{"id":433,"date":"2015-05-22T01:15:37","date_gmt":"2015-05-21T19:45:37","guid":{"rendered":"http:\/\/demo.renderbit.com\/iem-group\/college-of-engineering\/?page_id=433"},"modified":"2015-05-22T01:15:37","modified_gmt":"2015-05-21T19:45:37","slug":"paper-publication","status":"publish","type":"page","link":"https:\/\/uem.edu.in\/uem-kolkata\/paper-publication\/","title":{"rendered":"Paper Publication"},"content":{"rendered":"<h2>Dr. Debika Bhattacharyya<\/h2>\n<h3>Professor &amp; HoD \u2013 Computer Science and Engineering<\/h3>\n<p><i class=\"fa fa-envelope\"><\/i> bdebika@yahoo.com<\/p>\n<p><b>POST DOCTORAL PUBLICATIONS<\/b><br \/>\n<i>Book Chapter:<\/i><\/p>\n<ol>\n<li>Dr. Debika Bhattacharyya et al., \u201cOverview of End-to-End Wimax Network Achitecture\u201d, accepted as a book chapter for the book \u201cWimax Security and Quality of Service: Providing an End-to-End Explanation\u201d, Book editors: Seok-Yee Tang, Hamid Sharif and Peter Mueller; Publisher: John Wiley; publishing time: last quarter of 2010<\/li>\n<li>Dr. Debika Bhattacharyya et al., \u201cArchitecture of Vehicular Ad Hoc Network\u201d, accepted as a book chapter for the book \u201cAdvances in Vehicular Ad-Hoc Networks:Developments and Challenges\u201d<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><b>INTERNATIONAL CONFERENCES\/WORKSHOPS<\/b><\/p>\n<ol>\n<li>Dr. Debika Bhattacharyya et al., \u201cA distributed Administration Based Approach for Instrusion Detecting In Mobile Ad Hoc Networks\u201d International Conference on Spirituality, Engineering and Science, IEEE Bombay Section, IEEE Computer Society, Mumbai, April2010.<\/li>\n<li>Dr. Debika Bhattacharyya et al., \u201cAttack Mitigation by a novel Protocol in Mobile Ad Hoc Network\u201d, All India Seminar on Wireless Networks and Social Developments, Institute of Engineers, January,2010.<\/li>\n<li>Dr. Debika Bhattacharyya et al.,\u201dAttack Mitigation By Priority Protocol in Mobile Adhoc Network\u201d International Conference on \u201cScience, Engineering and Sprituality,January 2010, Mumbai IEEE Mumbai Section, IEEE Computer Society<\/li>\n<li>Dr. Debika Bhattacharyya et al., \u201cA Priority Based protocol for Mitigating Different Attacks in Mobile Ad Hoc Networks\u201d, International Journal for Computer Science and Communication, Volume 1, Number 2, September 2010.<\/li>\n<li>Dr. Debika Bhattacharyya et al., \u201cA Priority Based protocol for Mitigating Different Attacks in Mobile Ad Hoc Networks\u201d,International Journal for Computer Science and Communication(IJCSC),Volume1, Number 2,July-December 2010,pp-299-302<\/li>\n<li>Dr. Debika Bhattacharyya et al., \u201cSemi-Centralised Multi Authenticated RSSI Based Solution to Sybil Attack\u201d, International Journal of Computer Science and Emerging Technologies (IJCSET), Volume 1, Issue 4, December 2010,pp-439-436<\/li>\n<li>Dr. Debika Bhattacharyya et al., \u201cA distributed Administration Based Approach for Instrusion Detecting in Mobile Ad Hoc Networks\u201d. International Journal of Scientific and Engineering Research (IJSER) , Volume 1, Number 1, January,2011.<\/li>\n<li>Dr. Debika Bhattacharyya et al., \u201cSemi-centralised multi authenticated RSSI based solution to sybil attack\u201d, Proceedings of National Conference. International Journal of Computer Science and Emerging Technologies (IJCSET) Volume 1, Issue 4, December,2010.