[email protected] Admission Helpline - 8010700500

Paper Publication


Dr. Debika Bhattacharyya

Professor & HoD – Computer Science and Engineering

[email protected]

POST DOCTORAL PUBLICATIONS
Book Chapter:

  1. Dr. Debika Bhattacharyya et al., “Overview of End-to-End Wimax Network Achitecture”, accepted as a book chapter for the book “Wimax Security and Quality of Service: Providing an End-to-End Explanation”, Book editors: Seok-Yee Tang, Hamid Sharif and Peter Mueller; Publisher: John Wiley; publishing time: last quarter of 2010
  2. Dr. Debika Bhattacharyya et al., “Architecture of Vehicular Ad Hoc Network”, accepted as a book chapter for the book “Advances in Vehicular Ad-Hoc Networks:Developments and Challenges”

 

INTERNATIONAL CONFERENCES/WORKSHOPS

  1. Dr. Debika Bhattacharyya et al., “A distributed Administration Based Approach for Instrusion Detecting In Mobile Ad Hoc Networks” International Conference on Spirituality, Engineering and Science, IEEE Bombay Section, IEEE Computer Society, Mumbai, April2010.
  2. Dr. Debika Bhattacharyya et al., “Attack Mitigation by a novel Protocol in Mobile Ad Hoc Network”, All India Seminar on Wireless Networks and Social Developments, Institute of Engineers, January,2010.
  3. Dr. Debika Bhattacharyya et al.,”Attack Mitigation By Priority Protocol in Mobile Adhoc Network” International Conference on “Science, Engineering and Sprituality,January 2010, Mumbai IEEE Mumbai Section, IEEE Computer Society
  4. Dr. Debika Bhattacharyya et al., “A Priority Based protocol for Mitigating Different Attacks in Mobile Ad Hoc Networks”, International Journal for Computer Science and Communication, Volume 1, Number 2, September 2010.
  5. Dr. Debika Bhattacharyya et al., “A Priority Based protocol for Mitigating Different Attacks in Mobile Ad Hoc Networks”,International Journal for Computer Science and Communication(IJCSC),Volume1, Number 2,July-December 2010,pp-299-302
  6. Dr. Debika Bhattacharyya et al., “Semi-Centralised Multi Authenticated RSSI Based Solution to Sybil Attack”, International Journal of Computer Science and Emerging Technologies (IJCSET), Volume 1, Issue 4, December 2010,pp-439-436
  7. Dr. Debika Bhattacharyya et al., “A distributed Administration Based Approach for Instrusion Detecting in Mobile Ad Hoc Networks”. International Journal of Scientific and Engineering Research (IJSER) , Volume 1, Number 1, January,2011.
  8. Dr. Debika Bhattacharyya et al., “Semi-centralised multi authenticated RSSI based solution to sybil attack”, Proceedings of National Conference. International Journal of Computer Science and Emerging Technologies (IJCSET) Volume 1, Issue 4, December,2010.
  9. Dr. Debika Bhattacharyya et al. “A Solution to Sybil Attack by hybrid approach”. International Journal of Advanced Engineering Technology (IJAET), Volume 1,Number 1,December 2010.
  10. Dr. Debika Bhattacharyya et al.,” “Two-level Secure Re-routing (TSR) in Mobile Ad Hoc Networks”,IEMCON-2011, IEEE Calcutta Section ,January,5th and 6th 2011,Kolkata,WestBengal.
  11. Dr. Debika Bhattacharyya et al. “Fidelity Based On Demand Secure(FBOD) Routing in Mobile Adhoc Network”,IEMCON-2011,IEEE Calcutta Section,January,5th and 6th 2011,Kolkata, West Bengal.
  12. Dr. Debika Bhattacharyya et al. “Minimized Overhead and Administrator Based Secure Routing Protocol”,IEMCON2011, IEEE Calcutta Section ,January,5th and 6th 2011,Kolkata, West Bengal.
  13. Dr. Debika Bhattacharyya et al.,“Energy Efficiency in Wireless Network Using Modified Distributed Efficient Clustering Approach”, Spinger Link Advances in Networks and Communications .Communications in Computer and Information Science, 2011, Volume 132, Part 1, pp-215-222.
  14. Dr. Debika Bhattacharyya et al., “Fidelity Index Based On Demand(FBOD) Secure Routing In Mobile Ad hoc Network”, SpingerLink,Communications in Computer and Information Science series, volume- 203,Part-II, September,2011,pp-615-622.
  15. Dr. Debika Bhattacharyya et al., “A novel Efficient Secured Routing Algorithm in MANET” International Journal of Wireless & Mobile Networks (IJWMN),October 2011, Volume 3, Issue 5, pp-245-264.
  16. Dr. Debika Bhattacharyya et al.,“A Distributed Administration Based Approach for Detecting and Preventing Attacks in Mobile Ad Hoc Networks”,International Journal of Scientific and Engineering Research (IJSER) ,Volume 2, Issue 3, March 2011,pp-101-111
  17. Dr. Debika Bhattacharyya et al.,“A Solution to Sybil Attack by hybrid approach”. International Journal of Advanced Engineering Technology (IJAET), Volume 2,Issue 2,April 2011,pp-201-212
  18. Dr. Debika Bhattacharyya et al.“Minimized Overhead and Administrator Based Secure Routing Protocol”, International Journal of Computer Applications ,Volume -25,Number 9, Article 5 ,pp-22-35, July 2011. Published by Foundation of Computer Science, New York, USA.
  19. Dr. Debika Bhattacharyya et al.,“Fidelity Based On Demand Secure(FBOD) Routing in Mobile Adhoc Network” International Journal of Advanced Computer Science and Applications(IJACSA), Special Issue on Wireless & Mobile Networks , August 2011,pp 19 – 25.
  20. Dr. Debika Bhattacharyya et al.,“Energy Efficient Administrator Based Secured Routing in MANET”,To be published by Springer Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) Series.January,2012
  21. Dr. Debika Bhattacharyya et al.,”Different Types of Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata”, To be published by Springer Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) Series.January,2012

