{"id":2308,"date":"2016-03-17T03:39:29","date_gmt":"2016-03-16T22:09:29","guid":{"rendered":"https:\/\/uem.edu.in\/uem-jaipur\/?page_id=2308"},"modified":"2020-07-09T01:29:32","modified_gmt":"2020-07-08T19:59:32","slug":"paper-publications","status":"publish","type":"page","link":"https:\/\/uem.edu.in\/uem-jaipur\/department-of-computer-applications\/paper-publications\/","title":{"rendered":"Paper Publications"},"content":{"rendered":"<h3>JOURNAL<\/h3>\n<p><strong>2012<\/strong><br \/>\n1.\tMoutushi Singh, Rupayan Das Survey of Different techniques to Detect wormhole attack in wireless sensor Network International Journal of Scientific &amp; Engineering Research (IJSER), ISSN 2229-5518,pp:200-205, Volume 3, Issue 10,October-2012 <\/p>\n<p><strong>2013<\/strong><br \/>\n2.\tT. Chatterjee and M. K Sarkar, Sixth Sense Technology Has Potential to Become the Ultimate &#8220;Transparent&#8221; User Interface for Accessing Information about Everything Around Us\u009d, International Journal of Report and Opinion, ISSN: 1553-9865, Vol. 5, Issue 4, pp:1-7, ISSN: April 2013.<br \/>\n3.\tMr. Kaushik Banerjee, Mr. Subhas Das, Mr. Rahul Sourav Singh,Mr. Souren Jana Automated Mineral Detection using Sonar Waves\u009d, International of Scientific &amp; Engineering Research(IJSER),ISSN: 22295518, Volume 4,Issue 5, pp.112-115, May,2013<br \/>\n4.\tM. K Sarkar and T. Chatterjee, Reverse Engineering: An Analysis of Dynamic Behavior of Object Oriented Programs by Extracting UML Interaction Diagram\u009d, International Journal of Computer Technology &amp; Applications, ISSN: 2229-6093, Vol. 4, Issue 3, pp. 378 -383, May-June 2013.<br \/>\n5.\tM. K Sarkar, T. Chatterjee and D. Mukherjee, Reverse Engineering: An Analysis of Static Behavior of Object Oriented Programs by Extracting UML Class Diagram\u009d, International Journal of Advanced Computer Research, ISSN: 2249-7277, Vol. 3, Issue 12, Sept. 2013.<\/p>\n<p><strong>2014<\/strong><br \/>\n6.\tM. K Sarkar and T. Chatterjee, Enhancing Data Storage Security in Cloud Computing Through Steganography, ACEEE International Journal on Network Security, ISSN: 2152-5064, Vol. 5, Issue. 1, pp: 13-19, Jan 2014.<br \/>\n7.\tRahul Sourav Singh,Rupayan Das, Dipta Mukherjee,Prannay Bothra , RDR cube cipher an extension to Vignere Cipher\u009d,IOSR Journal of Computer Engineering(IOSR-JCE) e-ISSN:2278-0661,p-ISSN:22788727 Volume16,Issue2,Ver.III(Mar-Apr.2014),PP 64-71.<br \/>\n8.\tKaustab Pal,Rupayan Das,Rahul Sourav Singh,Dipta Mukherjee,\u009dA Steganographic Approach to Data Obfuscation using Random Keyboard Mapping Technique \u009dInternational Journal of Computer Applications 105(11):35-37,DOI: 10.5120\/18424-9742,November 2014.<br \/>\n9.\tPraveen Kumar Sharma, Sourav Saha, Saraswati Kumari -Study and Design of a Shannon-Energy-Envelope based Phonocardiogram Peak Spacing Analysis for Estimating Arrhythmic Heart-Beat&#8221;,International Journal of Scientific and Research Publications- Volume 4, Issue 9, September 2014 Edition.<\/p>\n<p>10.\tWrishin Sarkar, Himadri Nath Saha, Arpita Ghosh, Praveen Kr. Sharma- Modified Greedy Methodology to SolveTravelling Salesperson Problem Using Ant Colony Optimization and Comfort Factor\u009d- International Journal of Scientific and Research Publications- Volume 4, Issue 10, October 2014 Edition.<br \/>\n11.\tWrishin Sarkar, Himadri Nath Saha,Sourav Kumar Dhar, Sandipan Roy Advanced Heuristic Technique For Solving Travelling Salesperson Problem Using Ant Colony Optimization\u009d, IJCSN International Journal of Computer Science and Network, Volume 3, Issue 3,ISSN: 2277-5420,pp.11 June 2014.<\/p>\n<p><strong>2015<\/strong><br \/>\n12.\tM. K Sarkar, R. Das and Dr. V S Dhaka A Symmetric Key Based Framework for Data Security in Cloud Computing, International Journal of Advanced Networking and Applications, ISSN: 0975-0282 Special Issue, Feb-2015.