<\/li>\n<li>Dr. Debika Bhattacharyya et al. \u201cA Solution to Sybil Attack by hybrid approach\u201d. International Journal of Advanced Engineering Technology (IJAET), Volume 1,Number 1,December 2010.<\/li>\n<li>Dr. Debika Bhattacharyya et al.,\u201d \u201cTwo-level Secure Re-routing (TSR) in Mobile Ad Hoc Networks\u201d,IEMCON-2011, IEEE Calcutta Section ,January,5th and 6th 2011,Kolkata,WestBengal.<\/li>\n<li>Dr. Debika Bhattacharyya et al. \u201cFidelity Based On Demand Secure(FBOD) Routing in Mobile Adhoc Network\u201d,IEMCON-2011,IEEE Calcutta Section,January,5th and 6th 2011,Kolkata, West Bengal.<\/li>\n<li>Dr. Debika Bhattacharyya et al. \u201cMinimized Overhead and Administrator Based Secure Routing Protocol\u201d,IEMCON2011, IEEE Calcutta Section ,January,5th and 6th 2011,Kolkata, West Bengal.<\/li>\n<li>Dr. Debika Bhattacharyya et al.,\u201cEnergy Efficiency in Wireless Network Using Modified Distributed Efficient Clustering Approach\u201d, Spinger Link Advances in Networks and Communications .Communications in Computer and Information Science, 2011, Volume 132, Part 1, pp-215-222.<\/li>\n<li>Dr. Debika Bhattacharyya et al., &#8220;Fidelity Index Based On Demand(FBOD) Secure Routing In Mobile Ad hoc Network&#8221;, SpingerLink,Communications in Computer and Information Science series, volume- 203,Part-II, September,2011,pp-615-622.<\/li>\n<li>Dr. Debika Bhattacharyya et al., \u201cA novel Efficient Secured Routing Algorithm in MANET\u201d International Journal of Wireless &amp; Mobile Networks (IJWMN),October 2011, Volume 3, Issue 5, pp-245-264.<\/li>\n<li>Dr. Debika Bhattacharyya et al.,\u201cA Distributed Administration Based Approach for Detecting and Preventing Attacks in Mobile Ad Hoc Networks\u201d,International Journal of Scientific and Engineering Research (IJSER) ,Volume 2, Issue 3, March 2011,pp-101-111<\/li>\n<li>Dr. Debika Bhattacharyya et al.,\u201cA Solution to Sybil Attack by hybrid approach\u201d. International Journal of Advanced Engineering Technology (IJAET), Volume 2,Issue 2,April 2011,pp-201-212<\/li>\n<li>Dr. Debika Bhattacharyya et al.\u201cMinimized Overhead and Administrator Based Secure Routing Protocol\u201d, International Journal of Computer Applications ,Volume -25,Number 9, Article 5 ,pp-22-35, July 2011. Published by Foundation of Computer Science, New York, USA.<\/li>\n<li>Dr. Debika Bhattacharyya et al.,\u201cFidelity Based On Demand Secure(FBOD) Routing in Mobile Adhoc Network\u201d International Journal of Advanced Computer Science and Applications(IJACSA), Special Issue on Wireless &amp; Mobile Networks , August 2011,pp 19 \u2013 25.<\/li>\n<li>Dr. Debika Bhattacharyya et al.,\u201cEnergy Efficient Administrator Based Secured Routing in MANET\u201d,To be published by Springer Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) Series.January,2012<\/li>\n<li>Dr. Debika Bhattacharyya et al.,\u201dDifferent Types of Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata\u201d, To be published by Springer Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) Series.January,2012<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><b>PRE &#8211; DOCTORAL PUBLICATIONS<\/b><\/p>\n<ol>\n<li>Debika Bhattacharyya, N. Das, Dr. Atal Choudhuri, \u201cEmbossing-An efficient text authentication tool for Internet\u201d, The Institution Of Engineers, All India seminar on \u201cIT Enabled Services\u201d(April 2002)<\/li>\n<li>Debika Bhattacharyya, \u201cDesign Space of Competing Computer Architecture\u201d, The Institution Of Engineers, All India seminar on \u201cInside the computer\u201d (Aug2003).