 

PRE – DOCTORAL PUBLICATIONS

  1. Debika Bhattacharyya, N. Das, Dr. Atal Choudhuri, “Embossing-An efficient text authentication tool for Internet”, The Institution Of Engineers, All India seminar on “IT Enabled Services”(April 2002)
  2. Debika Bhattacharyya, “Design Space of Competing Computer Architecture”, The Institution Of Engineers, All India seminar on “Inside the computer” (Aug2003).
  3. Debika Bhattacharyya, “Distributed Dynamic Channel Allocation” in Seminar on Mobile Communication and Computing 2004, IETE Kolkata (Feb 2004)
  4. Debika Bhattacharyya, – “Reduced Search In Update, A Distributed Dynamic Channel Allocation Algorithm In Mobile Communication Systems”, IEEE, Kolkata(2004).
  5. Debika Bhattacharyya, Dr. P.K. Banerjee, – “The Reduced Search In Update Algorithm (RSU) – A Distributed Dynamic Channel Allocation Algorithm.” Union Radio-ScientifiqueInternationale (International Union Of Radio Science ), New Delhi (Oct 2005)
  6. Debika Bhattacharyya, Dr. P.K. Banerjee, – “Dynamic Channel Reservation Based Call Admission Control in Cellular Mobile Networks”-International Symposium on Wireless Pervasive Computing January 2006 Phuket, Thailand, IEEE.
  7. Debika Bhattacharyya, Dr. P.K. Banerjee, – “A Fuzzy based Call Admission Control algorithm for providing guaranteed QOS in cellular mobile communication systems”- International conferences on computers and devices for communication-CODEC 06,Institute Of Radiophyics and Electronics and IEEE, Kolkata (Dec 2006).
  8. Debika Bhattacharyya,-“Experimental Survey of Implementing Distributed Dynamic Channel Allocation Algorithm in Mobile Embedded System”, International Conference on Computers and Devices for Communication (CODEC-2006) held in Kolkata, India in December 2006,
  9. Debika Bhattacharyya, – “Implementation of Reduced Search in Update Algorithm in Mobile Embedded System”, Communicated to International Journal of China Communications,November 2008.
  10. Debika Bhattacharyya,- “Designing An Adaptive Priority Based Call Admission Control Algorithm for Cellular Mobile Network”-International Seminar on “Multi-Dimensional Advancement in Telecommunication and their Global Importance”,Institution of Engineers,Kolkata(September 2008).

