scispace - formally typeset
Search or ask a question
Author

S. Chakrabarti

Bio: S. Chakrabarti is an academic researcher from University of Engineering & Management. The author has contributed to research in topics: Quantum well & Magnetic field. The author has an hindex of 6, co-authored 35 publications receiving 249 citations. Previous affiliations of S. Chakrabarti include University of British Columbia & University of Calcutta.

Papers
More filters
Proceedings ArticleDOI
19 Apr 2004
TL;DR: The paper addresses issues related to internetworking such networks to form scatternets and presents a scAtternet formation algorithm to solve the problem of connecting all the Bluetooth enabled devices in any home or office environment.
Abstract: Ad-hoc networks using Bluetooth enabled devices have piqued the interest of the networking community. Network developers are looking into different means of remotely controlling the devices comprising such networks, so as to have the flexibility to change various device parameters without actually being present near them. We present a method of remotely controlling devices in a Bluetooth enabled environment in the home or office from any part of the world via the Internet. A Web page applet programmed in Java can be accessed from any Java-enabled browser connected to the Internet and is used to control parameters of remote Bluetooth devices. It is also used to display the current state of the Bluetooth devices. A novel application of using Bluetooth devices for remote control is that a passive electronic device can be given processing power simply by connecting a Bluetooth chip to it. Any passive device in the Bluetooth enabled scatternet can have processed data send to it by the program resident in the Web server. The paper addresses issues related to internetworking such networks to form scatternets and presents a scatternet formation algorithm to solve the problem of connecting all the Bluetooth enabled devices in any home or office environment.

77 citations

Journal ArticleDOI
TL;DR: An overview of IDPS is presented, which includes mechanisms for carrying out TCP port scans, Traceroute scan, ping scan and packet sniffing to monitor net-work health detect various types of attacks.
Abstract: The rapid growth of computer networks has changed the prospect of network security. An easy accessibility condition causes computer networks to be vulnerable against numerous and potentially devastating threats from hackers. Up to the moment, researchers have developed Intrusion Detection Systems (IDS) capable of detecting attacks in several available environments. A boundlessness of methods for misuse detection as well as anomaly detection has been applied. Intrusion Prevention Systems (IPS) evolved after that to resolve am-biguities in passive network monitoring by placing detection systems on the line of attack. IPS in other words is IDS that are able to give prevention commands to firewalls and access control changes to routers. IPS can be seen as an improvement upon firewall technologies. It can make access control decisions based on application content, rather than IP address or ports as traditional firewalls do. The next innovation is the combination of IDS and IPS known as Intrusion Detection and Prevention Systems (IDPS) capable of de-tecting and preventing attacks from happening. This paper presents an overview of IDPS followed by their classifications and applications. A new signature based IDPS architecture named HawkEye Solutions has been proposed by the authors. Authors have presented the basic building blocks of the IDS, which include mechanisms for carrying out TCP port scans, Traceroute scan, ping scan and packet sniffing to monitor net-work health detect various types of attacks. Real time implementation results of the system have been pre-sented. Finally a comparative analysis of various existing IDS/IPS solutions with HawkEye Solutions em-phasizes its significance.

32 citations

Journal ArticleDOI
TL;DR: In this paper, the saturation of bipolaron, the species responsible for conduction in polypyrrole (PPy), has been studied using positron annihilation lifetime (PAL) spectroscopy, conductivity, and electron spin resonance (ESR) measurement.
Abstract: Saturation of bipolaron, the species responsible for conduction in polypyrrole (PPy), has been studied using positron annihilation lifetime (PAL) spectroscopy, conductivity, and electron spin resonance (ESR) measurement. It is observed that when strong oxidizing agents are used, the defects are predominantly bipolarons as is evident from the PAL spectroscopic studies coupled with ESR measurements and its saturation occurs right at the onset of oxidation. However, in the case of a mild oxidizing agent, the dominant defects are bipolarons only at higher oxidizing strengths $[g~1.0(N)]$ and no saturation is attained even at the highest strength studied. Conductivity data corroborate the findings.

31 citations

Journal ArticleDOI
TL;DR: The far-reaching impact of some of the most potent disruptive technologies and disruptive innovations sweeping the world today like Digitalisation, Internet, Artificial Intelligence, Robotics, 3D Printing and Renewable Energy are reviewed.
Abstract: This article reviews the far-reaching impact of some of the most potent disruptive technologies and disruptive innovations sweeping the world today like Digitalisation, Internet, Artificial Intelli...

29 citations

Journal ArticleDOI
TL;DR: The Indian healthcare system comprises of public and private healthcare establishments, and different challenges are encountered by the healthcare prof... as mentioned in this paper The challenges encountered by healthcare prof profesional are unique and complex.
Abstract: Healthcare establishments are unique and complex. The Indian healthcare system comprises of public and private healthcare establishments. Different challenges are encountered by the healthcare prof...

21 citations


Cited by
More filters
Patent
02 Jul 2004
TL;DR: In this paper, a system for maintaining synchrony of operations among a plurality of devices having independent clocking arrangements is described, where each task is associated with a time stamp that indicates a time, relative to a clock maintained by the task distribution device, at which group members are to execute the task.
Abstract: A system is described for maintaining synchrony of operations among a plurality of devices having independent clocking arrangements. A task distribution device is to distribute tasks to a synchrony group comprising a plurality of devices to perform tasks distributed by the task distribution device in synchrony. The task distribution device distributes each task to synchrony group members over a network. Each task is associated with a time stamp that indicates a time, relative to a clock maintained by the task distribution device, at which synchrony group members are to execute the task. Each synchrony group member periodically obtains from the task distribution device an indication of current time indicated by its clock, determines a time differential between the task distribution device's clock and its respective clock and determines therefrom a time at which, according to its respective clock, the time stamp indicates that it is to execute the task.

663 citations

01 Jan 2005

454 citations

Journal ArticleDOI
TL;DR: It is found that Turkish tweets carried slightly more positive sentiments towards Syrians and refugees than neutral and negative sentiments, nevertheless the sentiments of tweets were almost evenly distributed among the three major categories.

221 citations

Patent
31 May 2013
TL;DR: In this paper, a user interface is provided to allow a user to group some of the players according to a theme or scene, where each player is located in a zone and when the scene is activated, the players in the scene react in a synchronized manner.
Abstract: In general, user interfaces for controlling a plurality of multimedia players in groups are disclosed. According to one aspect of the present invention, a user interface is provided to allow a user to group some of the players according to a theme or scene, where each of the players is located in a zone. When the scene is activated, the players in the scene react in a synchronized manner. For example, the players in the scene are all caused to play a multimedia source or music in a playlist, wherein the multimedia source may be located anywhere on a network. The user interface is further configured to illustrate graphically a size of a group, the larger the group appears relatively, the more plays there are in the group.

204 citations