<\/li>\n<li>Debika Bhattacharyya, \u201cDistributed Dynamic Channel Allocation\u201d in Seminar on Mobile Communication and Computing 2004, IETE Kolkata (Feb 2004)<\/li>\n<li>Debika Bhattacharyya, &#8211; \u201cReduced Search In Update, A Distributed Dynamic Channel Allocation Algorithm In Mobile Communication Systems\u201d, IEEE, Kolkata(2004).<\/li>\n<li>Debika Bhattacharyya, Dr. P.K. Banerjee, &#8211; \u201cThe Reduced Search In Update Algorithm (RSU) &#8211; A Distributed Dynamic Channel Allocation Algorithm.\u201d Union Radio-ScientifiqueInternationale (International Union Of Radio Science ), New Delhi (Oct 2005)<\/li>\n<li>Debika Bhattacharyya, Dr. P.K. Banerjee, &#8211; \u201cDynamic Channel Reservation Based Call Admission Control in Cellular Mobile Networks\u201d-International Symposium on Wireless Pervasive Computing January 2006 Phuket, Thailand, IEEE.<\/li>\n<li>Debika Bhattacharyya, Dr. P.K. Banerjee, &#8211; \u201cA Fuzzy based Call Admission Control algorithm for providing guaranteed QOS in cellular mobile communication systems\u201d- International conferences on computers and devices for communication-CODEC 06,Institute Of Radiophyics and Electronics and IEEE, Kolkata (Dec 2006).<\/li>\n<li>Debika Bhattacharyya,-\u201cExperimental Survey of Implementing Distributed Dynamic Channel Allocation Algorithm in Mobile Embedded System\u201d, International Conference on Computers and Devices for Communication (CODEC-2006) held in Kolkata, India in December 2006,<\/li>\n<li>Debika Bhattacharyya, &#8211; \u201cImplementation of Reduced Search in Update Algorithm in Mobile Embedded System\u201d, Communicated to International Journal of China Communications,November 2008.<\/li>\n<li>Debika Bhattacharyya,- \u201cDesigning An Adaptive Priority Based Call Admission Control Algorithm for Cellular Mobile Network\u201d-International Seminar on \u201cMulti-Dimensional Advancement in Telecommunication and their Global Importance\u201d,Institution of Engineers,Kolkata(September 2008).<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h2>Prof. HimadriNathSaha<\/h2>\n<h3>Assistant Professor &amp; Assistant HoD\u2013 Computer Science and Engineering<\/h3>\n<p><i class=\"fa fa-envelope\"><\/i> himadri@iemcal.com<\/p>\n<p><b>International Conference Publications:-<\/b><\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li>H. N. Saha, et al., \u201cRestricted Hoping Routing Protocol\u201d, Proceedings of International Conference on Computer Application (ICCA), December 2010.pp.281-290.<\/li>\n<li>H. N. Saha, et al., \u201cEnergy Efficiency in Wireless Network Using Modified Distributed Efficient Clustering Approach\u201d,Proceedings of International Conference on Computer Science and Information Technology (CCSIT), Vol 132, Part II, January 2011, pp.215-222.<\/li>\n<li>H. N. Saha, et al., \u201cA Study of Secure Routing in MANET various attacks and their Countermeasures\u201d, Proceedings of IEM Conference (IEMCON), January 2011, pp.256-261.<\/li>\n<li>H. N. Saha,D. Bhattacharyya,P. K. Banerjee,&#8221;Fidelity Index Based On Demand (FBOD) Secure Routing In Mobile Ad hoc Network&#8221;,Proceedings of International Conference on Parallel Distributed Computing Technologies and Applications(PDCTA), vol-203,Part-II, September 2011, pp.615-627.