the "Raga" structures. In Hindustani music, a "Gharana" or school refers to the adherence of a group of musicians to a particular musical style. Gharanas have their basis in the traditional mode of musical training and education. Every Gharana has its own distinct features; though within a particular Gharana, significant differences in singing styles are observed between generations of performers, which can be ascribed to the individual creativity of that singer. This work aims to study the evolution of singing style among four artists of four consecutive generations from Patiala Gharana. For this, alap and bandish parts of two different Ragas sung by the four artists were analyzed with the help of non linear multifractal analysis (MFDFA) technique. The multifractal spectral width obtained from the MFDFA method gives an estimate of the complexity of the signal. The observations from the variation of spectral width give a cue towards the scientific recognition of Guru-Shisya Parampara (teacher-student tradition) - a hitherto much-heard philosophical term. From a quantitative approach this study succeeds in analyzing the evolution of singing styles within a particular Gharana over generations of artists as well as the effect of globalization in the field of classical music.
△ Less
Submitted 26 May, 2021; v1 submitted 8 April, 2016;
originally announced April 2016.
-
Ragas in Bollywood music A microscopic view through multrifractal cross-correlation method
Authors:
Shankha Sanyal,
Archi Banerjee,
Souparno Roy,
Sayan Nag,
Ranjan Sengupta,
Dipak Ghosh
Abstract:
Since the start of Indian cinema, a number of films have been made where a particular song is based on a certain raga. These songs have been taking a major role in spreading the essence of classical music to the common people, who have no formal exposure to classical music. In this paper, we look to explore what are the particular features of a certain raga which make it understandable to common p…
▽ More
Since the start of Indian cinema, a number of films have been made where a particular song is based on a certain raga. These songs have been taking a major role in spreading the essence of classical music to the common people, who have no formal exposure to classical music. In this paper, we look to explore what are the particular features of a certain raga which make it understandable to common people and enrich the song to a great extent. For this, we chose two common ragas of Hindustani classical music, namely "Bhairav" and "Mian ki Malhar" which are known to have widespread application in popular film music. We have taken 3 minute clips of these two ragas from the renderings of two eminent maestros of Hindustani classical music. 3 min clips of ten (10) widely popular songs of Bollywood films were selected for analysis. These were analyzed with the help of a latest non linear analysis technique called Multifractal Detrended Cross correlation Analysis (MFDXA). With this technique, all parts of the Film music and the renderings from the eminent maestros are analyzed to find out a cross correlation coefficient (γx) which gives the degree of correlation between these two signals. We hypothesize that the parts which have the highest degree of cross correlation are the parts in which that particular raga is established in the song. Also the variation of cross correlation coefficient in the different parts of the two samples gives a measure of the modulation that is executed by the singer. Thus, in nutshell we try to study scientifically the amount of correlation that exists between the raga and the same raga being utilized in Film music. This will help in generating an automated algorithm through which a naïve listener will relish the flavor of a particular raga in a popular film song. The results are discussed in detail.
△ Less
Submitted 26 May, 2021; v1 submitted 8 April, 2016;
originally announced April 2016.
-
Primordial Magnetic Field Via Weibel Instability In The Quark Gluon Plasma Phase
Authors:
Abhishek Atreya,
Soma Sanyal
Abstract:
The origin of the observed large scale magnetic fields in the Universe is a mystery. The seed of these magnetic fields has been attributed to physical process in the early universe. In this work we provide a mechanism for the generation of a primordial magnetic field in the early universe via the Weibel instability in the quark gluon plasma. The Weibel instability occurs in the plasma if there is…
▽ More
The origin of the observed large scale magnetic fields in the Universe is a mystery. The seed of these magnetic fields has been attributed to physical process in the early universe. In this work we provide a mechanism for the generation of a primordial magnetic field in the early universe via the Weibel instability in the quark gluon plasma. The Weibel instability occurs in the plasma if there is an anisotropy in the particle distribution function of the particles. In early universe, the velocity anisotropy required for Weibel instability to operate is generated in the quark gluon plasma by the collapse of closed $Z(3)$ domain walls that arise in the deconfined phase of the QCD (above $T\sim 200$ MeV). Such large domains can arise in the context of certain low energy scale inflationary models. The closed domains undergo supersonic collapse and the velocity anisotropy is generated in the shocks produced in the wake of the collapsing domain walls. This results in a two stream Weibel instability in the ultra-relativistic quark gluon plasma. The instability in turn generates strong magnetic fields in the plasma. We find that the field strengths generated can be comparable to the equipartition energy density at the QCD scale which is of the order of $10^{18}$ G.
△ Less
Submitted 9 September, 2016; v1 submitted 9 March, 2016;
originally announced March 2016.
-
Vacancy-induced low-energy states in undoped graphene
Authors:
Sambuddha Sanyal,
Kedar Damle,
Olexei I. Motrunich
Abstract:
We demonstrate that a nonzero concentration $n_v$ of static, randomly-placed vacancies in graphene leads to a density $w$ of zero-energy quasiparticle states at the band-center $ε=0$ within a tight-binding description with nearest-neighbour hop** $t$ on the honeycomb lattice. We show that $w$ remains generically nonzero in the compensated case (exactly equal number of vacancies on the two sublat…
▽ More
We demonstrate that a nonzero concentration $n_v$ of static, randomly-placed vacancies in graphene leads to a density $w$ of zero-energy quasiparticle states at the band-center $ε=0$ within a tight-binding description with nearest-neighbour hop** $t$ on the honeycomb lattice. We show that $w$ remains generically nonzero in the compensated case (exactly equal number of vacancies on the two sublattices) even in the presence of hop** disorder, and depends sensitively on $n_v$ and correlations between vacancy positions. For low, {\em but not-too-low} $|ε|/t$ in this compensated case, we show that the density of states (DOS) $ρ(ε)$ exhibits a strong divergence of the form $ρ_{\rm 1D}(ε) \sim |ε|^{-1}/ [\log(t/|ε|)]^{(y+1)} $, which crosses over to the universal low-energy asymptotic form expected on symmetry grounds $ρ_{\rm GW}(ε) \sim |ε|^{-1}e^{-b[\log(t/|ε|)]^{2/3} }$ below a crossover scale $ε_c \ll t$. $ε_c$ is found to decrease rapidly with decreasing $n_v$, while $y$ decreases much more slowly.
△ Less
Submitted 10 June, 2016; v1 submitted 29 February, 2016;
originally announced February 2016.