<br \/>\n13.\tT Chatterjee, M. K Sarkar and Dr. V S Dhaka Steganographic Approach to Ensure Data Storage Security in Cloud Computing Using Huffman Coding (SAHC), IJCSN International Journal of Computer Science and Network, ISSN : 2277-5420, Volume 4, Issue 2, pp:198-207, April 2015.<\/p>\n<p><strong>2016<\/strong><br \/>\n16.\tRatul  Dey  and Himadri Nath  Saha  Secure Routing Protocols for Mobile Ad-Hoc Network (MANETs) \u201cA Review\u009d, International Journal of Emerging Trends &#038; Technology in Computer Science (IJETTCS), Vol. 5, Issue 1 ISSN 2278 \u201c 6856 February 2016<\/p>\n<h3>CONFERENCE<\/h3>\n<p><strong>2013<\/strong><br \/>\n1.\tDipta Mukherjee, Anandarup Mukherjee, Somen Nayak A Hybrid Stegano- Cryptographic Approach to Data Obfuscation Using LSB Technique, IEMCON, ISSN: 978-81-923777-9-7, 165-169, Auguest2013.<\/p>\n<p><strong>2014<\/strong><br \/>\n2.\tAnindya Shankar Shukla,Rupayan Das,Rahul Sourav Singh,Dipta Mukherjee Bar Cipher: A Robusttechnique for data hiding using the concept of Barcode\u009d,Procedings of 1st International Science &amp; Technology Congress 2014,Elsevier publication,ISBN: 9789351072485.<br \/>\n3.\tRatul  Dey, Sanjay Chakraborty, Lopamudra Dey, Weather Forecasting using Convex Hull &amp; K-mean Technique an Approach\u009d in proc. of ELSEVIER, IEMCONGRESS-2014, pp. 288-295 <\/p>\n<p><strong>2015<\/strong><br \/>\n4.\tM. K Sarkar and R. Das, Dr. V S Dhaka A Symmetric Key Based Framework for Data Security in Cloud Computing \u009d, in National Conference on Current Research Trends in Cloud Computing &amp; Big Data &#8211; CRTCCBD on Feb 6-7, 2015.<\/p>\n<p>5.\tM. Singh, R. Das, M. K Sarkar, K. Majumder, S. K Sarkar\u009d KT3F: A Key based Two Tier Trust Management Filtering Scheme for Intrusion Detection in Wireless Sensor Network\u009d in International Conference on Computer and Communication Technologies &#8211; IC3T on July 24-26, 2015, AISC series of Springer11156.<\/p>\n<p>6.\tAngshuman Khan,Souvik Saha,Asmita Chakraborty,Rupayan Das,\u009dDigital Multiplier to Multiply Special Integers using ancient Vedic Mathematics,International Conference on Inter Disciplinary Research in Engineering and Technolog2015(ICIDRET2015).<\/p>\n<p>7.\tAngshuman Khan,Rupayan Das,\u009dNovel Approach of Multiplier Design using ancient Vedic Mathematics,Second International Conference on Information systems Design and Intelligent Applications(INDIA-2015),Springer series of Advances in Intelligent Systems and Computing(AISC) Volume-340,pp.265-272,DOI:10.1007\/978-81-322,247-7_28,January,2015.<\/p>\n<p>8.\tRatul  Dey, Sanjay Chakraborty, Convex-hull &amp; DBSCAN clustering to predict future weather\u009d in proc. of 6th International Conference and Workshop on Computing and Communication (IEMCON -2015), IEEE Xplore Digital Library, October 2015 , pp. 1-8. <\/p>\n<p>9.\tSaptarshi  Banerjee, Arnab  Majumdar, Himadri Nath  Saha and Ratul  Dey Modified Ant Colony Optimization (ACO) based routing protocol for MANET,\u009d in proc. of 6th International Conference and Workshop on Computing and Communication (IEMCON -2015), IEEE Xplore Digital Library, October 2015 , pp. 1-7.