<\/li>\n<li>H. N. Saha,D. Bhattacharyya,P. K. Banerjee,\u201cDifferent Types of Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata\u201d, Proceedings of International Conference on Computer Science and Information Technology(CCSIT), Vol 84,part-1, 2012, pp.203-213.<\/li>\n<li>H. N. Saha,D. Bhattacharyya, P. K. Banerjee, \u201cEnergy Efficient Administrator Based Secured Routing in MANET\u201d,Proceedings of International Conference on Computer Science, Engineering &amp; Applications (ICCSEA),Vol 167, May2012, pp. 659-672.<\/li>\n<li>H. N. Saha,D. Bhattacharyya, P. K. Banerjee,et al., \u201cAn Efficient Approach to Secure Routing in MANET\u201d, Proceedings of Advances in Computing and Information Technology (ACITY), Vol176, July 2012,pp.765-776.<\/li>\n<li>H. N. Saha,D. Bhattacharyya,P. K. Banerjee, \u201cAdministrator and Trust Based Secure Routing in MANET\u201d,Proceedings of Advances in Mobile Network, Communication and its Applications (MNCAPPS),August 2012,pp.39-45.<\/li>\n<li>H. N. Saha,D. Bhattacharyya, A. K. Bandhyopadhyay,P. K. Banerjee, \u2018Two-level Secure Re-Routing(TSR) in Mobile Ad Hoc Networks\u201d, Proceedings of Advances in Mobile Network, Communication and its Applications (MNCAPPS), August 2012, pp.119-122.<\/li>\n<li>H. N. Saha,D. Bhattacharyya,P. K. Banerjee, \u201cSecure Multipoint Relay based Secure Routing in MANET\u201d, Proceedings ofInternational Conference on Computer Science, Engineering and Information Technology (CCSEIT),October 2012,pp.63-68.<\/li>\n<li>H. N. Saha,D. Bhattacharyya, Banerjee, K. P.et al., \u201cDifferent Routing Protocols and their vulnerabilities and their measures\u201d, Proceedings ofInternational Conference on Computer Science and Electronic Engineering (CSEE), March 2014,pp.192-202.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><b>International Journal Publications:<\/b><\/p>\n<ol>\n<li>H. N. Saha,D. Bhattacharyya,P. K. Banerjee, \u201cA Priority Based protocol for Mitigating Different Attacks in Mobile Ad Hoc Networks\u201d,International Journal for Computer Science and Communication(IJCSC),Vol 1, No2, Impact Factor 1.05, July-December 2010, pp.299-302.<\/li>\n<li>H. N. Saha,D. Bhattacharyya,P. K. Banerjee, \u201cSemi-Centralised Multi Authenticated RSSI Based Solution to Sybil Attack\u201d, International Journal of Computer Science and Emerging Technologies (IJCSET), Vol 1, Issue 4, December 2010, pp.439-436.<\/li>\n<li>H. N. Saha,D. Bhattacharyya,P. K. Banerjee, \u201cMulti-level Secure Routing(MSR) in Mobile Ad Hoc Networks\u201d, IEM International Journal of Management &amp; Technology (IEMIJMT),Vol.1,No.1, January 2011, pp-229-234.<\/li>\n<li>H. N. Saha,D. Bhattacharyya,P. K. Banerjee, \u201cA Distributed Administration Based Approach for Detecting and Preventing Attacks in Mobile Ad Hoc Networks\u201d,International Journal of Scientific and Engineering Research (IJSER), Vol 2, Issue 3,Impact factor 1.4, March 2011, pp.101-111.<\/li>\n<li>H. N. Saha,D. Bhattacharyya, P. K. Banerjee, \u201cMinimized Overhead and Administrator Based Secure Routing Protocol\u201d, International Journal of Computer Appli<\/li>\n<p>cations(IJCA),Volume 25,Number 9, Published by Foundation of Computer Science, New York, USA. Impact factor .8 , July 2011, pp.22-35.<\/p>\n<li>H. N. Saha,D. Bhattacharyya, P. K. Banerjee,\u201cFidelity Based On Demand Secure(FBOD) Routing in Mobile Adhoc Network\u201d International Journal of Advanced Computer Science and Applications(IJACSA), Special Issue on Wireless &amp; Mobile Networks, August 2011, pp.19 \u2013 25.