[email protected] Admission Helpline - 8010700500 / 9887313330

Paper Publications


JOURNAL

Year 2020

 

  • Das R et.al “HTMS:Fuzzy based Hierarchical Trust Management Scheme in WSN”, Wireless Personal Communications, Springer Journal, DOI:10.1007/s11277-020-07092-w (SCI Index Journal) [impact factor-1.72]
  • G. Uma Devi et.al “ANALYSIS OF HYBRID DEEP NEURAL NETWORK WITH MOBILE AGENTS FOR TRAFFIC MANAGEMENT IN VEHICULAR ADHOC NETWORKS “, Distributed Artificial Neural Network: A Modern Approach, ISBN: 978-0-367-46665-7, CRC Press, Taylor and Francis Group

 

 

Year 2019

 

  • Pratiksha Gautam, D. Ansari and S.K Sharma (2019). Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing. International Journal of Information Security and Privacy, 13(1), 59-69. (Published) [Citation-1, Hi Index-11,Impact Factor-0.41][Major Indexing: ESCI, Free Scopus, Google scholar, DBLP].
  • Pratiksha Gautam and Hemraj Saini (2019). A Mutation Operator-Based Scenario for Evaluating Software Clone Detection Tools and Techniques. International Journal of Information Security and Privacy, 13(1), 30-45. (Published)  [Citation-1, Hi Index-11, Impact Factor-0.41][Major Indexing: ESCI, Free Scopus, Google scholar, DBLP]
  • Sethi, Deepak, and Jyoti Anand. “Big data and WBAN: prediction and analysis of the patient health condition in a remote area.” Engineering and Applied Science Research 46, no. 3 Sep. 2019, pp. 248-255, doi: 10.14456/easr.2019.28.
  • Manoj Kumar, Jyoti Khandelwal, Akanksha Chaturvedi “Performace Analysis Of Point Coordination Function To Improve Quality Of Services In IEEE 802.11” ,International Journal For Scientific  Research &Development, Volume 7, Issue 6, In Aug 2019. Impact factor[4.396]
  • Sonali Jain, Jyoti Khandelwal,Vijay Kumar Sharma “Improve Data Security Over Open Channel With Robotic Frame Selection Model”, International Journal Of Information And Computing Science, Issn No: 0972-1347, Volume 6, Issue 10, October 2019. Impact factor [5.2]

 

 

Year 2018

 

  • Pratiksha Gautam and Hemraj Saini (2018). Correlation and Performance Estimation of Clone Detection Tools. International Journal of Open Source Software and Processes (IJOSSP), 9(2), 55-71. (Published)  [Citation-1, Hi Index-7, Impact Factor-0.53] [Major indexing: Free Scopus, DBLP, ACM digital Library, Web of Sciences, Google scholar].
  • Pratiksha Gautam and Hemraj Saini.  “Mutation Testing-based Evaluation Framework for Evaluating Software Clone Detection Tools”, International Journal of Life Cycle Reliability and Safety Engineering. Springer.  vol. xx, no. xx,  pp. xx-xx,  20xx. (Accepted).  [Citation-1, Hi Index-3,Impact Factor-0.13] [Major Indexing:  Google Scholar, CNKI, EBSCO Discovery Service, OCLC, Summon by ProQuest]
  • M. K Sarkar and Sanjay Kumar, “Identify and Resolve Different Types of Data Storage Security Attacks in Cloud Computing”, International Journal of Computer Science and Applications (IJCSA), A Thomson Reuter Journal by Taylor & Francis (Under Review).
  • M. K Sarkar and Sanjay Kumar, “A Survey on Data Storage Security Issues in Cloud Computing”, International Journal of Applied Engineering Research, ISSN: 0973-4562, Volume 13, Issue 8, pp: xx-xx, April, 2018, (Scopus Indexed, UGC approved Journal, No. 64529) (Accepted).

 

 

 

  • M.K Sarkar and Sanjay Kumar, “Analysis of Data Storage Security issues in Cloud Computing using Hybrid Encryption Scheme” International Journal of Advancement in Engineering, Management & Applied Science, ISSN: 2349-3224, Volume 5, Issue 4, pp: 117-122, April, 2018 (UGC approved Journal, No 63082) 

 

 

 

  •  Deepak Sethi, Jyoti Anand, “A Comparative Analysis of Hierarchical Routing for Precision Agriculture”, International Journal of Computer & Mathematical Sciences (IJCMS), Vol. 7, Feb. 2018, pp. 1-5, ISSN 2347- 8527.
  • Jyoti Anand, Deepak Sethi, “Patient Monitoring System using Enhanced EERDT and SIMPLE Routing Protocols in WBAN: An E-Governance Perspective”, Stances of E-Government: Policies, processes and Technology, CRC Press Taylor & Francis Group, ch-15(pp. 155-166), DOI: https://doi.org/10.1201/9780203731451 (Book Chapter)

 

 

Year 2017

 

  • Pratiksha Gautam and Hemraj Saini (2017). Non-Trivial Software Clone Detection Using Program Dependency Graph. International Journal of Open Source Software and Procsses (IJOSSP), 8(2), 1-24. (Published)  [Citation-1, Hi Index-7, Impact Factor-0.53][Major Indexing: Free Scopus, Google scholar, DBLP]

 

 

 