 

Prof. HimadriNathSaha

Assistant Professor & Assistant HoD– Computer Science and Engineering

[email protected]

International Conference Publications:-

 

  1. H. N. Saha, et al., “Restricted Hoping Routing Protocol”, Proceedings of International Conference on Computer Application (ICCA), December 2010.pp.281-290.
  2. H. N. Saha, et al., “Energy Efficiency in Wireless Network Using Modified Distributed Efficient Clustering Approach”,Proceedings of International Conference on Computer Science and Information Technology (CCSIT), Vol 132, Part II, January 2011, pp.215-222.
  3. H. N. Saha, et al., “A Study of Secure Routing in MANET various attacks and their Countermeasures”, Proceedings of IEM Conference (IEMCON), January 2011, pp.256-261.
  4. H. N. Saha,D. Bhattacharyya,P. K. Banerjee,”Fidelity Index Based On Demand (FBOD) Secure Routing In Mobile Ad hoc Network”,Proceedings of International Conference on Parallel Distributed Computing Technologies and Applications(PDCTA), vol-203,Part-II, September 2011, pp.615-627.
  5. H. N. Saha,D. Bhattacharyya,P. K. Banerjee,“Different Types of Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata”, Proceedings of International Conference on Computer Science and Information Technology(CCSIT), Vol 84,part-1, 2012, pp.203-213.
  6. H. N. Saha,D. Bhattacharyya, P. K. Banerjee, “Energy Efficient Administrator Based Secured Routing in MANET”,Proceedings of International Conference on Computer Science, Engineering & Applications (ICCSEA),Vol 167, May2012, pp. 659-672.
  7. H. N. Saha,D. Bhattacharyya, P. K. Banerjee,et al., “An Efficient Approach to Secure Routing in MANET”, Proceedings of Advances in Computing and Information Technology (ACITY), Vol176, July 2012,pp.765-776.
  8. H. N. Saha,D. Bhattacharyya,P. K. Banerjee, “Administrator and Trust Based Secure Routing in MANET”,Proceedings of Advances in Mobile Network, Communication and its Applications (MNCAPPS),August 2012,pp.39-45.
  9. H. N. Saha,D. Bhattacharyya, A. K. Bandhyopadhyay,P. K. Banerjee, ‘Two-level Secure Re-Routing(TSR) in Mobile Ad Hoc Networks”, Proceedings of Advances in Mobile Network, Communication and its Applications (MNCAPPS), August 2012, pp.119-122.
  10. H. N. Saha,D. Bhattacharyya,P. K. Banerjee, “Secure Multipoint Relay based Secure Routing in MANET”, Proceedings ofInternational Conference on Computer Science, Engineering and Information Technology (CCSEIT),October 2012,pp.63-68.
  11. H. N. Saha,D. Bhattacharyya, Banerjee, K. P.et al., “Different Routing Protocols and their vulnerabilities and their measures”, Proceedings ofInternational Conference on Computer Science and Electronic Engineering (CSEE), March 2014,pp.192-202.

 

International Journal Publications:

  1. H. N. Saha,D. Bhattacharyya,P. K. Banerjee, “A Priority Based protocol for Mitigating Different Attacks in Mobile Ad Hoc Networks”,International Journal for Computer Science and Communication(IJCSC),Vol 1, No2, Impact Factor 1.05, July-December 2010, pp.299-302.
  2. H. N. Saha,D. Bhattacharyya,P. K. Banerjee, “Semi-Centralised Multi Authenticated RSSI Based Solution to Sybil Attack”, International Journal of Computer Science and Emerging Technologies (IJCSET), Vol 1, Issue 4, December 2010, pp.439-436.
  3. H. N. Saha,D. Bhattacharyya,P. K. Banerjee, “Multi-level Secure Routing(MSR) in Mobile Ad Hoc Networks”, IEM International Journal of Management & Technology (IEMIJMT),Vol.1,No.1, January 2011, pp-229-234.
  4. H. N. Saha,D. Bhattacharyya,P. K. Banerjee, “A Distributed Administration Based Approach for Detecting and Preventing Attacks in Mobile Ad Hoc Networks”,International Journal of Scientific and Engineering Research (IJSER), Vol 2, Issue 3,Impact factor 1.4, March 2011, pp.101-111.
  5. H. N. Saha,D. Bhattacharyya, P. K. Banerjee, “Minimized Overhead and Administrator Based Secure Routing Protocol”, International Journal of Computer Appli
  6. cations(IJCA),Volume 25,Number 9, Published by Foundation of Computer Science, New York, USA. Impact factor .8 , July 2011, pp.22-35.