<\/li>\n<li>H. N. Saha,D. Bhattacharyya, P. K. Banerjee, &#8220;A Novel and Efficient Secured Routing Algorithm In Mobile Ad hoc Network&#8221;, International Journal of Wireless &amp; Mobile Networks (IJWMN) Vol. 3, No. 5, October 2011, pp.249-264.<\/li>\n<li>H. N. Saha,D. Bhattacharyya, P. K. Banerjee,et al., \u201c Study of different attacks in Manet with its detection &amp; mitigation schemes\u201d. International Journal of Advanced Engineering Technology (IJAET), Vol 3,Issue 1, Impact factor 2.524, January 2012, pp.383-389.<\/li>\n<li>H. N. Saha,D. Bhattacharyya,P. K. Banerjee, \u201cA Novel Approach for Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata\u201d, International Journal of Ad hoc, Sensor &amp; Ubiquitous Computing (IJASUC) Vol 3, No.2, April 2012, pp.33-49.<\/li>\n<li>H. N. Saha,D. Bhattacharyya,P. K. Banerjee, \u201cA Novel Energy Efficient and Administrator Based Secured Routing MANET\u201d. International Journal of Network Security &amp; Its Applications (IJNSA), Vol.4, No.4, July 2012, pp.73-92.<\/li>\n<li>H. N. Saha,D. Bhattacharyya, P. K. Banerjee. \u201d A Novel Multi Point Relay Based Secure Routing in MANET\u201d, International Journal of Network Security &amp; Its Applications (IJNSA), Vol 4, No.6, November 2012, pp.133-144.<\/li>\n<li>H. N. Saha,D. Bhattacharyya, P. K. Banerjee.et al., &#8220;A Review on Manet Routing Protocols and its vulnerabilities&#8221;, International Journal of Emerging Trends &amp; Technology in Computer Science (IJETTCS) ISSN: 2278-6756 Volume 2, Issue 6,November \u2013 December 2013, pp. 252-262.<\/li>\n<li>H. N. Saha,D. Bhattacharyya,P. K. Banerjee,\u201cA Review on Attacks and Secure Routing Protocols in Manet&#8221;, International Journal of Innovative Research and Review (JIRR) Vol. 1 (2), October-December 2013, pp.12-36.<\/li>\n<li>H. N. Saha, et al, \u201cModified Ant Colony Based Routing algorithm in MANET\u201d, International Journal of computer &amp; organization trends (IJCOT),Vol-3, Issue10,Impact factor .5, November2013, pp.473-477.<\/li>\n<li>H. N. Saha,D. Bhattacharyya,P. K. Banerjee, \u201dModified Dynamic On-demand Routing Protocol\u201d, International Journal of Emerging Trends and Technology in Computer Science (IJETTCS), vol 3,issue 2,Impact factor 2.524, March-April 2014, pp.139-144.<\/li>\n<li>H. N. Saha, et al., \u201cA review on intelligence secure routing protocol in the mobile adhoc networks\u201d, International Journal of Advanced Multidisciplinary Research(IJAMR),Vol 1,Issue 3, December 2014, pp.01\u201313.<\/li>\n<li>H. N. Saha,D. Bhattacharyya,P. K. Banerjee,\u201cEnergy Aware Fidelity Based On Demand Secure(EFBOD) Routing in Mobile Adhoc Network\u201d, International Journal of Wireless Information Networks (IJWI),Springer communicated.<\/li>\n<li>H. N. Saha,D. Bhattacharyya,P. K. Banerjee, P K.Banerjee, \u201cModified Fidelity Based On-Demand Secure (MFBOD) Routing Protocol in Mobile Ad-Hoc Network\u201d, International Journal of foundations of computing and decision sciences (IJFCE), accepted.<\/li>\n<li>H. N. Saha,D. Bhattacharyya,P. K. Banerjee, \u201cImplementation Of Personal Area Network For Secure Routing In MANET By Using Low Cost Hardware\u201cTurkish Journal Of Electrical Engineering &amp; Computer Sciences, communicated.