-
Categorization of Stringed Instruments with Multifractal Detrended Fluctuation Analysis
Authors:
Archi Banerjee,
Shankha Sanyal,
Tarit Guhathakurata,
Ranjan Sengupta,
Dipak Ghosh
Abstract:
Categorization is crucial for content description in archiving of music signals. On many occasions, human brain fails to classify the instruments properly just by listening to their sounds which is evident from the human response data collected during our experiment. Some previous attempts to categorize several musical instruments using various linear analysis methods required a number of paramete…
▽ More
Categorization is crucial for content description in archiving of music signals. On many occasions, human brain fails to classify the instruments properly just by listening to their sounds which is evident from the human response data collected during our experiment. Some previous attempts to categorize several musical instruments using various linear analysis methods required a number of parameters to be determined. In this work, we attempted to categorize a number of string instruments according to their mode of playing using latest-state-of-the-art robust non-linear methods. For this, 30 second sound signals of 26 different string instruments from all over the world were analyzed with the help of non linear multifractal analysis (MFDFA) technique. The spectral width obtained from the MFDFA method gives an estimate of the complexity of the signal. From the variation of spectral width, we observed distinct clustering among the string instruments according to their mode of playing. Also there is an indication that similarity in the structural configuration of the instruments is playing a major role in the clustering of their spectral width. The observations and implications are discussed in detail.
△ Less
Submitted 28 January, 2016;
originally announced January 2016.
-
Categorization of Tablas by Wavelet Analysis
Authors:
Anirban Patranabis,
Kaushik Banerjee,
Vishal Midya,
Shankha Sanyal,
Archi Banerjee,
Ranjan Sengupta,
Dipak Ghosh
Abstract:
Tabla, a percussion instrument, mainly used to accompany vocalists, instrumentalists and dancers in every style of music from classical to light in India, mainly used for kee** rhythm. This percussion instrument consists of two drums played by two hands, structurally different and produces different harmonic sounds. Earlier work has done labeling tabla strokes from real time performances by test…
▽ More
Tabla, a percussion instrument, mainly used to accompany vocalists, instrumentalists and dancers in every style of music from classical to light in India, mainly used for kee** rhythm. This percussion instrument consists of two drums played by two hands, structurally different and produces different harmonic sounds. Earlier work has done labeling tabla strokes from real time performances by testing neural networks and tree based classification methods. The current work extends previous work by C. V. Raman and S. Kumar in 1920 on spectrum modeling of tabla strokes. In this paper we have studied spectral characteristics (by wavelet analysis by sub band coding method and using torrence wavelet tool) of nine strokes from each of five tablas using Wavelet transform. Wavelet analysis is now a common tool for analyzing localized variations of power within a time series and to find the frequency distribution in time frequency space. Statistically, we will look into the patterns depicted by harmonics of different sub bands and the tablas. Distribution of dominant frequencies at different sub-band of stroke signals, distribution of power and behavior of harmonics are the important features, leads to categorization of tabla.
△ Less
Submitted 3 January, 2016;
originally announced January 2016.
-
Harmonic and Timbre Analysis of Tabla Strokes
Authors:
Anirban Patranabis,
Kaushik Banerjee,
Vishal Midya,
Sneha Chakraborty,
Shankha Sanyal,
Archi Banerjee,
Ranjan Sengupta,
Dipak Ghosh
Abstract:
Indian twin drums mainly bayan and dayan (tabla) are the most important percussion instruments in India popularly used for kee** rhythm. It is a twin percussion/drum instrument of which the right hand drum is called dayan and the left hand drum is called bayan. Tabla strokes are commonly called as `bol', constitutes a series of syllables. In this study we have studied the timbre characteristics…
▽ More
Indian twin drums mainly bayan and dayan (tabla) are the most important percussion instruments in India popularly used for kee** rhythm. It is a twin percussion/drum instrument of which the right hand drum is called dayan and the left hand drum is called bayan. Tabla strokes are commonly called as `bol', constitutes a series of syllables. In this study we have studied the timbre characteristics of nine strokes from each of five different tablas. Timbre parameters were calculated from LTAS of each stroke signals. Study of timbre characteristics is one of the most important deterministic approach for analyzing tabla and its stroke characteristics. Statistical correlations among timbre parameters were measured and also through factor analysis we get to know about the parameters of timbre analysis which are closely related. Tabla strokes have unique harmonic and timbral characteristics at mid frequency range and have no uniqueness at low frequency ranges.
△ Less
Submitted 15 October, 2015;
originally announced October 2015.
-
Towards Better Separation between Deterministic and Randomized Query Complexity
Authors:
Sagnik Mukhopadhyay,
Swagato Sanyal
Abstract:
We show that there exists a Boolean function $F$ which observes the following separations among deterministic query complexity $(D(F))$, randomized zero error query complexity $(R_0(F))$ and randomized one-sided error query complexity $(R_1(F))$: $R_1(F) = \widetilde{O}(\sqrt{D(F)})$ and $R_0(F)=\widetilde{O}(D(F))^{3/4}$. This refutes the conjecture made by Saks and Wigderson that for any Boolean…
▽ More
We show that there exists a Boolean function $F$ which observes the following separations among deterministic query complexity $(D(F))$, randomized zero error query complexity $(R_0(F))$ and randomized one-sided error query complexity $(R_1(F))$: $R_1(F) = \widetilde{O}(\sqrt{D(F)})$ and $R_0(F)=\widetilde{O}(D(F))^{3/4}$. This refutes the conjecture made by Saks and Wigderson that for any Boolean function $f$, $R_0(f)=Ω({D(f)})^{0.753..}$. This also shows widest separation between $R_1(f)$ and $D(f)$ for any Boolean function. The function $F$ was defined by G{ö}{ö}s, Pitassi and Watson who studied it for showing a separation between deterministic decision tree complexity and unambiguous non-deterministic decision tree complexity. Independently of us, Ambainis et al proved that different variants of the function $F$ certify optimal (quadratic) separation between $D(f)$ and $R_0(f)$, and polynomial separation between $R_0(f)$ and $R_1(f)$. Viewed as separation results, our results are subsumed by those of Ambainis et al. However, while the functions considerd in the work of Ambainis et al are different variants of $F$, we work with the original function $F$ itself.
△ Less
Submitted 24 June, 2015; v1 submitted 21 June, 2015;
originally announced June 2015.
-
Technical Analysis of Security Infrastructure in RFID Technology
Authors:
Tuhin Borgohain,
Sugata Sanyal
Abstract:
The paper is a technical analysis of the security infrastructure in the field of RFID technology. The paper briefly discusses the architecture of the RFID technology. Then it analyses the various features and advantages RFID technology has over the existing technologies like bar codes. This is followed by a discussion of the various disadvantages and security drawbacks of RFID technology that prev…
▽ More
The paper is a technical analysis of the security infrastructure in the field of RFID technology. The paper briefly discusses the architecture of the RFID technology. Then it analyses the various features and advantages RFID technology has over the existing technologies like bar codes. This is followed by a discussion of the various disadvantages and security drawbacks of RFID technology that prevents its widespread adoption in the mainstream market. The paper concludes with a brief analysis of some of the security measures that are implemented within the RFID technology for securing up the whole infrastructure. The main aim of the paper is to focus on the drawbacks of the pre-existing security measures in RFID technology as well as to discuss the direction in which further research has to be carried out without the compromise on its unique features.