  • Pratiksha Gautam and Hemraj Saini (2017). A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security. International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 8 (1), 34-47 (Published)  [Citation-1, Hi Index-7,Impact Factor-0.13][Major Indexing: ESCI, Free Scopus, Google scholar, DBLP]
  • Pratiksha Gautam and Hemraj Saini “Mutation-Based Editing Taxonomy of Different Types of Software Clones”, International Journal of Information Technology and Web Engineering (Under Review) [Citation-NA, Hi Index-10, Impact Factor-0.24][Major indexing: ESCI, Scopus, ESCI, DBLP, ACM digital Library, web of sciences, Google scholar].
  •  Pratiksha Gautam, Raj Kumar Sah, and Saniul Ahsan (2017). “A Survey in Recent Trends and Techniques in Image Segmentation” International Journal of Scientific and Research Publication 7(11) (ISSN: 2250-3153) 319-324. (Published) [Citation-1, Hi Index-1, Impact Factor-NA][Major Indexing: Google scholar, DBLP].
  • S. Pareek, A. Gautam, R.Dey, “Different Type Network Security Threats and Solutions, AReview”, in IPASJ International Journal of Computer Science (IIJCS), May 2017.
  • Jyoti Khandelwal, Manoj kumar,   “A REVIEW PAPER ON BIG DATA TECHNOLOGIES AND PLATFORMS”, INTERNATIONAL JOURNAL OF CREATIVE RESEARCH THOUGHTS (IJCRT), ISSN: 2320-2882, Volume.5, Issue 12, Page No pp.79-81, December – 2017, Impact Factor[5.97].

 

 

Year 2016

 

  •  R. Dey, H.N. Saha, “Secure Routing Protocols for Mobile Ad-Hoc Network (MANETs) –A Review”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Vol.5, Issue 1, pp.74-79, 2016.

 

 

 

  • R.Dey, H.N.Saha, “Different Routing Threats and its Mitigations Schemes for Mobile ad-hoc Networks (MANETs) –A Review”, IPASJ International Journal of Electronics & Communication (IIJEC), Vol4, Issue 3,pp. 27-38, 2016.

 

 

 

  • Hriday Banerjee, Animesh Kairi, “Study on Li-Fi Technology: Obstacles and Potentials”,    International Journal of Engineering Science and Computing, April 2016, DOI 10.4010/2016.974, ISSN 2321 3361 © 2016 IJESC Citation-0, Hi Index-0, Impact Factor-5.611]
  •  Jyoti Anand, Deepak Sethi, “A Study on various routing techniques & QoS issues in WBAN”, Mody University International Journal of Computing and Engineering Research, Vol. 1, December 2016, pp. 11-15, ISSN: 2456- 9607.

 

 

Year 2015

 

  • Sauvik Bal, “Light Fidelity For Position Detection”, IJRET: International Journal of Research in Engineering and Technology [eISSN: 2319-1163 | pISSN: 2321-7308], DOI: 10.15623/ijret.2015.0401001, Volume 04, P:1 – P:4, Issue 01 of January 2015. [Citation-0, Hi Index-0, Impact Factor-0]

 

 

 

  • Saikat Roychowdhury, Sauvik Bal, Kaushik Banerjee, “ Direction Based Routing in Vehicular Ad-hoc Netwoks”,  International Journal of Scientific & Engineering Research [ ISSN 2229-5518], Volume 6, Issue 4, P:29 – P:32. April-2015.[Citation-0, Hi Index-0, Impact Factor-0]

 

 

 

  • Sauvik Bal, Kaushik Banerjee, “Dynamic Resource Reservation and Congestion Control in Real Time Communication System”, International Journal of Engineering Research and General Science [ISSN 2091-2730], Volume 3, Issue 2, Part 2, P:456 – P:459. March-April, 2015. [Citation-0, Hi Index-0, Impact Factor-0]
  • Arup Banik, Sharmista Pattander, Sagarika Ghosh; “Comparative Study of Different Topology of Cooperative Content Distribution Using Femtocell”; 2015 IJIRSET 2nd National Conference on Emerging Technology and Applied Sciences-2015 (NCETAS 2015); Volume 4, Special Issue 9, July 2015; ISSN (Online) : 2319 – 8753, ISSN (Print) : 2347 – 6710. [Citation-0, Hi Index-0, Impact Factor-0]

 

 

 

  • M. K Sarkar, V S Dhaka and T. Chatterjee, “Steganographic Approach to Ensure Data Storage Security in Cloud Computing Using Huffman Coding (SAHC)” IJCSN International Journal of Computer Science and Network, ISSN: 2277-5420, Volume 4, Issue 2, pp: 198-207, April 2015.

 

 

 

  • KamnaKumari, JyotiKhandelwal, Vijay Kumar Sharma, “A Survey On Vector Based Technique In Underwater Network” International Journal of Engineering, Management & Sciences (IJEMS) ISSN-2348 –3733, Volume-2, Issue-9, September 2015.Impact factor[2.09]
  • Kamnakumari, JyotiKhandelwal, Vijay Kumar Sharma, ” To Increase The Efficiency Of Underwater Network Using Vector Based Technique “,International Journal of Advanced Computer Research and Networks ,ISSN-2278-0658 ,Volume -3, Issue-4 , April 2015.