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h2>Prof. Biswajoy Chatterjee<\/h2>\n<h3>Assistant Professor \u2013 Computer Science and Engineering<\/h3>\n<p><i class=\"fa fa-envelope\"><\/i> biswajoy@iemcal.com<\/p>\n<ol>\n<li>B.Chatterjee ,S.Chakraborty ,S.K.Mitra and K.P.Ghatak, \u201cInfluence of Parallel Electric and Magnetic fields on the carrier contribution to the elastic constants in Kane type Semiconductors \u201c in Quantum Matter , accept for publication in 2014<\/li>\n<li>S.Chakbarti ,B.Chatterjee ,S.Debbarma , K.P.Ghatak ,\u201dTwo Dimensional Effective Electron Mass at the Fermi Level in the Quantum Wells of III-V ,Ternarya and uaternary Semiconductors\u201d in the Journal of Nanotechnology ,Vol15,1-12,2014<\/li>\n<li>B.Chatterjee , S.Chakrabarti ,M.Chakraborty ,K.P.Ghatak ,\u201dHeavy Doped Semiconductors sand the Diffusion coefficient to Mobility Relationship \u201c,reviews in Theoretical Science ,accepted for publication in 2014<\/li>\n<li>S. Debbarma , N.Debbarma , M.Mitra , K.P.Ghatak , \u201cCan Photon Influence the Screening Length in the Heavillyl Doped Quantum Wells ?\u201d,Advanced Science ,Engineering and Medicine , Vol 6,1-18 ,2104<\/li>\n<li>B.Chatterjee ,S.Debbarma , M.Mitra ,K.P.Ghatak , \u201cThe Two dimension Magneto ThermoPoweer in Ultra thin films under intense electric field\u201dmJournal of the Nanoscience and Nanotechnology , accepted for publications in 2014<\/li>\n<li>M. Mitra ,B. Chatterjee , K.P.Ghatak ,\u201dD Einstein relation in Quantum wells under strong electric field\u201d,Journal of Computational and Theoretical Nanoscience , accepted for publication in 2014<\/li>\n<li>A. Mitra , B. Chatterjee ,B.K.Mitra ,\u201dIdentification of Primitive Speech Signals using TMS320C54X DSP Processor \u201c,in Proc. Of Eleventh National Conference on Communications (NCC),IIT \u2013Kharagpur ,India ,January 28-30,2005 ,pp.286-290<\/li>\n<li>A.Mitraa ,B.K.Mitra ,Bi.Chatterjee ,\u201dRecognition of Isolated speech signals using Simplified Statistical Parameters \u201c,Enformatika Transactions, Vol.8 , pp. 151-154 ,October 2005<\/li>\n<li>B.Chatterjee,\u201dGamedge :3DModelling \u201c,Invited Paper,Published in 8th WSEAS Int.Conf. on SystemTheory and Scientific Computations(ISTASC\u201908),Rhodes(Rodos)Islands ,Greece,August 20-222,2008 ,ISI Book (Thomson),NAUN Journal.<\/li>\n<\/ol>\n<h2>Prof. Sukalyan Goswami<\/h2>\n<h3>Assistant Professor &amp; Assistant HoD\u2013 Computer Science and Engineering<\/h3>\n<p><i class=\"fa fa-envelope\"><\/i> sukalyan.goswami@gmail.com<\/p>\n<ol>\n<li>SukalyanGoswami , A Comparative Study of Load Balancing Algorithms in Computational Grid Environment , Fifth International Conference on Computational Intelligence, Modeling and Simulation, September, 2013<\/li>\n<li>SukalyanGoswami , Service Oriented Load Balancing Framework in Computational Grid Environment , International Journal of Computers and Technology, Volume 9, Number 3, pp 1091 \u2013 1098<\/li>\n<li>SukalyanGoswami , Enhancement of GSM Security Using Elliptic Curve Cryptography Algorithm , Third International Conference on Intelligent Systems, Modeling and Simulation, ISMS 2012<\/li>\n<li>SouravSaha, SubhabrataSengupta, SukalyanGoswami , An Efficient NLP Based Approach To Personalized Information Retrieval In Web Mining , International Conference on Innovative Techno-Management Solutions for Social Sector, IEMCON, January 2012<\/li>\n<\/ol>\n<h2>Prof. (Dr.) Tamal