△ Less
Submitted 1 May, 2015;
originally announced May 2015.
-
Comparative Analysis of Cryptography Library in IoT
Authors:
Uday Kumar,
Tuhin Borgohain,
Sugata Sanyal
Abstract:
The paper aims to do a survey along with a comparative analysis of the various cryptography libraries that are applicable in the field of Internet of Things (IoT). The first half of the paper briefly introduces the various cryptography libraries available in the field of cryptography along with a list of all the algorithms contained within the libraries. The second half of the paper deals with cry…
▽ More
The paper aims to do a survey along with a comparative analysis of the various cryptography libraries that are applicable in the field of Internet of Things (IoT). The first half of the paper briefly introduces the various cryptography libraries available in the field of cryptography along with a list of all the algorithms contained within the libraries. The second half of the paper deals with cryptography libraries specifically aimed for application in the field of Internet of Things. The various libraries and their performance analysis listed down in this paper are consolidated from various sources with the aim of providing a single comprehensive repository for reference to the various cryptography libraries and the comparative analysis of their features in IoT.
△ Less
Submitted 16 April, 2015;
originally announced April 2015.
-
Survey of Operating Systems for the IoT Environment
Authors:
Tuhin Borgohain,
Uday Kumar,
Sugata Sanyal
Abstract:
This paper is a comprehensive survey of the various operating systems available for the Internet of Things environment. At first the paper introduces the various aspects of the operating systems designed for the IoT environment where resource constraint poses a huge problem for the operation of the general OS designed for the various computing devices. The latter part of the paper describes the va…
▽ More
This paper is a comprehensive survey of the various operating systems available for the Internet of Things environment. At first the paper introduces the various aspects of the operating systems designed for the IoT environment where resource constraint poses a huge problem for the operation of the general OS designed for the various computing devices. The latter part of the paper describes the various OS available for the resource constraint IoT environment along with the various platforms each OS supports, the software development kits available for the development of applications in the respective OS along with the various protocols implemented in these OS for the purpose of communication and networking.
△ Less
Submitted 13 April, 2015; v1 submitted 9 April, 2015;
originally announced April 2015.
-
Application Security framework for Mobile App Development in Enterprise setup
Authors:
Subhamoy Chakraborti,
D. P. Acharjya,
Sugata Sanyal
Abstract:
Enterprise Mobility has been increasing the reach over the years. Initially Mobile devices were adopted as consumer devices. However, the enterprises world over have rightly taken the leap and started using the ubiquitous technology for managing its employees as well as to reach out to the customers. While the Mobile ecosystem has been evolving over the years, the increased exposure of mobility in…
▽ More
Enterprise Mobility has been increasing the reach over the years. Initially Mobile devices were adopted as consumer devices. However, the enterprises world over have rightly taken the leap and started using the ubiquitous technology for managing its employees as well as to reach out to the customers. While the Mobile ecosystem has been evolving over the years, the increased exposure of mobility in Enterprise framework have caused major focus on the security aspects of it. While a significant focus have been put on network security, this paper discusses on the approach that can be taken at Mobile application layer, which would reduce the risk to the enterprises.
△ Less
Submitted 20 March, 2015;
originally announced March 2015.
-
Heuristic Algorithm using Internet of Things and Mobility for solving demographic issues in Financial Inclusion projects
Authors:
Subhamoy Chakraborti,
Sugata Sanyal
Abstract:
All over the world, the population in rural and semi-urban areas is a major concern for policy makers as they require technology enablement most to get elevated from their living conditions. Financial Inclusion projects are meant to work in this area as well. However the reach of financial institutions in those areas is much lesser than in urban areas in general. New policies and strategies are be…
▽ More
All over the world, the population in rural and semi-urban areas is a major concern for policy makers as they require technology enablement most to get elevated from their living conditions. Financial Inclusion projects are meant to work in this area as well. However the reach of financial institutions in those areas is much lesser than in urban areas in general. New policies and strategies are being made towards making banking services more accessible to the people in rural and semi-urban area. Technology, in particular Internet of Things (IoT) and Mobility can play a major role in this context as an enabler and multiplier. This paper discusses about an IoT and Mobility driven approach, which the Financial Institutions may consider while trying to work on financial inclusion projects.
△ Less
Submitted 1 March, 2015;
originally announced March 2015.
-
Authentication Systems in Internet of Things
Authors:
Tuhin Borgohain,
Amardeep Borgohain,
Uday Kumar,
Sugata Sanyal
Abstract:
This paper analyses the various authentication systems implemented for enhanced security and private re-position of an individual's log-in credentials. The first part of the paper describes the multi-factor authentication (MFA) systems, which, though not applicable to the field of Internet of Things, provides great security to a user's credentials. MFA is followed by a brief description of the wor…
▽ More
This paper analyses the various authentication systems implemented for enhanced security and private re-position of an individual's log-in credentials. The first part of the paper describes the multi-factor authentication (MFA) systems, which, though not applicable to the field of Internet of Things, provides great security to a user's credentials. MFA is followed by a brief description of the working mechanism of interaction of third party clients with private resources over the OAuth protocol framework and a study of the delegation based authentication system in IP-based IoT.
△ Less
Submitted 3 February, 2015;
originally announced February 2015.
-
Review of Considerations for Mobile Device based Secure Access to Financial Services and Risk Handling Strategy for CIOs, CISOs and CTOs
Authors:
Amal Saha,
Sugata Sanyal
Abstract:
The information technology and security stakeholders like CIOs, CISOs and CTOs in financial services organization are often asked to identify the risks with mobile computing channel for financial services that they support. They are also asked to come up with approaches for handling risks, define risk acceptance level and mitigate them. This requires them to articulate strategy for supporting a hu…
▽ More
The information technology and security stakeholders like CIOs, CISOs and CTOs in financial services organization are often asked to identify the risks with mobile computing channel for financial services that they support. They are also asked to come up with approaches for handling risks, define risk acceptance level and mitigate them. This requires them to articulate strategy for supporting a huge variety of mobile devices from various vendors with different operating systems and hardware platforms and at the same time stay within the accepted risk level. These articulations should be captured in information security policy document or other suitable document of financial services organization like banks, payment service provider, etc. While risks and mitigation approaches are available from multiple sources, the senior stakeholders may find it challenging to articulate the issues in a comprehensive manner for sharing with business owners and other technology stakeholders. This paper reviews the current research that addresses the issues mentioned above and articulates a strategy that the senior stakeholders may use in their organization. It is assumed that this type of comprehensive strategy guide for senior stakeholders is not readily available and CIOs, CISOs and CTOs would find this paper to be very useful.