  7. H. N. Saha,D. Bhattacharyya, P. K. Banerjee,“Fidelity Based On Demand Secure(FBOD) Routing in Mobile Adhoc Network” International Journal of Advanced Computer Science and Applications(IJACSA), Special Issue on Wireless & Mobile Networks, August 2011, pp.19 – 25.
  8. H. N. Saha,D. Bhattacharyya, P. K. Banerjee, “A Novel and Efficient Secured Routing Algorithm In Mobile Ad hoc Network”, International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 5, October 2011, pp.249-264.
  9. H. N. Saha,D. Bhattacharyya, P. K. Banerjee,et al., “ Study of different attacks in Manet with its detection & mitigation schemes”. International Journal of Advanced Engineering Technology (IJAET), Vol 3,Issue 1, Impact factor 2.524, January 2012, pp.383-389.
  10. H. N. Saha,D. Bhattacharyya,P. K. Banerjee, “A Novel Approach for Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata”, International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol 3, No.2, April 2012, pp.33-49.
  11. H. N. Saha,D. Bhattacharyya,P. K. Banerjee, “A Novel Energy Efficient and Administrator Based Secured Routing MANET”. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.4, July 2012, pp.73-92.
  12. H. N. Saha,D. Bhattacharyya, P. K. Banerjee. ” A Novel Multi Point Relay Based Secure Routing in MANET”, International Journal of Network Security & Its Applications (IJNSA), Vol 4, No.6, November 2012, pp.133-144.
  13. H. N. Saha,D. Bhattacharyya, P. K. Banerjee.et al., “A Review on Manet Routing Protocols and its vulnerabilities”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) ISSN: 2278-6756 Volume 2, Issue 6,November – December 2013, pp. 252-262.
  14. H. N. Saha,D. Bhattacharyya,P. K. Banerjee,“A Review on Attacks and Secure Routing Protocols in Manet”, International Journal of Innovative Research and Review (JIRR) Vol. 1 (2), October-December 2013, pp.12-36.
  15. H. N. Saha, et al, “Modified Ant Colony Based Routing algorithm in MANET”, International Journal of computer & organization trends (IJCOT),Vol-3, Issue10,Impact factor .5, November2013, pp.473-477.
  16. H. N. Saha,D. Bhattacharyya,P. K. Banerjee, ”Modified Dynamic On-demand Routing Protocol”, International Journal of Emerging Trends and Technology in Computer Science (IJETTCS), vol 3,issue 2,Impact factor 2.524, March-April 2014, pp.139-144.
  17. H. N. Saha, et al., “A review on intelligence secure routing protocol in the mobile adhoc networks”, International Journal of Advanced Multidisciplinary Research(IJAMR),Vol 1,Issue 3, December 2014, pp.01–13.
  18. H. N. Saha,D. Bhattacharyya,P. K. Banerjee,“Energy Aware Fidelity Based On Demand Secure(EFBOD) Routing in Mobile Adhoc Network”, International Journal of Wireless Information Networks (IJWI),Springer communicated.
  19. H. N. Saha,D. Bhattacharyya,P. K. Banerjee, P K.Banerjee, “Modified Fidelity Based On-Demand Secure (MFBOD) Routing Protocol in Mobile Ad-Hoc Network”, International Journal of foundations of computing and decision sciences (IJFCE), accepted.
  20. H. N. Saha,D. Bhattacharyya,P. K. Banerjee, “Implementation Of Personal Area Network For Secure Routing In MANET By Using Low Cost Hardware“Turkish Journal Of Electrical Engineering & Computer Sciences, communicated.