 

 

Year 2014

 

  • Kaustab Pal, Rupayan Das, Rahul Sourav Singh, Dipta Mukherjee, “A steganographic Approach to Data Obfuscation using Random Keyboard Mapping Technique”, International Journal of Computer Applications(0975-8887), vol 105 no 11,[ Citations , h-index , impact factor]
  • Rahul Sourav Singh, Rupayan Das, Dipta Mukherjee, Pranay Bothra, “RDR cube cipher an extension of Vigenere Cipher”, IOSR Journal of Computer Engineering, e ISSN- 2278-0661, p ISSN – 2278-8727, Volume-16, Issue-2, ver III (mar- Apr. 2014), PP 64-71,[ Citations 1, h-index , impact factor]
  • Angshuman Khan,Rupayan Das, “Novel Approach of Multiplier Design using ancient Vedic Mathematics”,Springer series of Advances in Intelligent Systems and Computing(AISC),Volume-340,pp.265-272,DOI:10.1007/978-81-322,247-7_28,January,2015. [Citations-3, h-index-0, impact factor-0] (Book Chapter)
  • Sauvik Bal, Kaushik Banerjee, “Routing Based On Receiver Feedback With Resource Reservation In Real Time Communication”, International Journal of Innovative Research in Advanced Engineering [ISSN: 2349-2163], Volume-1, P:263 – P:267, Issue-10 of November 2014. [Citation-0, Hi Index-0, Impact Factor-0]
  • Sheuli Maity, Krishna Kanta Maiti, Sagarika Ghosh; “GRAPHICAL MODEL OF GENES: A REVIEW”; 2014  IJIRSET 1st  National Conference on Emerging Technology and Applied Sciences-2014 (NCETAS 2014); Volume3, Special Issue 2, February 2014, ISSN (Online) : 2319 – 8753, ISSN (Print) : 2347 – 6710. [Citation-0, Hi Index-0, Impact Factor-0]
  • R Chakraborty, S Basak, JK Mandal, “An FPGA Based Crypto Processor through Triangular Modulo Arithmetic Technique (TMAT)“ International Journal of Multidisciplinary in Cryptology and Information Security Citation-0, Hi Index-0, Impact Factor-0]
  • M. K Sarkar and T. Chatterjee, “Enhancing Data Storage Security in Cloud Computing Through Steganography”, ACEEE International Journal on Network Security, ISSN: 2152-5064, Vol. 5, Issue. 1, pp: 13-19, Jan 2014.

 

 

Year 2013

 

  • M. K Sarkar, T. Chatterjee and D. Mukherjee, “Reverse Engineering: An Analysis of Static Behavior of Object Oriented Programs by Extracting UML Class Diagram”, International Journal of Advanced Computer Research, ISSN: 2249-7277, Vol. 3, Issue 12, pp. 135-141, Sept. 2013,[ Citations 7, h-index , impact factor]

 

 

 

  • Kaustab Pal,Rupayan Das,Rahul Sourav Singh,Dipta Mukherjee, “A Steganographic Approach to Data Obfuscation using Random Keyboard Mapping Technique”, International Journal of Computer Applications 105(11):35-37,DOI: 10.5120/18424-9742,November 2014. [Citations-0, h-index-0, impact factor-3.12]
  • Rahul Sourav Singh,Rupayan Das, Dipta Mukherjee,Prannay Bothra , “RDR cube cipher an extension to  Vignere Cipher”,IOSR Journal of Computer Engineering(IOSR-JCE) e-ISSN:2278-0661,p-ISSN:2278-8727 Volume 16,Issue 2,Ver.III(Mar-Apr.2014),PP 64-71. [Citations-1, h-index-0, impact factor-3.712]
  • M. K Sarkar, T. Chatterjee and D. Mukherjee, “Reverse Engineering: An Analysis of Static Behavior of Object Oriented Programs by Extracting UML Class Diagram”, International Journal of Advanced Computer Research, ISSN: 2249-7277, Vol. 3, Issue 12, Sept. 2013.

 

 

 

  • M. K Sarkar and T. Chatterjee, “Reverse Engineering: An Analysis of Dynamic Behavior of Object Oriented Programs byExtracting UML Interaction Diagram”, International Journal of Computer Technology & Applications, ISSN: 2229-6093, Vol. 4, Issue 3, pp. 378 -383, May-June 2013.

 

 

 

  • T. Chatterjee and M. K Sarkar, “Sixth Sense Technology Has Potential to Become the Ultimate “Transparent” User Interface for Accessing Information about Everything Around Us”, International Journal of Report and Opinion, ISSN: 1553-9865, Vol. 5, Issue 4, pp:1-7, ISSN: April 2013.

 

 

Year 2012

 

  • Moutushi Singh, Rupayan Das ,“Survey of Different techniques to Detect wormhole attack in wireless sensor network” International Journal of Scientific & Engineering Research (IJSER), Volume 3, Issue 10, October-2012 ISSN 2229-5518. [Citations-11, h-index-1, impact factor-1.4]

 

 

CONFERENCE

Year 2019

 

 

  •  R. Das et al., “Encryption in MicroSD Card Reader or USB Data Storage Devices,” 2019, 9th Annual Information Technology, Electromechanical Engineering and Microelectronics Conference (IEMECON), Jaipur, India, 2019, pp. 232-236. doi: 10.1109/IEMECONX.2019.8877012

 

 

 

  • Anurag Sharma, Jyoti Khandelwal, Mukesh Kumar Choudhary,”Analysis Of Modified LEACH Protocol In Wireless Sensor Network”, ICCCT2019, RIET,Jaipur, 2019-08-31.