△ Less
Submitted 2 February, 2015;
originally announced February 2015.
-
Survey of Security and Privacy Issues of Internet of Things
Authors:
Tuhin Borgohain,
Uday Kumar,
Sugata Sanyal
Abstract:
This paper is a general survey of all the security issues existing in the Internet of Things (IoT) along with an analysis of the privacy issues that an end-user may face as a consequence of the spread of IoT. The majority of the survey is focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks ha…
▽ More
This paper is a general survey of all the security issues existing in the Internet of Things (IoT) along with an analysis of the privacy issues that an end-user may face as a consequence of the spread of IoT. The majority of the survey is focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks has been analyzed in the paper.
△ Less
Submitted 9 January, 2015;
originally announced January 2015.
-
Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment
Authors:
Tuhin Borgohain,
Amardeep Borgohain,
Rajdeep Borgohain,
Sugata Sanyal
Abstract:
The purpose of this paper is to do a general survey on the existing communication modes inside a smart grid, the existing security loopholes and their countermeasures. Then we suggest a detailed countermeasure, building upon the Jigsaw based secure data transfer [8] for enhanced security of the data flow inside the communication system of a smart grid. The paper has been written without the consid…
▽ More
The purpose of this paper is to do a general survey on the existing communication modes inside a smart grid, the existing security loopholes and their countermeasures. Then we suggest a detailed countermeasure, building upon the Jigsaw based secure data transfer [8] for enhanced security of the data flow inside the communication system of a smart grid. The paper has been written without the consideration of any factor of inoperability between the various security techniques inside a smart grid
△ Less
Submitted 31 December, 2014;
originally announced January 2015.
-
Survey of Strong Authentication Approaches for Mobile Proximity and Remote Wallet Applications - Challenges and Evolution
Authors:
Amal Saha,
Sugata Sanyal
Abstract:
Wallet may be described as container application used for configuring, accessing and analysing data from underlying payment application(s). There are two dominant types of digital wallet applications, proximity wallet and remote wallet. In the payment industry, one often hears about authentication approach for proximity or remote wallets or the underlying payment applications separately, but there…
▽ More
Wallet may be described as container application used for configuring, accessing and analysing data from underlying payment application(s). There are two dominant types of digital wallet applications, proximity wallet and remote wallet. In the payment industry, one often hears about authentication approach for proximity or remote wallets or the underlying payment applications separately, but there is no such approach, as per our knowledge, for combined wallet, the holder application. While Secure Element (SE) controlled by the mobile network operator (i.e., SIM card) may ensure strong authentication, it introduces strong dependencies among business partners in payments and hence is not getting fraction. Embedded SE in the form of trusted execution environment [3, 4, 5] or trusted computing [24] may address this issue in future. But such devices tend to be a bit expensive and are not abundant in the market. Meanwhile, for many years, context based authentication involving device fingerprinting and other contextual information for conditional multi-factor authentication, would prevail and would remain as the most dominant and strong authentication mechanism for mobile devices from various vendors in different capability and price ranges. EMVCo payment token standard published in 2014 tries to address security of wallet based payment in a general way. The authors believe that it is quite likely that EMVCo payment token implementations would evolve in course of time in such a way that token service providers would start insisting on device fingerprinting as strong means of authentication before issuing one-time-use payment token. This paper talks about challenges of existing authentication mechanisms used in payment and wallet applications, and their evolution.
△ Less
Submitted 8 December, 2014;
originally announced December 2014.
-
Applicability of DUKPT Key Management Scheme to Cloud Wallet and other Mobile Payments
Authors:
Amal Saha,
Sugata Sanyal
Abstract:
After discussing the concept of DUKPT based symmetric encryption key management (e.g., for 3DES) and definition of cloud or remote wallet, the paper analyses applicability of DUKPT to different use cases like mobile banking, NFC payment using EMV contactless card and mobile based EMV card emulation, web browser based transaction and cloud or remote wallet.
Cloud wallet is an emerging payment met…
▽ More
After discussing the concept of DUKPT based symmetric encryption key management (e.g., for 3DES) and definition of cloud or remote wallet, the paper analyses applicability of DUKPT to different use cases like mobile banking, NFC payment using EMV contactless card and mobile based EMV card emulation, web browser based transaction and cloud or remote wallet.
Cloud wallet is an emerging payment method and is gaining momentum very fast. Anticipating that the wallet product managers and security specialists may face these questions from different stakeholders, the authors have addressed applicability of DUKPT to cloud wallet use case quite elaborately. As per knowledge of the authors, this topic has been analysed and discussed for the first time.
△ Less
Submitted 8 December, 2014;
originally announced December 2014.
-
Application Layer Intrusion Detection with Combination of Explicit-Rule- Based and Machine Learning Algorithms and Deployment in Cyber- Defence Program
Authors:
Amal Saha,
Sugata Sanyal
Abstract:
There have been numerous works on network intrusion detection and prevention systems, but work on application layer intrusion detection and prevention is rare and not very mature. Intrusion detection and prevention at both network and application layers are important for cyber-security and enterprise system security. Since application layer intrusion is increasing day by day, it is imperative to g…
▽ More
There have been numerous works on network intrusion detection and prevention systems, but work on application layer intrusion detection and prevention is rare and not very mature. Intrusion detection and prevention at both network and application layers are important for cyber-security and enterprise system security. Since application layer intrusion is increasing day by day, it is imperative to give adequate attention to it and use state-of-the-art algorithms for effective detection and prevention. This paper talks about current state of application layer intrusion detection and prevention capabilities in commercial and open-source space and provides a path for evolution to more mature state that will address not only enterprise system security, but also national cyber-defence. Scalability and cost-effectiveness were important factors which shaped the proposed solution.
△ Less
Submitted 12 November, 2014;
originally announced November 2014.
-
Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop Mobile Payment Systems
Authors:
Amal Saha,
Sugata Sanyal
Abstract:
Payment transactions initiated through a mobile device are growing and security concerns must be ad-dressed. People coming from payment card industry often talk passionately about porting ISO 9564 PIN standard based authentication in open-loop card payment to closed-loop mobile financial transactions and certification of closed-loop payment product or solution against this standard. In reality, so…
▽ More
Payment transactions initiated through a mobile device are growing and security concerns must be ad-dressed. People coming from payment card industry often talk passionately about porting ISO 9564 PIN standard based authentication in open-loop card payment to closed-loop mobile financial transactions and certification of closed-loop payment product or solution against this standard. In reality, so far this standard has not been adopted in closed-loop mobile payment authentication and applicability of this ISO standard must be studied carefully before adoption. The authors do a critical analysis of the applicability of this ISO specification and makes categorical statement about relevance of compliance to closed-loop mobile payment. Security requirements for authentication in closed-loop mobile payment systems are not standardized through ISO 9564 standard, Common Criteria, etc. Since closed-loop mobile payment is a relatively new field, the authors make a case for Common Criteria Recognition Agreement (CCRA) or other standards organization to push for publication of a mobile device-agnostic Protection Profile or standard for it, incorporating the suggested authentication approaches.