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>JOURNAL 2012 1. Moutushi Singh, Rupayan Das Survey of Different techniques to Detect wormhole attack in wireless sensor Network International Journal of Scientific &amp; Engineering Research (IJSER), ISSN 2229-5518,pp:200-205, Volume 3, Issue 10,October-2012 2013 2. T. Chatterjee and M. K Sarkar, Sixth Sense Technology Has Potential to Become the Ultimate &#8220;Transparent&#8221; User Interface for Accessing &hellip; <a href=\"https:\/\/uem.edu.in\/uem-jaipur\/department-of-computer-applications\/paper-publications\/\">Continued<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":2225,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-2308","page","type-page","status-publish","hentry","wpautop"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Paper Publications - UEM Jaipur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uem.edu.in\/uem-jaipur\/department-of-computer-applications\/paper-publications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Paper Publications - UEM Jaipur\" \/>\n<meta property=\"og:description\" content=\"JOURNAL 2012 1. Moutushi Singh, Rupayan Das Survey of Different techniques to Detect wormhole attack in wireless sensor Network International Journal of Scientific &amp; Engineering Research (IJSER), ISSN 2229-5518,pp:200-205, Volume 3, Issue 10,October-2012 2013 2. T. Chatterjee and M. K Sarkar, Sixth Sense Technology Has Potential to Become the Ultimate &#8220;Transparent&#8221; User Interface for Accessing &hellip; Continued\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uem.edu.in\/uem-jaipur\/department-of-computer-applications\/paper-publications\/\" \/>\n<meta property=\"og:site_name\" content=\"UEM Jaipur\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uemjpr\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-08T19:59:32+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@jaipur_uem\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur\\\/department-of-computer-applications\\\/paper-publications\\\/\",\"url\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur\\\/department-of-computer-applications\\\/paper-publications\\\/\",\"name\":\"Paper Publications - UEM Jaipur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur\\\/#website\"},\"datePublished\":\"2016-03-16T22:09:29+00:00\",\"dateModified\":\"2020-07-08T19:59:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur\\\/department-of-computer-applications\\\/paper-publications\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur\\\/department-of-computer-applications\\\/paper-publications\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur\\\/department-of-computer-applications\\\/paper-publications\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Department of Computer Applications\",\"item\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur\\\/department-of-computer-applications\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Paper Publications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur\\\/#website\",\"url\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur\\\/\",\"name\":\"UEM Jaipur\",\"description\":\"University of Engineering &amp; Management Jaipur\",\"publisher\":{\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur\\\/#organization\",\"name\":\"UEM Jaipur\",\"url\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/media.uem.edu.in\\\/uploads\\\/sites\\\/3\\\/2016\\\/03\\\/UEM-Logo-1.png\",\"contentUrl\":\"https:\\\/\\\/media.uem.edu.in\\\/uploads\\\/sites\\\/3\\\/2016\\\/03\\\/UEM-Logo-1.png\",\"width\":597,\"height\":418,\"caption\":\"UEM Jaipur\"},\"image\":{\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-jaipur\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/uemjpr\\\/\",\"https:\\\/\\\/x.com\\\/jaipur_uem\",\"https:\\\/\\\/www.youtube.com\\\/@UEMJaipurOffical\",\"https:\\\/\\\/www.instagram.com\\\/jaipur_uem\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Paper Publications - UEM Jaipur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uem.edu.in\/uem-jaipur\/department-of-computer-applications\/paper-publications\/","og_locale":"en_US","og_type":"article","og_title":"Paper Publications - UEM Jaipur","og_description":"JOURNAL 2012 1. Moutushi Singh, Rupayan Das Survey of Different techniques to Detect wormhole