 

 

Year 2018

 

  • Das R., Singh M., Majumder K. (2019) “SGSQoT: A Community-Based Trust Management Scheme in Internet of Things.” In: Chakraborty M. Chakrabarti S., Balas V., Mandal J. (eds) Proceedings of International Ethical Hacking Conference 2018. Advances in Intelligent Systems and Computing, vol 811. Springer, Singapore, DOI: https://doi.org/10.1007/978-981-13-1544-2_18, Print ISBN: 978-981-13-1543-5, Online ISBN: 978-981-13-1544-2, pp.209-222. [Citations-0, h-index-0, impact factor-0] (Book Chapter)
  • Rupayan Das, SutapaKundu , ShankhadeepMallick, MrinalKanti Sarkar, Moutushi Biswas, KoushikMajumder, Sanjay Kumar “Ltc: A Location and Trust Based cluster head selection scheme in Wireless Sensor Network”, 12th INDIACom; INDIACom-2018; IEEE Conference ID: 42835 2018 5th International Conference on “Computing for Sustainable Global Development”, 14th – 16th March, 2018 BharatiVidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA); ISSN 0973-7529; ISBN 978-93-80544-28-1; pp.3175-3180. [Citations-0, h-index-0, impact factor-0]
  • Rahul Sharma, Rupayan Das, et.al, “USB LEVEL DATA SECURITY USING CRYPTOGRAPHIC APPROACH”, 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC),Las Vegas, NV, USA, 8th-10th Jan,2018, DOI: 10.1109/CCWC.2018.8301636, INSPEC Accession Number: 17615253, pp.861-866. [Citations-0, h-index-0, impact factor-0]
  • Surajit Sur, Rupayan Das, et.al, “A Technical study on wireless body area network with its application”, 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC),Las Vegas, NV, USA, 8th-10th Jan,2018, DOI: 10.1109/CCWC.2018.8301637,INSPEC Accession Number: 17615246, pp.867-873. [Citations-0, h-index-0, impact factor-0]
  • SauvikBal, SupriyoMahanta, LopaMandal, Ranjan Parekh; “Bilingual machine translation: English to Bengali”; eHaCON-2018: International Ethical Hacking Conference, 2018. (Book Chapter)
  • Md J. Moatasimbillah, M. K. Sarkar, S. Dey, S. Ray, N. Saha, R. Dey, S. Kumar, “Star Topology Implementation For Wireless Sensor Network: An Approach”, 2018 5th International Conference on “Computing for Sustainable Global Development”, March, 2018, New Delhi (INDIA).
  • S. Basu, R. Dey, et.al “A cloud based autonomous multipurpose system with self-communicating bots and swarm of drones”, 8th IEEE Annual Computing and Communication Workshop and Conference (CCWC), 2018, Jan 2018, Las Vegas, NV, USA. 
  • S. Basu, R. Dey, et.al, “A low cost fully autonomous GPS (Global Positioning System) based quad copter for disaster management” ”, 8th IEEE Annual Computing and Communication Workshop and Conference (CCWC), 2018, Jan 2018, Las Vegas, NV, USA. 
  • AnuragSharma,JyotiKhandelwal, AmitBairwa ,”Analysis Of Modified Low Energy Adaptive Clustering Hierarchy Protocol In Wireless Sensor Network”, International Conference On Recent Trends In Multi-Disciplinary Research In A.P.C.Mahalaxmi College For Women, 2018-07-18

 

 

Year 2017

 

 