△ Less
Submitted 11 November, 2014;
originally announced November 2014.
-
Sub-linear Upper Bounds on Fourier dimension of Boolean Functions in terms of Fourier sparsity
Authors:
Swagato Sanyal
Abstract:
We prove that the Fourier dimension of any Boolean function with Fourier sparsity $s$ is at most $O\left(s^{2/3}\right)$. Our proof method yields an improved bound of $\widetilde{O}(\sqrt{s})$ assuming a conjecture of Tsang~\etal~\cite{tsang}, that for every Boolean function of sparsity $s$ there is an affine subspace of $\mathbb{F}_2^n$ of co-dimension $O(\poly\log s)$ restricted to which the fun…
▽ More
We prove that the Fourier dimension of any Boolean function with Fourier sparsity $s$ is at most $O\left(s^{2/3}\right)$. Our proof method yields an improved bound of $\widetilde{O}(\sqrt{s})$ assuming a conjecture of Tsang~\etal~\cite{tsang}, that for every Boolean function of sparsity $s$ there is an affine subspace of $\mathbb{F}_2^n$ of co-dimension $O(\poly\log s)$ restricted to which the function is constant. This conjectured bound is tight upto poly-logarithmic factors as the Fourier dimension and sparsity of the address function are quadratically separated. We obtain these bounds by observing that the Fourier dimension of a Boolean function is equivalent to its non-adaptive parity decision tree complexity, and then bounding the latter.
△ Less
Submitted 13 July, 2014;
originally announced July 2014.
-
Digital Watermarking Techniques in Spatial and Frequency Domain
Authors:
Tanmoy Sarkar,
Sugata Sanyal
Abstract:
Digital watermarking is the act of hiding information in multimedia data, for the purposes of content protection or authentication. In ordinary digital watermarking, the secret information is embedded into the multimedia data (cover data) with minimum distortion of the cover data. Due to these watermarking techniques the watermark image is almost negligible visible. In this paper we will discuss a…
▽ More
Digital watermarking is the act of hiding information in multimedia data, for the purposes of content protection or authentication. In ordinary digital watermarking, the secret information is embedded into the multimedia data (cover data) with minimum distortion of the cover data. Due to these watermarking techniques the watermark image is almost negligible visible. In this paper we will discuss about various techniques of Digital Watermarking techniques in spatial and frequency domains
△ Less
Submitted 13 October, 2014; v1 submitted 9 June, 2014;
originally announced June 2014.
-
Steganalysis: Detecting LSB Steganographic Techniques
Authors:
Tanmoy Sarkar,
Sugata Sanyal
Abstract:
Steganalysis means analysis of stego images. Like cryptanalysis, steganalysis is used to detect messages often encrypted using secret key from stego images produced by steganography techniques. Recently lots of new and improved steganography techniques are developed and proposed by researchers which require robust steganalysis techniques to detect the stego images having minimum false alarm rate.…
▽ More
Steganalysis means analysis of stego images. Like cryptanalysis, steganalysis is used to detect messages often encrypted using secret key from stego images produced by steganography techniques. Recently lots of new and improved steganography techniques are developed and proposed by researchers which require robust steganalysis techniques to detect the stego images having minimum false alarm rate. This paper discusses about the different Steganalysis techniques and help to understand how, where and when this techniques can be used based on different situations.
△ Less
Submitted 20 May, 2014;
originally announced May 2014.
-
Reversible and Irreversible Data Hiding Technique
Authors:
Tanmoy Sarkar,
Sugata Sanyal
Abstract:
Steganography (literally meaning covered writing) is the art and science of embedding secret message into seemingly harmless message. Stenography is practice from olden days where in ancient Greece people used wooden blocks to inscribe secret data and cover the date with wax and write normal message on it. Today stenography is used in various field like multimedia, networks, medical, military etc.…
▽ More
Steganography (literally meaning covered writing) is the art and science of embedding secret message into seemingly harmless message. Stenography is practice from olden days where in ancient Greece people used wooden blocks to inscribe secret data and cover the date with wax and write normal message on it. Today stenography is used in various field like multimedia, networks, medical, military etc. With increasing technology trends steganography is becoming more and more advanced where people not only interested on hiding messages in multimedia data (cover data) but also at the receiving end they are willing to obtain original cover data without any distortion after extracting secret message. This paper will discuss few irreversible data hiding techniques and also, some recently proposed reversible data hiding approach using images.
△ Less
Submitted 20 May, 2014; v1 submitted 12 May, 2014;
originally announced May 2014.
-
Energy Harvesting in M2M and WSN Space
Authors:
Sugata Sanyal
Abstract:
Energy harvesting or power harvesting or energy scavenging is a process where energy is derived from external sources (e.g. solar power, thermal energy, wind energy, salinity gradients, kinetic energy etc.), captured, and stored for small, wireless autonomous devices, like those used in wearable electronics and wireless sensor networks. This paper is focused to applications of Energy Harvesting in…
▽ More
Energy harvesting or power harvesting or energy scavenging is a process where energy is derived from external sources (e.g. solar power, thermal energy, wind energy, salinity gradients, kinetic energy etc.), captured, and stored for small, wireless autonomous devices, like those used in wearable electronics and wireless sensor networks. This paper is focused to applications of Energy Harvesting in Wireless Sensor Networks. This is going to help the ever growing M2M (Machine to Machine) field where there is an exponential growth of intelligent devices and automatic control of these is of paramount importance.
△ Less
Submitted 19 January, 2014;
originally announced January 2014.
-
Clustering online social network communities using genetic algorithms
Authors:
Mustafa H. Hajeer,
Alka Singh,
Dipankar Dasgupta,
Sugata Sanyal
Abstract:
To analyze the activities in an Online Social network (OSN), we introduce the concept of "Node of Attraction" (NoA) which represents the most active node in a network community. This NoA is identified as the origin/initiator of a post/communication which attracted other nodes and formed a cluster at any point in time. In this research, a genetic algorithm (GA) is used as a data mining method where…
▽ More
To analyze the activities in an Online Social network (OSN), we introduce the concept of "Node of Attraction" (NoA) which represents the most active node in a network community. This NoA is identified as the origin/initiator of a post/communication which attracted other nodes and formed a cluster at any point in time. In this research, a genetic algorithm (GA) is used as a data mining method where the main objective is to determine clusters of network communities in a given OSN dataset. This approach is efficient in handling different type of discussion topics in our studied OSN - comments, emails, chat expressions, etc. and can form clusters according to one or more topics. We believe that this work can be useful in finding the source for spread of this GA-based clustering of online interactions and reports some results of experiments with real-world data and demonstrates the performance of proposed approach.