 

Prof. Biswajoy Chatterjee

Assistant Professor – Computer Science and Engineering

[email protected]

  1. B.Chatterjee ,S.Chakraborty ,S.K.Mitra and K.P.Ghatak, “Influence of Parallel Electric and Magnetic fields on the carrier contribution to the elastic constants in Kane type Semiconductors “ in Quantum Matter , accept for publication in 2014
  2. S.Chakbarti ,B.Chatterjee ,S.Debbarma , K.P.Ghatak ,”Two Dimensional Effective Electron Mass at the Fermi Level in the Quantum Wells of III-V ,Ternarya and uaternary Semiconductors” in the Journal of Nanotechnology ,Vol15,1-12,2014
  3. B.Chatterjee , S.Chakrabarti ,M.Chakraborty ,K.P.Ghatak ,”Heavy Doped Semiconductors sand the Diffusion coefficient to Mobility Relationship “,reviews in Theoretical Science ,accepted for publication in 2014
  4. S. Debbarma , N.Debbarma , M.Mitra , K.P.Ghatak , “Can Photon Influence the Screening Length in the Heavillyl Doped Quantum Wells ?”,Advanced Science ,Engineering and Medicine , Vol 6,1-18 ,2104
  5. B.Chatterjee ,S.Debbarma , M.Mitra ,K.P.Ghatak , “The Two dimension Magneto ThermoPoweer in Ultra thin films under intense electric field”mJournal of the Nanoscience and Nanotechnology , accepted for publications in 2014
  6. M. Mitra ,B. Chatterjee , K.P.Ghatak ,”D Einstein relation in Quantum wells under strong electric field”,Journal of Computational and Theoretical Nanoscience , accepted for publication in 2014
  7. A. Mitra , B. Chatterjee ,B.K.Mitra ,”Identification of Primitive Speech Signals using TMS320C54X DSP Processor “,in Proc. Of Eleventh National Conference on Communications (NCC),IIT –Kharagpur ,India ,January 28-30,2005 ,pp.286-290
  8. A.Mitraa ,B.K.Mitra ,Bi.Chatterjee ,”Recognition of Isolated speech signals using Simplified Statistical Parameters “,Enformatika Transactions, Vol.8 , pp. 151-154 ,October 2005
  9. B.Chatterjee,”Gamedge :3DModelling “,Invited Paper,Published in 8th WSEAS Int.Conf. on SystemTheory and Scientific Computations(ISTASC’08),Rhodes(Rodos)Islands ,Greece,August 20-222,2008 ,ISI Book (Thomson),NAUN Journal.

Prof. Sukalyan Goswami

Assistant Professor & Assistant HoD– Computer Science and Engineering

[email protected]

  1. SukalyanGoswami , A Comparative Study of Load Balancing Algorithms in Computational Grid Environment , Fifth International Conference on Computational Intelligence, Modeling and Simulation, September, 2013
  2. SukalyanGoswami , Service Oriented Load Balancing Framework in Computational Grid Environment , International Journal of Computers and Technology, Volume 9, Number 3, pp 1091 – 1098
  3. SukalyanGoswami , Enhancement of GSM Security Using Elliptic Curve Cryptography Algorithm , Third International Conference on Intelligent Systems, Modeling and Simulation, ISMS 2012
  4. SouravSaha, SubhabrataSengupta, SukalyanGoswami , An Efficient NLP Based Approach To Personalized Information Retrieval In Web Mining , International Conference on Innovative Techno-Management Solutions for Social Sector, IEMCON, January 2012

Prof. (Dr.) Tamal Chakrabarti

Professor – Computer Science and Engineering

[email protected]