  • PratikshaGautam and Hemraj Saini (2017),  “A Hybrid Approach for Detection of Type-1 Software Clones”,  In 4th International conference on Signal Processing, Computing and Control (ISPCC-2017), IEEE, Jaypee University of Information Technology, Waknaghat, Solan, HP, India, pp. 279-282 (Published)  [Citation-1, Hi Index-4, Impact Factor-NA][Major indexing: Scopus, Conference Proceedings Citation Index]
  • .PratikshaGautam and Hemraj Saini (2017). “Type-2 Software Cone Detection Using Directed Acyclic Graph”. 4th  IEEE  International conference on Image Information Processing (ICIIP -2017), Jaypee University of Information Technology, Waknaghat, Solan, HP, India, (December 2017), pp. 205-208(Published)  [Citation-1, Hi Index-4, ,Impact Factor-NA][Major indexing: Scopus, Conference Proceedings Citation Index]
  • UttamNarendraThakur,SamsubhraMallick, Rabindra Mahan Moitra, MayukhKotal, SakibZakaria, AnirbanChakraborty, SayakPramanik, Dipta Mukherjee, Chiradeep Mukherjee, “FPGA Based Effecient Architecture for Conversion of Binay to Residue Number System”, Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2017 8th IEEE Annual, INSPEC Accession Number: 17392069, DOI: 10.1109/IEMCON.2017.8117238.[ Citations , h-index , impact factor ]
  • ShopanDey, Murshed Nawaz Kamal, Soumya Dutta, Abhishek Tiwari, Santanu Ray, Md Jamil Moatasimbillah, NabanitSaha, NilkanthaAdhikary, Dipta Mukherjee, SomenNayak, RatulDey, SouvikSaha, “Ad-hoc Networked UAVs as Aerial Mesh Network for disaster management application and remote sensing: An approach”, Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2017 8th IEEE Annual, INSPEC Accession Number: 17392039, DOI: 10.1109/IEMCON.2017.8117231,[ Citations , h-index , impact factor]
  • HimanshuThakuria, Aritra Dutta, Antara Sarkar, ArupaGhosal, RounakSaha, SayakPramanik, Dr. SucharitaMitra, Chiradeep Mukherjee, UttamNarendra Thakur, Dipta Mukherjee, “A Comparative Study of Vein Pattern Recognition for Biometric Authentication”, Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2017 8th IEEE Annual, INSPEC Accession Number: 17392019, DOI: 10.1109/IEMCON.2017.8117235,[ Citations , h-index , impact factor]
  • SomenNayak, Kunteya Shaw, Jayashish Choudhury, AnirbanChakraborty, Asif Iqbal, TapasundarKar, Sumit Kumar Bera, SouravSaha, Dipta Mukherjee, RatulDey, ShopanDey, “Unmanned Multifunction Robot for Industrial and Military Operation over Resource Constrained Networks: An approach”, Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2017 8th IEEE Annual, INSPEC Accession Number: 17392061, DOI: 10.1109/IEMCON.2017.8117221,[ Citations , h-index , impact factor]
  • RishmitaSaha, MahaswetaKundu, Madhuparna Dutta, Rahul Majumder, Debosmita Mukherjee, SayakPramanik, UttamNarendra Thakur, Chiradeep Mukherjee, Dipta Mukherjee, “A brief study on evolution of iris recognition system”, Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2017 8th IEEE Annual, INSPEC Accession Number: 17410527,[ Citations , h-index , impact factor]
  • Dipta Mukherjee, SumanGodara, Atanu Kumar Das, ShopanDey, Saroj Kumar, Rakibul Islam, AbhishekPati, NagarjunDhar, UttamNarendraThakur,SayakPramanik, Chiradeep Mukherjee, “Unique Digitized Activity Signature for Human Authentication”, Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2017 8th IEEE Annual, INSPEC Accession Number: 17392038, DOI: 10.1109/IEMCON.2017.8117243,[ Citations , h-index , impact factor]
  • Mohit Agarwal, Abhijit Das, Subham Kumar, Swaniket Chowdhury, Lalbabu Kumar, Chiradeep Mukherjee, SayakPramanikD, ipta Mukherjee, UttamNarendra Thakur, “Layered T Parity Generators using Quantum-dot Cellular Automata”, Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2017 8th IEEE Annual, INSPEC Accession Number: 17392097, DOI: 10.1109/IEMCON.2017.8117244,[ Citations , h-index , impact factor]
  • Rupayan Das, Dipta Mukherjee, Rahul Sourav Singh, SumanGodara, Saroj Kumar, “DWTAS:A Robust Discrete Wavelet Transform approach towards Audio Steganography”, Industrial Automation and Electromechanical Engineering Conference (IEMECON), 2017 8th Annual,INSPEC Accession Number: 17286760,DOI: 10.1109/IEMECON.2017.8079588,[ Citations , h-index , impact factor]
  • Rupayan Das, Dipta Mukherjee , Rahul Sourav Singh, Suman Godara, Saroj Kumar, “ DWTAS: A Robust Discrete Wavelet Transform approach towards Audio Steganography”, UEM-CONGRESS, 2017, Thailand , Bangkok. [Citations-0, h-index-0, impact factor-0]
  • Punit Chaudhury, Susmita Dhang, Monpreet Roy, Saurav Deb, Jyotirmoy Saha, Aditya Mallick, Sauvik Bal, Saraswata Roy, Mrinal Kanti Sarkar, Rupayan Das, “ACAFP: Asymmetric key based Cryptographic Algorithm using four prime numbers to secure message communication- A review on RSA Algorithm”, IEME-CONGRESS, 2017, Thailand , Bangkok [Citations-3, h-index-0, impact
  • H. Banerjee, R. Dey et.al “Movie Recommendation System using Partical Swam optimization” in proc. of The 8th Industrial Automation and Electromechanical Engineering Conference (IEMECON 2017), IEEE Xplore Digital Library, August 2017. Bangkok, Thailand
  • S. Chatterjee , R. Dey et.al ,”A Load Balanced Routing Protocol for Mobile Sensor Network”, in proc. of in proc. of The 8th Industrial Automation and Electromechanical Engineering Conference (IEMECON 2017), IEEE Xplore Digital Library, August 2017. Bangkok, Thailand
  • K. Verma, S. Kumar, S. Prakash, A. Singh, C. Chatterjee, B. Ghosh, A. Patra, H. N. Saha, S. Nayak, S. Dey, R. Dey, “Multi-operational home automation system using IOT”, An approach”, 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2017, Vancouver, BC, Canada.
  • R. Agarwal, N. Ladha, M. Agarwal, K. K. Majee, A. Das, S. Kumar, S. K. Rai, A. K. Singh, S. Nayak, S. Dey, R. Dey, H. N. Saha, “Low cost ultrasonic smart glasses for blind”, An approach”, 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2017, Vancouver, BC, Canada.
  • S. Nayak, K. Shaw, J. Choudhury, A. Chakraborty, A. Iqbal, T. Kar, S. K. Bera, S. Saha, D. Deb, D. Roy choudhury, D. Mukherjee, R. Dey, S. Dey, “Unmanned multifunction robot for industrial and military operation over resource constrained networks: An approach”, 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2017, Vancouver, BC, Canada.
  • S. Nayak, S. Das, S. Das, S. Sarker, P. Sarker, A. Dey, A. Sinha, J. Saha, A. Banerjee, N. Saha, S. Chowdhury, D. Chowdhury, P. Pradhan, S. A. Ali, A. Saha, R. Dey, S. Dey, “An application for end to end secure messaging service on Android supported device”, 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2017, Vancouver, BC, Canada.
  • S. Dey, T. Kar, A. Iqbal, D. Roychoudhury, S. Laha, A. Chowdhury, A. Chakraborty, K. Shaw, S. Nayak, S. Basu, R. Guhathakurta, R. Dey, “An IoT framework for smart power management system”, 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2017, Vancouver, BC, Canada.
  • R. Agarwal, N. Ladha, M. Agarwal, K. K. Majee, A. Das, S. Kumar, S. K. Rai, A. K. Singh, S. Nayak, S. Dey, R. Dey, H. N. Saha, “Low cost ultrasonic smart glasses for blind”, 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2017, Vancouver, BC, Canada.
  • SomenNayak,SurajitDas,SaikatDas,SiddharthSarker,preyoshiSarkar,AniketDey,AnirbanSinha,JyotirmoySaha,AniketBanerjee,NabanitSaha,sugataChowdhury,debanjanChowdhury,Priyam Pradhan” An application for end to end secure messaging service on Android supported device” ,IEMCON 2017,Electronics ISBN:-978-1-5386-3371-7,NOVEMBER 2017,Vancouver,BC,Canada.
  • Jyoti Anand, Deepak Sethi, “Comparative Analysis of Energy Efficient Routing in WBAN”, 3 rd International Conference on Computational Intelligence & Communication Technology (CICT), IEEE, Feb. 2017, pp. 1-6 [Citations-7].