△ Less
Submitted 8 December, 2013;
originally announced December 2013.
-
Ant Colony based Routing for Mobile Ad-Hoc Networks towards Improved Quality of Services
Authors:
Bibhas Roy,
Suman Banik,
Parthi Dey,
Sugata Sanyal,
Nabendu Chaki
Abstract:
Mobile Ad Hoc Network (MANET) is a dynamic multihop wireless network which is established by a set of mobile nodes on a shared wireless channel. One of the major issues in MANET is routing due to the mobility of the nodes. Routing means the act of moving information across an internet work from a source to a destination. When it comes to MANET, the complexity increases due to various characteristi…
▽ More
Mobile Ad Hoc Network (MANET) is a dynamic multihop wireless network which is established by a set of mobile nodes on a shared wireless channel. One of the major issues in MANET is routing due to the mobility of the nodes. Routing means the act of moving information across an internet work from a source to a destination. When it comes to MANET, the complexity increases due to various characteristics like dynamic topology, time varying QoS requirements, limited resources and energy etc. QoS routing plays an important role for providing QoS in wireless ad hoc networks. The most complex issue in this kind of networks is to find a path between the communication end points satisfying QoS requirement for the user. Nature-inspired algorithms (swarm intelligence) such as ant colony optimization ACO)algorithms have shown to be a good technique for develo** routing algorithms for MANETs.
In this paper, a new QoS algorithm for mobile ad hoc network has been proposed. The proposed algorithm combines the idea of Ant Colony Optimization (ACO) with Optimized Link State Routing (OLSR) protocol to identify multiple stable paths between source and destination nodes.
△ Less
Submitted 10 December, 2013; v1 submitted 7 December, 2013;
originally announced December 2013.
-
Detection and prevention of botnets and malware in an enterprise network
Authors:
Manoj Rameshchandra Thakur,
Divye Raj Khilnani,
Kushagra Gupta,
Sandeep Jain,
Vineet Agarwal,
Suneeta Sane,
Sugata Sanyal,
Prabhakar S Dhekne
Abstract:
One of the most significant threats faced by enterprise networks today is from Bots. A Bot is a program that operates as an agent for a user and runs automated tasks over the internet, at a much higher rate than would be possible for a human alone. A collection of Bots in a network, used for malicious purposes is referred to as a Botnet. Bot attacks can range from localized attacks like key-loggin…
▽ More
One of the most significant threats faced by enterprise networks today is from Bots. A Bot is a program that operates as an agent for a user and runs automated tasks over the internet, at a much higher rate than would be possible for a human alone. A collection of Bots in a network, used for malicious purposes is referred to as a Botnet. Bot attacks can range from localized attacks like key-logging to network intensive attacks like Distributed Denial of Service (DDoS). In this paper, we suggest a novel approach that can detect and combat Bots. The proposed solution adopts a two pronged strategy which we have classified into the standalone algorithm and the network algorithm. The standalone algorithm runs independently on each node of the network. It monitors the active processes on the node and tries to identify Bot processes using parameters such as response time and output to input traffic ratio. If a suspicious process has been identified the network algorithm is triggered. The network algorithm will then analyze conversations to and from the hosts of the network using the transport layer flow records. It then tries to deduce the Bot pattern as well as Bot signatures which can subsequently be used by the standalone algorithm to thwart Bot processes at their very onset.
△ Less
Submitted 5 December, 2013;
originally announced December 2013.
-
Impact of Mobile Transmitter Sources on Radio Frequency Wireless Energy Harvesting
Authors:
Antonio Hernandez Coarasa,
Prusayon Nintanavongsa,
Sugata Sanyal,
Kaushik R. Chowdhury
Abstract:
Wireless energy harvesting sensor networks constitute a new paradigm, where the motes deployed in the field are no longer constrained by the limited battery resource, but are able to re-charge themselves through directed electromagnetic energy transfer. The energy sources, which we call actors, are mobile and move along pre-decided patterns while radiating an appropriate level of energy, sufficien…
▽ More
Wireless energy harvesting sensor networks constitute a new paradigm, where the motes deployed in the field are no longer constrained by the limited battery resource, but are able to re-charge themselves through directed electromagnetic energy transfer. The energy sources, which we call actors, are mobile and move along pre-decided patterns while radiating an appropriate level of energy, sufficient enough to charge the sensors at an acceptable rate. This is the first work that investigates the impact of energy transfer, especially concerning the energy gain in the sensors, the energy spent by the actors, and the overall lifetime in the resulting mobile sensor-actor networks. We propose two event-specific mobility models, where the events occur at the centers of a Voronoi tessellation, and the actors move along either (i)the edges of the Voronoi cells, or (ii) directly from one event center to another. We undertake a comprehensive simulation based study using traces obtained from our experimental energy harvesting circuits powering Mica2 motes. Our results reveal several non-intuitive outcomes, and provide guidelines on which mobility model may be adopted based on the distribution of the events and actors.
△ Less
Submitted 3 December, 2013;
originally announced December 2013.
-
Irrational behavior of algebraic discrete valuations
Authors:
Soumya D. Sanyal
Abstract:
We study algebraic discrete valuations dominating normal local domains of dimension two. We construct a family of examples to show that the Hilbert-Samuel function of the associated graded ring of the valuation can fail to be asymptotically of the form: quasi-polynomial plus a bounded function. We also show that the associated multiplicity can be irrational, or even transcendental.
We study algebraic discrete valuations dominating normal local domains of dimension two. We construct a family of examples to show that the Hilbert-Samuel function of the associated graded ring of the valuation can fail to be asymptotically of the form: quasi-polynomial plus a bounded function. We also show that the associated multiplicity can be irrational, or even transcendental.
△ Less
Submitted 10 June, 2014; v1 submitted 23 November, 2013;
originally announced November 2013.