attack in wireless sensor Network International Journal of Scientific &amp; Engineering Research (IJSER), ISSN 2229-5518,pp:200-205, Volume 3, Issue 10,October-2012 2013 2. T. Chatterjee and M. K Sarkar, Sixth Sense Technology Has Potential to Become the Ultimate &#8220;Transparent&#8221; User Interface for Accessing &hellip; Continued","og_url":"https:\/\/uem.edu.in\/uem-jaipur\/department-of-computer-applications\/paper-publications\/","og_site_name":"UEM Jaipur","article_publisher":"https:\/\/www.facebook.com\/uemjpr\/","article_modified_time":"2020-07-08T19:59:32+00:00","twitter_card":"summary_large_image","twitter_site":"@jaipur_uem","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/uem.edu.in\/uem-jaipur\/department-of-computer-applications\/paper-publications\/","url":"https:\/\/uem.edu.in\/uem-jaipur\/department-of-computer-applications\/paper-publications\/","name":"Paper Publications - UEM Jaipur","isPartOf":{"@id":"https:\/\/uem.edu.in\/uem-jaipur\/#website"},"datePublished":"2016-03-16T22:09:29+00:00","dateModified":"2020-07-08T19:59:32+00:00","breadcrumb":{"@id":"https:\/\/uem.edu.in\/uem-jaipur\/department-of-computer-applications\/paper-publications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uem.edu.in\/uem-jaipur\/department-of-computer-applications\/paper-publications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uem.edu.in\/uem-jaipur\/department-of-computer-applications\/paper-publications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uem.edu.in\/uem-jaipur\/"},{"@type":"ListItem","position":2,"name":"Department of Computer Applications","item":"https:\/\/uem.edu.in\/uem-jaipur\/department-of-computer-applications\/"},{"@type":"ListItem","position":3,"name":"Paper Publications"}]},{"@type":"WebSite","@id":"https:\/\/uem.edu.in\/uem-jaipur\/#website","url":"https:\/\/uem.edu.in\/uem-jaipur\/","name":"UEM Jaipur","description":"University of Engineering &amp; Management Jaipur","publisher":{"@id":"https:\/\/uem.edu.in\/uem-jaipur\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uem.edu.in\/uem-jaipur\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/uem.edu.in\/uem-jaipur\/#organization","name":"UEM Jaipur","url":"https:\/\/uem.edu.in\/uem-jaipur\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uem.edu.in\/uem-jaipur\/#\/schema\/logo\/image\/","url":"https:\/\/media.uem.edu.in\/uploads\/sites\/3\/2016\/03\/UEM-Logo-1.png","contentUrl":"https:\/\/media.uem.edu.in\/uploads\/sites\/3\/2016\/03\/UEM-Logo-1.png","width":597,"height":418,"caption":"UEM Jaipur"},"image":{"@id":"https:\/\/uem.edu.in\/uem-jaipur\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/uemjpr\/","https:\/\/x.com\/jaipur_uem","https:\/\/www.youtube.com\/@UEMJaipurOffical","https:\/\/www.instagram.com\/jaipur_uem\/"]}]}},"jetpack_shortlink":"https:\/\/wp.me\/P7ldD4-Be","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/uem.edu.in\/uem-jaipur\/wp-json\/wp\/v2\/pages\/2308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uem.edu.in\/uem-jaipur\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/uem.edu.in\/uem-jaipur\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/uem.edu.in\/uem-jaipur\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/uem.edu.in\/uem-jaipur\/wp-json\/wp\/v2\/comments?post=2308"}],"version-history":[{"count":4,"href":"https:\/\/uem.edu.in\/uem-jaipur\/wp-json\/wp\/v2\/pages\/2308\/revisions"}],"predecessor-version":[{"id":8578,"href":"https:\/\/uem.edu.in\/uem-jaipur\/wp-json\/wp\/v2\/pages\/2308\/revisions\/8578"}],"up":[{"embeddable":true,"href":"https:\/\/uem.edu.in\/uem-jaipur\/wp-json\/wp\/v2\/pages\/2225"}],"wp:attachment":[{"href":"https:\/\/uem.edu.in\/uem-jaipur\/wp-json\/wp\/v2\/media?parent=2308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}