 

 

Year 2016

 

  • Pratiksha Gautam and Hemraj Saini (2016), “Various Code Clone Detection Techniques and Tools: A Comprehensive Survey”, Proceedings of the International conference on Smart Trends for Information and Knowledge computing, (CCIS’16), Springer, Singapore, pp. 255-267 (Published)  [Citation-5, Hi Index-35,,Impact Factor-0.35][Major indexing: Scopus, DBLP, Google scholar].
  • Atreyee Kar, Kathakali Sur, Suman Godara, Santanu Basak, Dipta Mukherjee, Aninda Sankar Sukla, Rupayan Das, Ritwika Choudhury, “Secuirity in cloud storage: An enhanced technique of data storage in cloud using RNS”, Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), IEEE Annual, INSPEC Accession Number: 16525522, INSPEC Accession Number: 16525522,[ Citations , h-index , impact factor]
  • Aritra Roy, Supriyo Mahanta, Mallika Tripathy, Sagarika Ghosh, Sauvik Bal; “Health condition identification of affected people in post disaster area using DTN”; 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2016.  [Citation-0, Hi Index-1, Impact Factor-0]
  • Aritra Roy, Sauvik Bal, Sagarika Ghosh; “Digitally Integrated Store Commerce System”; ERCICA 2016: Emerging Research in Computing, Information, Communication and Applications; pp 705-711, 2016.[Citation-0, Hi Index-0, Impact Factor-0]
  • A. Kundu, R. Dey et.al, “On Demand Secure Routing Protocol Using Convex-Hull & K-Mean Approach In Manet” in proc. of 7th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON -2016), IEEE Xplore Digital Library, October 2016, pp. 1-5. 
  • D. Mukherjee, R. Dey et.al, “Disaster forecasting using convex hull & K-median approach”, in proc. of 7th Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2016 (IEMCON 2016), IEEE Xplore Digital Library, October 2016, pp. 1-5
  • .Abhijit kundu, Ritika Mishra,Atreyee Kar,Sagarika Debchoudhury,Somen Nayak,”Ondemand Secure Routing Protocol Using Convex Hall & K-means approach in MANET”,UEMCON-2016, Electronic ISBN 978-1-5090-1496-5,OCTOBER 2016,Newyork,USA.
  • .M. K Sarkar and Sanjay Kumar, “Ensuring Data Storage Security in Cloud Computing Based on Hybrid Encryption Schemes” 2016 IEEE Fourth International Conference on Parallel, Distributed and Grid Computing-PDGC-2016 on Dec 22-24, 2016, Shimla, India, IEEE Xplore, ISBN: 978-1-5090-3669-1
  • .M. K Sarkar and Sanjay Kumar, “A Framework to Ensure Data Storage Security in Cloud Computing” 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference-UEMCON-16 on Oct. 22-24, 2016, USA, IEEE Xplore, pp: 1-4, DOI: 10.1109/ UEMCON.2016.7777827.
  •  Jyoti Anand, Deepak Sethi, “A Study on various routing techniques & QoS issues in WBAN”, National Conference on Recent Trends in Computing and Communication Technologies (RCCT), Sep. 2016, pp. 51-53.