-
Baryon inhomogeneities in a charged quark gluon plasma
Authors:
Avijeet Ray,
Soma Sanyal
Abstract:
We study the generation of baryon inhomogeneities in regions of the quark gluon plasma which have a charge imbalance. We find that the overdensity in the baryon lumps for positively charged particles is different from the overdensity due to the negatively charged particles. Since quarks are charged particles, the probability of forming neutrons or protons in the lumps would thus be changed. The pr…
▽ More
We study the generation of baryon inhomogeneities in regions of the quark gluon plasma which have a charge imbalance. We find that the overdensity in the baryon lumps for positively charged particles is different from the overdensity due to the negatively charged particles. Since quarks are charged particles, the probability of forming neutrons or protons in the lumps would thus be changed. The probability of forming hadrons having quarks of the same charges would be enhanced. This might have interesting consequences for the inhomogeneous nucleosynthesis calculations.
△ Less
Submitted 5 September, 2013;
originally announced September 2013.
-
Secure Authentication of Cloud Data Mining API
Authors:
Rohit Bhadauria,
Rajdeep Borgohain,
Abirlal Biswas,
Sugata Sanyal
Abstract:
Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. This has made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multi-fold benefits to the users moving to a cloud, while posing unknown security and privacy issues. User authentication is one such growing concern and is greatly needed in order to ensure priv…
▽ More
Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. This has made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multi-fold benefits to the users moving to a cloud, while posing unknown security and privacy issues. User authentication is one such growing concern and is greatly needed in order to ensure privacy and security in a cloud computing environment. This paper discusses the security at different levels viz. network, application and virtualization, in a cloud computing environment. A security framework based on one-time pass key mechanism has been proposed. The uniqueness of the proposed security protocol lies in the fact, that it provides security to both the service providers as well the users in a highly conflicting cloud environment.
△ Less
Submitted 4 August, 2013;
originally announced August 2013.
-
RISM -- Reputation Based Intrusion Detection System for Mobile Ad hoc Networks
Authors:
Animesh Kr Trivedi,
Rishi Kapoor,
Rajan Arora,
Sudip Sanyal,
Sugata Sanyal
Abstract:
This paper proposes a combination of an Intrusion Detection System with a routing protocol to strengthen the defense of a Mobile Ad hoc Network. Our system is Socially Inspired, since we use the new paradigm of Reputation inherited from human behavior. The proposed IDS also has a unique characteristic of being Semi-distributed, since it neither distributes its Observation results globally nor keep…
▽ More
This paper proposes a combination of an Intrusion Detection System with a routing protocol to strengthen the defense of a Mobile Ad hoc Network. Our system is Socially Inspired, since we use the new paradigm of Reputation inherited from human behavior. The proposed IDS also has a unique characteristic of being Semi-distributed, since it neither distributes its Observation results globally nor keeps them entirely locally; however, managing to communicate this vital information without accretion of the network traffic. This innovative approach also avoids void assumptions and complex calculations for calculating and maintaining trust values used to estimate the reliability of other nodes observations. A robust Path Manager and Monitor system and Redemption and Fading concepts are other salient features of this design. The design has shown to outperform normal DSR in terms of Packet Delivery Ratio and Routing Overhead even when up to half of nodes in the network behave as malicious.
△ Less
Submitted 30 July, 2013;
originally announced July 2013.
-
Finding Numerical Solutions of Diophantine Equations using Ant Colony Optimization
Authors:
Siby Abraham,
Sugata Sanyal,
Mukund Sanglikar
Abstract:
The paper attempts to find numerical solutions of Diophantine equations, a challenging problem as there are no general methods to find solutions of such equations. It uses the metaphor of foraging habits of real ants. The ant colony optimization based procedure starts with randomly assigned locations to a fixed number of artificial ants. Depending upon the quality of these positions, ants deposit…
▽ More
The paper attempts to find numerical solutions of Diophantine equations, a challenging problem as there are no general methods to find solutions of such equations. It uses the metaphor of foraging habits of real ants. The ant colony optimization based procedure starts with randomly assigned locations to a fixed number of artificial ants. Depending upon the quality of these positions, ants deposit pheromone at the nodes. A successor node is selected from the topological neighborhood of each of the nodes based on this stochastic pheromone deposit. If an ant bumps into an already encountered node, the pheromone is updated correspondingly. A suitably defined pheromone evaporation strategy guarantees that premature convergence does not take place. The experimental results, which compares with those of other machine intelligence techniques, validate the effectiveness of the proposed method.
△ Less
Submitted 4 June, 2013;
originally announced June 2013.
-
Machine Translation Systems in India
Authors:
Sugata Sanyal,
Rajdeep Borgohain
Abstract:
Machine Translation is the translation of one natural language into another using automated and computerized means. For a multilingual country like India, with the huge amount of information exchanged between various regions and in different languages in digitized format, it has become necessary to find an automated process from one language to another. In this paper, we take a look at the various…
▽ More
Machine Translation is the translation of one natural language into another using automated and computerized means. For a multilingual country like India, with the huge amount of information exchanged between various regions and in different languages in digitized format, it has become necessary to find an automated process from one language to another. In this paper, we take a look at the various Machine Translation System in India which is specifically built for the purpose of translation between the Indian languages. We discuss the various approaches taken for building the machine translation system and then discuss some of the Machine Translation Systems in India along with their features.
△ Less
Submitted 29 April, 2013;
originally announced April 2013.
-
Inter-Cloud Data Security Strategies
Authors:
Sugata Sanyal,
Parthasarathy P. Iyer
Abstract:
Cloud computing is a complex infrastructure of software, hardware, processing, and storage that is available as a service. Cloud computing offers immediate access to large numbers of the world's most sophisticated supercomputers and their corresponding processing power, interconnected at various locations around the world, proffering speed in the tens of trillions of computations per second. Infor…
▽ More
Cloud computing is a complex infrastructure of software, hardware, processing, and storage that is available as a service. Cloud computing offers immediate access to large numbers of the world's most sophisticated supercomputers and their corresponding processing power, interconnected at various locations around the world, proffering speed in the tens of trillions of computations per second. Information in databases and software scattered around the Internet. There are many service providers in the internet, we can call each service as a cloud, each cloud service will exchange data with other cloud, so when the data is exchanged between the clouds, there exist the problem of security. Security is an important issue for cloud computing, both in terms of legal compliance and user trust, and needs to be considered at every phase of design. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services may not be trustworthy. This unique attribute, however, poses many new security challenges. Cloud computing seems to offer some incredible benefits for communicators.
△ Less
Submitted 6 March, 2013;
originally announced March 2013.