Chakrabarti<\/h2>\n<h3>Professor \u2013 Computer Science and Engineering<\/h3>\n<p><i class=\"fa fa-envelope\"><\/i> tamal@iemcal.com<\/p>\n<ol>\n<li>Chakrabarti Tamal, SahaSourav and Sinha Devadatta (2013), A Cellular Automata Based DNA Pattern Classifier, CiiT International Journal of Biometrics and Bioinformatics, Volume 5, No. 9, pages 346-352<\/li>\n<li>Chakrabarti Tamal and Sinha Devadatta (2013), Combining Text and Pattern Preprocessing in an Adaptive DNA Pattern Matcher, International Journal of Computer Engineering &amp; Technology, Volume 4, Issue 4, pages 45-51<\/li>\n<li>Chakrabarti Tamal, SahaSourav and Sinha Devadatta (2013), DNA Multiple Sequence Alignment by a Hidden Markov Model and Fuzzy Levenshtein Distance based Genetic Algorithm, International Journal of Computer Applications (0975 \u2013 8887), Volume 73, No. 16, pages 26-30<\/li>\n<li>Banerjee Sagnik, Chakrabarti Tamal and Sinha Devadatta (2013), A Faster Fitness Calculation Method for Genetic Algorithm Based Multiple Protein Sequence Alignment, International Journal of Scientific &amp; Engineering Research, [ISSN: 2229-5518], Volume 4, Issue 7, pages 768-772<\/li>\n<li>Banerjee Sagnik, Chakrabarti Tamal and Sinha Devadatta (2013), Finding All Occurrences of a Pattern by a Genetic Algorithm Based Divide-and-Conquer Method, International Journal of Computer Applications (0975 \u2013 8887), Volume 64, No.18, pages 48-52<\/li>\n<li>Chakrabarti Tamal and Sinha Devadatta (2012), A Fast Divide and Conquer Based Pattern Matcher to Find DNA Patterns, Proceedings of National Conference on Pervasive Computing and Communications, pages 94\u201398<\/li>\n<li>Chakrabarti Tamal and Sinha Devadatta (2012), An Efficient Technique for Finding Longest Common Subsequence of DNA Sequences, IEM International Journal of Management &amp; Technology [ISSN: 2229-6611], Volume 2, Issue 2, pages 37\u201341<\/li>\n<li>Chakrabarti Tamal and Sinha Devadatta (2012), Bidirectional Pattern Matching for DNA Sequences, IEM International Journal of Management &amp; Technology [ISSN: 2296-6611], Volume 2, Issue 1, pages 133\u2013137<\/li>\n<li>Banerjee Sagnik, Chakrabarti Tamal and Sinha Devadatta (2012), A Genetic Algorithm Based Pattern Matcher, International Journal of Scientific &amp; Engineering Research, Volume 3, Issue 11, [ISSN: 2229-5518], (www.ijser.org\/researchpaper%5CA-Genetic-Algorithm-Based-Pattern-Matcher.pdf)<\/li>\n<li>Mukherjee Suvam and Chakrabarti Tamal (2011), Automatic Algorithm Specification to Source Code Translation, Indian Journal of Computer Science and Engineering, Volume 2, Issue 2, p146 \u2013 p159<\/li>\n<li>Chakrabarti Tamal and Sinha Devadatta (2011), DNA Sequence Alignment by Parallel Dynamic Programming. International Conference on Scientific Paradigm Shift in Information Technology &amp; Management.<\/li>\n<\/ol>\n<h2>Prof.Shubhabrata Sengupta<\/h2>\n<h3>Assistant Professor \u2013 Computer Science and Engineering<\/h3>\n<p><i class=\"fa fa-envelope\"><\/i> ssg365@gmail.com<\/p>\n<ol>\n<li>SouravSaha, SubhabrataSengupta, SukalyanGoswami , An Efficient NLP Based Approach To Personalized Information Retrieval In Web Mining , International Conference on Innovative Techno-Management Solutions for Social Sector, IEMCON , January\u2013 2012<\/li>\n<\/ol>\n<h2>Prof. Saptarsi Goswami<\/h2>\n<h3>Assistant Professor \u2013 Computer Science and Engineering<\/h3>\n<p><i class=\"fa fa-envelope\"><\/i> saptarsi.goswami@iemcal.com<\/p>\n<ol>\n<li>SaptarsiGoswami \u201cFeature Selection: A Practitioner View\u201d, International Journal of Information Technology and Computer Science (2014 \u2013 Communicated and Accepted)<\/li>\n<li>Sarkar, SubhajitDey, and SaptarsiGoswami. &#8220;Empirical Study on Filter based Feature Selection Methods for Text Classification.