  1. Chakrabarti Tamal, SahaSourav and Sinha Devadatta (2013), A Cellular Automata Based DNA Pattern Classifier, CiiT International Journal of Biometrics and Bioinformatics, Volume 5, No. 9, pages 346-352
  2. Chakrabarti Tamal and Sinha Devadatta (2013), Combining Text and Pattern Preprocessing in an Adaptive DNA Pattern Matcher, International Journal of Computer Engineering & Technology, Volume 4, Issue 4, pages 45-51
  3. Chakrabarti Tamal, SahaSourav and Sinha Devadatta (2013), DNA Multiple Sequence Alignment by a Hidden Markov Model and Fuzzy Levenshtein Distance based Genetic Algorithm, International Journal of Computer Applications (0975 – 8887), Volume 73, No. 16, pages 26-30
  4. Banerjee Sagnik, Chakrabarti Tamal and Sinha Devadatta (2013), A Faster Fitness Calculation Method for Genetic Algorithm Based Multiple Protein Sequence Alignment, International Journal of Scientific & Engineering Research, [ISSN: 2229-5518], Volume 4, Issue 7, pages 768-772
  5. Banerjee Sagnik, Chakrabarti Tamal and Sinha Devadatta (2013), Finding All Occurrences of a Pattern by a Genetic Algorithm Based Divide-and-Conquer Method, International Journal of Computer Applications (0975 – 8887), Volume 64, No.18, pages 48-52
  6. Chakrabarti Tamal and Sinha Devadatta (2012), A Fast Divide and Conquer Based Pattern Matcher to Find DNA Patterns, Proceedings of National Conference on Pervasive Computing and Communications, pages 94–98
  7. Chakrabarti Tamal and Sinha Devadatta (2012), An Efficient Technique for Finding Longest Common Subsequence of DNA Sequences, IEM International Journal of Management & Technology [ISSN: 2229-6611], Volume 2, Issue 2, pages 37–41
  8. Chakrabarti Tamal and Sinha Devadatta (2012), Bidirectional Pattern Matching for DNA Sequences, IEM International Journal of Management & Technology [ISSN: 2296-6611], Volume 2, Issue 1, pages 133–137
  9. Banerjee Sagnik, Chakrabarti Tamal and Sinha Devadatta (2012), A Genetic Algorithm Based Pattern Matcher, International Journal of Scientific & Engineering Research, Volume 3, Issue 11, [ISSN: 2229-5518], (www.ijser.org/researchpaper%5CA-Genetic-Algorithm-Based-Pattern-Matcher.pdf)
  10. Mukherjee Suvam and Chakrabarti Tamal (2011), Automatic Algorithm Specification to Source Code Translation, Indian Journal of Computer Science and Engineering, Volume 2, Issue 2, p146 – p159
  11. Chakrabarti Tamal and Sinha Devadatta (2011), DNA Sequence Alignment by Parallel Dynamic Programming. International Conference on Scientific Paradigm Shift in Information Technology & Management.

Prof.Shubhabrata Sengupta

Assistant Professor – Computer Science and Engineering

[email protected]

  1. SouravSaha, SubhabrataSengupta, SukalyanGoswami , An Efficient NLP Based Approach To Personalized Information Retrieval In Web Mining , International Conference on Innovative Techno-Management Solutions for Social Sector, IEMCON , January– 2012

Prof. Saptarsi Goswami

Assistant Professor – Computer Science and Engineering

[email protected]

  1. SaptarsiGoswami “Feature Selection: A Practitioner View”, International Journal of Information Technology and Computer Science (2014 – Communicated and Accepted)
  2. Sarkar, SubhajitDey, and SaptarsiGoswami. “Empirical Study on Filter based Feature Selection Methods for Text Classification.” International Journal of Computer Applications 81 (2013).
  3. SaptarsiGoswami and AmlanChakrabarti, Quartile Clustering: A quartile based technique for Generating Meaningful Clusters, Journal of Computing Feb 2012 (Impact Factor : .21)
  4. SaptarsiGoswami, Samiran Ghosh, and AmlanChakrabarti, Outlier Detection Techniques for SQL and ETL Tuning , IJCA June 2011 (Impact Factor : .83),
  5. Sarkar, SubhajitDey, and SaptarsiGoswami. “Empirical Study on Filter based Feature Selection Methods for Text Classification.” International Journal of Computer Applications 81 (2013).
  6. Dey Sarkar, Subhajit, SaptarsiGoswami, Aman Agarwal, and JavedAktar. “A Novel Feature Selection Technique for Text Classification Using Naïve Bayes.” International Scholarly Research Notices 2014 (2014).
  7. Goswami, Saptarsi, and AmlanChakrabarti. “Feature Selection: A Practitioner View.” (2014). International Journal of Information Technology and Computer Science
  8. GoswamiSaptarsi et al. . “Data mining techniques for analyzing murder related structured and unstructured data.” American Journal Of Advanced Computing 2.2 (2015).