-
Cloud Computing -- An Approach with Modern Cryptography
Authors:
Sugata Sanyal,
Parthasarathy P. Iyer
Abstract:
In this paper we are proposing an algorithm which uses AES technique of 128/192/256 bit cipher key in encryption and decryption of data. AES provides high security as compared to other encryption techniques along with RSA. Cloud computing provides the customer with the requested services. It refers to applications and services that run on distributed network using virtualized resources and accesse…
▽ More
In this paper we are proposing an algorithm which uses AES technique of 128/192/256 bit cipher key in encryption and decryption of data. AES provides high security as compared to other encryption techniques along with RSA. Cloud computing provides the customer with the requested services. It refers to applications and services that run on distributed network using virtualized resources and accessed by common IP and network standard. While providing data services it is becoming important to provide security for data. In cloud computing kee** data secure is an important issue to be focused. Even though AES was designed for military purposes, now a days it is been commercially adopted worldwide as it can encrypt most confidential document, as well as it can work in most restricted areas, and offers good defense against various attack techniques, and security level to protect data for next 2-3 decades.
△ Less
Submitted 5 March, 2013;
originally announced March 2013.
-
Increasing Security in Cloud Environment
Authors:
Priyanka Naik,
Sugata Sanyal
Abstract:
The concept of cloud computing was introduced to meet the increase in demand for new application for a project, and to provide a large storage facility whenever or wherever a user needs it. The cloud system facility helped many industries as well as individual users to get authentic software at a very low cost. But with this new system comes the major concern of security, as the connection to the…
▽ More
The concept of cloud computing was introduced to meet the increase in demand for new application for a project, and to provide a large storage facility whenever or wherever a user needs it. The cloud system facility helped many industries as well as individual users to get authentic software at a very low cost. But with this new system comes the major concern of security, as the connection to the cloud is through the web and the data and application availability need to be handled for each client. The paper describes the various security measures that can be added in isolation or in combination for securing data transmission, server and client.
△ Less
Submitted 2 January, 2013;
originally announced January 2013.
-
Prover and Verifier Based Password Protection: PVBPP
Authors:
Priyanka Naik,
Sugata Sanyal
Abstract:
In today's world password are mostly used for authentication. This makes them prone to various kinds of attacks like dictionary attacks. A dictionary attack is a method of breaking the password by systematically entering every word in a dictionary as a password. This attack leads to an overload on the server leading to denial of service attack. This paper presents a protocol to reduce the rate of…
▽ More
In today's world password are mostly used for authentication. This makes them prone to various kinds of attacks like dictionary attacks. A dictionary attack is a method of breaking the password by systematically entering every word in a dictionary as a password. This attack leads to an overload on the server leading to denial of service attack. This paper presents a protocol to reduce the rate of dictionary attack by using a prover and a verifier system. This system makes it difficult for the attacker to prove it as a valid user by becoming computationally intensive. The rate of attempts is also reduced and thus restricting the Denial of Service attack.
△ Less
Submitted 25 December, 2012;
originally announced December 2012.
-
A Heuristic Reputation Based System to Detect Spam activities in a Social Networking Platform, HRSSSNP
Authors:
Manoj Rameshchandra Thakur,
Sugata Sanyal
Abstract:
The introduction of the social networking platform has drastically affected the way individuals interact. Even though most of the effects have been positive, there exist some serious threats associated with the interactions on a social networking website. A considerable proportion of the crimes that occur are initiated through a social networking platform [5]. Almost 33% of the crimes on the inter…
▽ More
The introduction of the social networking platform has drastically affected the way individuals interact. Even though most of the effects have been positive, there exist some serious threats associated with the interactions on a social networking website. A considerable proportion of the crimes that occur are initiated through a social networking platform [5]. Almost 33% of the crimes on the internet are initiated through a social networking website [5]. Moreover activities like spam messages create unnecessary traffic and might affect the user base of a social networking platform. As a result preventing interactions with malicious intent and spam activities becomes crucial. This work attempts to detect the same in a social networking platform by considering a social network as a weighted graph wherein each node, which represents an individual in the social network, stores activities of other nodes with respect to itself in an optimized format which is referred to as localized data-set. The weights associated with the edges in the graph represent the trust relationship between profiles. The weights of the edges along with the localized data-set is used to infer whether nodes in the social network are compromised and are performing spam or malicious activities.
△ Less
Submitted 9 December, 2012;
originally announced December 2012.
-
A Review of Techniques to Mitigate Sybil Attacks
Authors:
Nitish Balachandran,
Sugata Sanyal
Abstract:
Any decentralised distributed network is particularly vulnerable to the Sybil attack wherein a malicious node masquerades as several different nodes, called Sybil nodes, simultaneously in an attempt to disrupt the proper functioning of the network. Such attacks may cause damage on a fairly large scale especially since they are difficult to detect and there has been no universally accepted scheme t…
▽ More
Any decentralised distributed network is particularly vulnerable to the Sybil attack wherein a malicious node masquerades as several different nodes, called Sybil nodes, simultaneously in an attempt to disrupt the proper functioning of the network. Such attacks may cause damage on a fairly large scale especially since they are difficult to detect and there has been no universally accepted scheme to counter them as yet. In this paper, we discuss the different kinds of Sybil attacks including those occurring in peer-to-peer reputation systems, self-organising networks and even social network systems. In addition, various methods that have been suggested over time to decrease or eliminate their risk completely are also analysed along with their modus operandi.
△ Less
Submitted 11 July, 2012;
originally announced July 2012.
-
Load Balancing with Reduced Unnecessary Handoff in Energy Efficient Macro/Femto-cell based BWA Networks
Authors:
Prasun Chowdhury,
Anindita Kundu,
Iti Saha Misra,
Salil K Sanyal
Abstract:
The hierarchical macro/femto cell based BWA networks are observed to be quite promising for mobile operators as it improves their network coverage and capacity at the outskirt of the macro cell. However, this new technology introduces increased number of macro/femto handoff and wastage of electrical energy which in turn may affect the system performance. Users moving with high velocity or undergoi…
▽ More
The hierarchical macro/femto cell based BWA networks are observed to be quite promising for mobile operators as it improves their network coverage and capacity at the outskirt of the macro cell. However, this new technology introduces increased number of macro/femto handoff and wastage of electrical energy which in turn may affect the system performance. Users moving with high velocity or undergoing real-time transmission suffers degraded performance due to huge number of unnecessary macro/femto handoff. On the other hand, huge amount of electrical energy is wasted when a femto BS is active in the network but remains unutilized due to low network load. Our proposed energy efficient handoff decision algorithm eliminates the unnecessary handoff while balancing the load of the macro and femto cells at minimal energy consumption. The performance of the proposed algorithm is analyzed using Continuous Time Markov Chain (CTMC) Model. In addition, we have also contributed a method to determine the balanced threshold level of the received signal strength (RSS) from macro base station (BS). The balanced threshold level provides equal load distribution of the mobile users to the macro and femto BSs. The balanced threshold level is evaluated based on the distant location of the femto cells for small scaled networks. Numerical analysis shows that threshold level above the balanced threshold results in higher load distribution of the mobile users to the femto BSs.
△ Less
Submitted 11 July, 2012;
originally announced July 2012.