 

 

Year 2015

 

  • Rupayan Das, Soumajit Das, Debdeep Majumder , Sauvik Bal, Mrinal Kanti Sarkar, Anirban Chakraborty,Koushik Majumder “ Performance Analysis of  various attacks under AODV in proposed WSN & MANET Using OPNET 14.5”, UEMCON-2016, 7th IEEE Annual Ubiquitous Computing , Electronics & Mobile Communication conference, New York, USA, 20-22 October 2016, DOI: 10.1109/UEMCON.2016.7777831. [Citations-4, h-index-1, impact factor-0]
  • Rohan Raj Gupta , Gaurav Mishra , Subham Katara, Arpit Agarwal , Mrinal Kanti Sarkar,Rupayan Das, Sanjay Kumar, “Data Storage Security in Cloud Computing Using Container Clustering”, UEMCON-2016, 7th IEEE Annual Ubiquitous Computing , Electronics & Mobile Communication conference, New York, USA, 20-22 October 2016, DOI: 10.1109/UEMCON.2016.7777913. [Citations-7, h-index-1, impact factor-0]
  • Aninda Shankar Shukla,Rupayan Das,Atreyee Kar, Dipta Mukherjee, Suman Godara, Ritwika Choudhury , Santanu Basak, Kathakali Sur “ SECUIRITY IN CLOUD STORAGE: An Enhanced Technique of Data Storage in Cloud using RNS”, UEMCON-2016, 7th IEEE Annual Ubiquitous Computing , Electronics & Mobile Communication conference, New York, USA, 20-22 October 2016, DOI: 10.1109/UEMCON.2016.7777905. [Citations-0, h-index-0, impact factor-0]
  • Sumanta Kumar Deb, Sauvik Bal, “Power Consumption Optimization of Location Management in PCS Network”, International Journal of Computer Applications [ISSN: 0975 – 8887], DOI: 10.5120/20604-3209, Volume 117 – No.12, P:5 – P:8. May 2015. [Citation-0, Hi Index-0, Impact Factor-0]
  • Sauvik Bal,  Sumanta Kumar Deb, “Shared Parameters with Symmetric Key in E-MAIL Security”, IEMCON 2015, 6th International Conference and Workshop on Computing and Communication, DOI: 10.1109/IEMCON.2015.7344481, P:1-P:4. 15-17 Oct. 2015. Citation-0, Hi Index-0, Impact Factor-0]
  • S. Banerjee, A. Majumdar, H. N. Saha and R. Dey “Modified Ant Colony Optimization (ACO) based routing protocol for MANET,” in proc. of 6th International Conference and Workshop on Computing and Communication (IEMCON -2015), IEEE Xplore Digital Library, October 2015, pp. 1-7.
  • R. Dey, and S. Chakraborty, “Convex-hull & DBSCAN clustering to predict future weather”,Computing and Communication (IEMCON), International Conference and Workshop on, IEEE,pp.1-8 ,Oct 2015

 

 

Year 2014

 

  • Kaustab Pal, Rupayan Das, Rahul Sourav Singh, Dipta Mukherjee, “A steganographic Approach to Data Obfuscation using Random Keyboard Mapping Technique”, International Journal of Computer Applications(0975-8887), vol 105 no 11,[ Citations , h-index , impact factor]
  • Anindya Shankar Shukla,Rupayan Das,Rahul Sourav Singh,Dipta Mukherjee, “Barcipher: A Robust technique for data hiding using the concept of Barcode”, International Science & Technology Congress, ISBN-9789351072485, pg- 264-268,[ Citations , h-index , impact factor]
  • Moutushi Singh, Rupayan Das, Koushik Majumder  “KT3F: A Key based Two Tier Trust Management filtering scheme for  intrusion detection in Wireless Sensor Network”,Proceedings of  the Second International Conference on  Computer and Communication Technologies, Advances in Intelligent Systems and Computing (Springer Series) , Volume 379, pp 679-690. DOI 10.1007/978-81-322-2517-165. [Citations-3, h-index-0, impact factor-0]
  • Angshuman Khan,Souvik Saha,Asmita Chakraborty,Rupayan Das, “Digital Multiplier to Multiply Special Integers using ancient Vedic Mathematics”,International Conference on Inter Disciplinary Research in Engineering and Technology 2015(ICIDRET2015),pp209-213, ISBN:978-81-929742-5-5. [Citations-1, h-index-0, impact factor-0]
  • Mrinal Kanti Sarkar,Rupayan Das, Dr. V S Dhaka, “Symmetric Key Based Design approach for Data Scurity in Cloud Computing” “National Conference on Current Research Trends in Cloud Computing and Big Data(CRTCCBD-2015)”February 2015[Citations-0, h-index-0, impact factor-0]
  • R. Dey, S. Chakraborty, and L. Dey, “Weather Forecasting Using Convex Hull & K-Means Technique- An Approach”, IEMCON , ELSEVIER, pp. 288-295,August 2014

 

 

Year 2013

 

  • Dipta Mukherjee, Anandarup Mukherjee, Somen Nayak, “A Hybrid Stegano- Cryptographic     Approach to Data Obfuscation Using LSB Technique”, IEMCON-2013, ISBN 978-81-923777-9-7, page 165-169,AUGUST 2013,[ Citations 0, h-index  , impact factor]
  • Anindya Shankar Shukla,Rupayan Das,Rahul Sourav Singh,Dipta Mukherjee “Bar Cipher: A Robust technique for data hiding using the concept of Barcode”,Procedings of 1st International Science & Technology Congress 2014,Elsevier publication,ISBN: 9789351072485. [Citations-0, h-index-0, impact factor-0]
  •  Jyoti Khandelwal “Image Processing To Reduce Data Redundancy”, National Conference On Recent Advancements In Intelligent Computing System,2013-09-17

 

 

Year 2011

 

  • PratikshaGautam, B.R Ambedkar, Ashwani Gupta and SS. Bedi(2011). “An Efficient Method to Factorize the RSA Public Key Encryption”In Proceedings of IEEE International Conference on Communication Systems and Network Technologies (CSNT), Jammu, India, 2011, pp. 108-111 (Published) [Citation-29, Hi Index-13, Impact Factor-0.25][Major indexing: Scopus, DBLP, Google scholar].
  • G.Uma Devi  “ Degree Distributions using Online Detection of Network Traffic Anomalies ”, National Conference on Emerging Technologies in Computers,  Sri Muthumaran Institute of Technology, Chennai,Feb’2011 .