Prof: Kaushik Banerjee

Assistant Professor – Computer Science and Engineering

[email protected]

  1. Kaushik Banerjee, Subhas De, Rahul Singh , Railway safety signalling , International Journal of Scientific & Engineering Research, Volume 3, Issue 10, October-2012,ISSN 2229-5518
  2. Kaushik Banerjee, Subhas De, Rahul Singh, Souren Jana , Automated mineral detection using SONAR wave, International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013 ,ISSN 2229-5518
  3. Rerouting Based on Receiver Feedback in Real Time StreamingIJCSN International Journal of Computer Science and Network, Volume 3, Issue 3,June 2014 Impact Factor – 0.274ISSN (Online) : 2277-5420
  4. Routing based on Receiver Feedback with Resource Reservation in Real Time NetworksInternational Journal of Innovative Research in Advanced Engineering (IJIRAE) , Volume 1, Issue 10, November 2014
  5. Decision on Pumping Length while applying Pumping Lemma for Regular LanguagesAdamas Technical Review (ATR) , ISSN 2348 –3385 , Vol. 1, Issue 1, July 2014

Prof. Nilanjana Dutta Roy

Assistant Professor – Computer Science and Engineering

[email protected]

  1. Nilanjana Dutta Roy , A new approach to an Efficient & Secure Storage & Retrieval of Retinal Template , http://www.mnkjournals.com/ijlrst.htm
  2. Nilanjana Dutta Roy , The Biometric Authentication- using Retina & Password Hardening , Tata mc Graw Hill
  3. Nilanjana Dutta Roy ,A New Technique for Unique Binary Tree Formation from its Preorder & Post order Traversals , Springer proceedings
  4. Nilanjana Dutta Roy ,Modified Mergesort algorithm for large set of data , IJIRSE, vol 3, special issue 2,2014
  5. SouravSaha, Nilanjana Dutta Roy , Automatic Detection of Bifurcation Points in Retinal Fundus-Images , International Journal of Latest Research and Technology, ISSN 2278-5299
  6. Nilanjana Dutta Roy et. al., “Detection of Bifurcation Angle in a Retinal Fundus Image”, IEEE Xplore publication of the conference ICAPR 2015, ISI, Kolkata.

Prof: Sanjay Chakraborty

Assistant Professor – Computer Science and Engineering

[email protected]

  1. Sanjay Chakraborty, Comparison of Various Cluster Validation Indices Using K-means, DBSCAN and PSO-K-means Clustering Algorithms (Paper-528) , International Journal of Information Technology and Computer Science(IJITCS), Communicated and Accepted.
  2. Chakraborty Sanjay and N. K. Nagwani. “Analysis and study of incremental DBSCAN clustering algorithm.” Int. J. Enterprise Comput. Bus. Syst (2011).
  3. Chakraborty Sanjay, N. K. Nagwani, and LopamudraDey. “Performance Comparison of Incremental K-means and Incremental DBSCAN Algorithms.” International Journal of Computer Applications, Vol.27, (2011)(IF-0.821).
  4. Chakraborty Sanjay and N. K. Nagwani, “Performance Evaluation of Incremental K-means Clustering Algorithm”,IIJDWM (IFRSA International Journal of Data warehousing and Mining), Vol.1, 2011.
  5. Chakraborty Sanjay, N. K. Nagwani, and LopamudraDey, “Weather Forecasting using Incremental K-means Clustering Algorithm”, CiiT International Journal of Data Mining and Knowledge Engineering, May, 2012(IF-0.621).
  6. Manna Sayani, Chatterjee Satarupa, KoleyTuhina and Chakraborty Sanjay, “Study and Analysis of a New Encryption Technique using Special Symbols Shifting”, CiiT International Journal of Networking and Communication Engineering, (IF-0.567).
  7. Chakraborty Sanjay and N. K. Nagwani, “Study and Analysis of Incremental K-Means Clustering Algorithm”- International Conference (HPAGC-2011) Springer (Germany), CCIS-169, 2011.
  8. Chakraborty Sanjay and DeyLopamudra, “Canonical PSO Based K-Means Clustering Approach for Real Datasets”, International Scholarly Research Notices (ISRN Software Engineering), HindawiPublishing Corporation, Vol. 2014.
  9. Chakraborty Sanjay et. al., An Advanced Dictionary Based Lossless Compression Technique for English Text Data”CiiT International Journal of Biometrics and Bioinformatics, Vol. 7,No. 1, 2015
  10. Chakraborty Sanjay et. al., “Weather Forecasting using Convex hull & K-Means Techniques- An Approach”, 1st International Science & Technology Congress(IEMCON), Elsevier Science &Technology, pp. 288-295, 2014.