 

 

Year 2010

 

  • G.Uma Devi “Identifier-Based Access Control Makes Network Access Control” A National Conference on High Performance Networking &Computing, SRM University, Chennai, Feb’2010
  • G.Uma Devi  “ Wireless Sensor Networks Using Middleware Based on Fuzzy Logic ”, First national Conference on Emerging Technologies in Computers,  Sri Muthumaran Institute of Technology, Chennai,Feb’2010 .
  • G.Uma Devi  “H-TOSSIM: Extending TOSSIM with Physical Nodes”, Third National Conference on Emerging Trends in Engineering and  Technology, Raja Rajaeswari Engineering College, Chennai, March ’2010.

 

 

Year 2009

 

  • G.Uma Devi “Adaptive Down-Sampling Design in DCT and Constrained Least squares up conversion for Images” A National Conference on Emerging Trends in Computing and Information Technology, Srinivasa Institute of Engineering and Technology, Chennai,March’2009.
  • G.Uma Devi “A Multiresolution Stochastic Level Set Method For Image Segmentation” A National Conference on Emerging Trends in Engineering and  Technology, Raja Rajaeswari Engineering College, Chennai,April’2009.
  • G.Uma Devi  “A Multiphase Level For Image Segmentation Using The Mumford And Shah Model” A National Conference on Excellent Challenges in Information Technology, Annai Matheammal Sheela  Engineering College, Namakkal,April’2009.

 

 

Year 2008

 

  • G.Uma Devi  “Learning Discriminative Canonical Correlations for Object Recognition with Image Sets”  Third National Conference on Emerging Trends in Computer Science & Engineering, K.S.Rangasamy College of Technology, Thiruchencode, Feb’2008.
  • G.Uma Devi and G. Kavitha “ Object Recognition with Image Sets using DCC”  First National Conference on Advanced Control Techniques in Electrical Science, S.A Engineering College, Chennai,  March ’2008.
  • G.Uma Devi,  “Object-Recognition using Discriminative Canonical Correlations ”  A National Conference on Recent Trends in Advanced Computing, K.L.N. College of  Information Technology, Pottapalayam, April’2008.
  • G.Uma Devi  “Anisotropic 3-D wavelet coding to hyper spectral Image Compression” A National Conference on Multimedia, Image Processing and Machine Vision, Rajalakshmi Engineering College, Chennai.Dec’2008.

 

 

News and Achievements


Virtual Global Artificial Intelligence Conference conducted by UEM Jaipur
Upasana Chakraborty | 2020-09-12 21:23:53


congratulations to Tanmoy Karmakar, 2nd year B.Tech CSE student of UEM Jaipur for having acquired internship offer as flutter developer from Ivypods Technology Pvt. Ltd.
Upasana Chakraborty | 2020-06-20 22:27:46


Panel Discussion organized by the University of Engineering & Management (UEM), Jaipur* amongst the Directors/Principals of different schools of Rajasthan on 22nd June 2020
Upasana Chakraborty | 2020-06-20 22:25:39


congratulations to Bhagwan Singh, 1st year MBA student (passing to 2nd year now) of UEM Jaipur for having acquired job offer from Shriram City Group.
Upasana Chakraborty | 2020-06-17 20:51:59


Press Releases


News published in Rajasthan Patrika dated 5th July, 2020 regarding Ph.D program at the UEM Jaipur



News releases in leading newspapers of Rajasthan regarding UEM Jaipur being awarded 1 out of 12 leading institutes of the country (1st in Rajasthan) with the E-Lead Certificate for providing online learning by QS – the most prestigious award on globe



Press Release in Dainik Bhaskar regarding complete online continuation of classes, laboratories and exams at the UEM Jaipur



Dr. Satyajit Chakrabarti featured in The Bengal Post



Rankings


World champion by developing a gaming console (Amantron Gaming console)

IEEE Maker project, IEEE, USA – 2016


Champion East

NEN (National Entrepreneurship Network) E-Week, 2011-2016


Champions Runner-up Award, West

NEN (National Entrepreneurship Network) E-Week, 2016


Rated Silver A+++ Business School

“Just Careers” Magazine, 2011


Best Debutant Award, West

NEN (National Entrepreneurship Network) E-Week, 2015


3rd amongst all Government & Private Colleges in West Bengal

The Telegraph, 2009


One amonst the two finalists from India by dreveloping their own innovative Car

International BAJA SAE Motosports Competition


Outstanding Engineering Institute in Eastern India

Star News, 2011


1st amongst all students of India including all IITs and NITs

NPTEL program (IIT Kharagpur and IIT Chennai), 2016


Calendar


Contact Us

We'll get back to you soon.


X
Get in Touch