Prof: Sourav Saha

Assistant Professor – Computer Science and Engineering

[email protected]

  1. Tamal Chakrabarti, SouravSaha and Devadatta Sinha , A Cellular Automata Based DNA Pattern Classifier , CiiT International Journal of Biometrics and Bioinformatics ISSN 0974 – 9675
  2. Tamal Chakrabarti, SouravSaha and Devadatta Sinha , DNA Multiple Sequence Alignment by a Hidden Markov Model and Fuzzy Levenshtein Distance based Genetic Algorithm , International Journal of Computer Applications ,ISBN 973-93-80876-16-7, 73(16):26-30″
  3. SouravSaha, Nilanjana Dutta Roy , Automatic Detection of Bifircation Points in Retinal Fundus-Images , International Journal of Latest Research and Technology, ISSN 2278-5299
  4. SouravSaha, SubhabrataSengupta, SukalyanGoswami , An Efficient NLP Based Approach To Personalized Information Retrieval In Web Mining , International Conference on Innovative Techno-Management Solutions for Social Sector, IEMCON, January – 2012
  5. Chandrama Shaw, PradiptaMaji, SouravSaha, Biplab K. Sikdar, Samir Roy, Parimal Pal Chaudhuri , Cellular Automata Based Encompression Technology for Voice Data , ACRI-2004, Springerlink, Volume 3305 2493
  6. SouravSaha, PradiptaMaji, NiloyGanguly, Samir Roy, and P. Pal Chaudhuri , Cellular Automata Based Model for Pattern Clustering , International Conference on Advances in Pattern Recognition
  7. SouravSaha, PradiptaMaji, NiloyGanguly, Biplab K. Sikdar, and P. Pal Chaudhuri , Evolving Cellular Automata Model for Pattern Recognition and Classification , IEEE International Conference on Systems, Man and Cybernetics (SMC-02)
  8. PradiptaMaji, NiloyGanguly, SouravSaha, Anup K. Roy, and P. Pal Chaudhuri , Cellular Automata Machine for Pattern Recognition , ACRI-2002, Springerlink, Volume 2493.

Prof. Sukanya Mukherjee

Assistant Professor – Computer Science and Engineering

[email protected]

  1. Sukanta Das, Nazma N. Naskar, Sukanya Mukherjee, MamataDalui, and Biplab K. Sikdar. “Characterization of CA rules for SACA targeting detection of faulty nodes in WSN.” In Cellular Automata, pp. 300-311. Springer Berlin Heidelberg, 2010.
  2. Sukanta Das, Sukanya Mukherjee, NazmaNaskar, and Biplab K. Sikdar. “Modeling single length cycle nonlinear cellular automata for pattern recognition.” In Nature & Biologically Inspired Computing, 2009. NaBIC 2009. World Congress on, pp. 198-203. IEEE, 2009.
  3. Sukanta Das, Sukanya Mukherjee, NazmaNaskar, and Biplab K. Sikdar. “Characterization of Single Cycle CA and its Application in Pattern Classification.” Electronic Notes in Theoretical Computer Science 252 (2009): 181-203.
  4. Sukanta Das, NazmaNaskar, Sukanya Mukherjee, Biplab K. Sikdar: CA Rules Identification for Efficient Design of Pattern Classifier.CSC 2009: 336-341

Prof. Shraddha Keshav Tripathi

Assistant Professor – Computer Science and Engineering

[email protected]

  1. Review of Reliability Analysis for Component Based Software Systems, Proceedings of 6th National Conference on Computing for Nation Development, INDIACom-2012, New Delhi, India, February 23-24, 2012.
  2. Failure Dependent Reliability Analysis for Component Based Software Systems, 3rd IEEE International Conference on Computer and Communication Technology,ICCCT-2012, MNNIT, Allahabad, Nov 23-24, 2012.

Prof. Soumyadip Banerjee

Assistant Professor – Computer Science and Engineering

[email protected]

  1. S. Banerjee , “Diffraction Tomog