&#8221; International Journal of Computer Applications 81 (2013).<\/li>\n<li>SaptarsiGoswami and AmlanChakrabarti, Quartile Clustering: A quartile based technique for Generating Meaningful Clusters, Journal of Computing Feb 2012 (Impact Factor : .21)<\/li>\n<li>SaptarsiGoswami, Samiran Ghosh, and AmlanChakrabarti, Outlier Detection Techniques for SQL and ETL Tuning , IJCA June 2011 (Impact Factor : .83),<\/li>\n<li>Sarkar, SubhajitDey, and SaptarsiGoswami. &#8220;Empirical Study on Filter based Feature Selection Methods for Text Classification.&#8221; International Journal of Computer Applications 81 (2013).<\/li>\n<li>Dey Sarkar, Subhajit, SaptarsiGoswami, Aman Agarwal, and JavedAktar. &#8220;A Novel Feature Selection Technique for Text Classification Using Na\u00efve Bayes.&#8221; International Scholarly Research Notices 2014 (2014).<\/li>\n<li>Goswami, Saptarsi, and AmlanChakrabarti. &#8220;Feature Selection: A Practitioner View.&#8221; (2014). International Journal of Information Technology and Computer Science<\/li>\n<li>GoswamiSaptarsi et al. . &#8220;Data mining techniques for analyzing murder related structured and unstructured data.&#8221; American Journal Of Advanced Computing 2.2 (2015).<\/li>\n<\/ol>\n<h2>Prof: Kaushik Banerjee<\/h2>\n<h3>Assistant Professor \u2013 Computer Science and Engineering<\/h3>\n<p><i class=\"fa fa-envelope\"><\/i> kaushiksaltlake@gmail.com<\/p>\n<ol>\n<li>Kaushik Banerjee, Subhas De, Rahul Singh , Railway safety signalling , International Journal of Scientific &amp; Engineering Research, Volume 3, Issue 10, October-2012,ISSN 2229-5518<\/li>\n<li>Kaushik Banerjee, Subhas De, Rahul Singh, Souren Jana , Automated mineral detection using SONAR wave, International Journal of Scientific &amp; Engineering Research, Volume 4, Issue 5, May-2013 ,ISSN 2229-5518<\/li>\n<li>Rerouting Based on Receiver Feedback in Real Time StreamingIJCSN International Journal of Computer Science and Network, Volume 3, Issue 3,June 2014 Impact Factor \u2013 0.274ISSN (Online) : 2277-5420<\/li>\n<li>Routing based on Receiver Feedback with Resource Reservation in Real Time NetworksInternational Journal of Innovative Research in Advanced Engineering (IJIRAE) , Volume 1, Issue 10, November 2014<\/li>\n<li>Decision on Pumping Length while applying Pumping Lemma for Regular LanguagesAdamas Technical Review (ATR) , ISSN 2348 \u20133385 , Vol. 1, Issue 1, July 2014<\/li>\n<\/ol>\n<h2>Prof. Nilanjana Dutta Roy<\/h2>\n<h3>Assistant Professor \u2013 Computer Science and Engineering<\/h3>\n<p><i class=\"fa fa-envelope\"><\/i> nilanjanaduttaroy@gmail.com<\/p>\n<ol>\n<li>Nilanjana Dutta Roy , A new approach to an Efficient &amp; Secure Storage &amp; Retrieval of Retinal Template , http:\/\/www.mnkjournals.com\/ijlrst.htm<\/li>\n<li>Nilanjana Dutta Roy , The Biometric Authentication- using Retina &amp; Password Hardening , Tata mc Graw Hill<\/li>\n<li>Nilanjana Dutta Roy ,A New Technique for Unique Binary Tree Formation from its Preorder &amp; Post order Traversals , Springer proceedings<\/li>\n<li>Nilanjana Dutta Roy ,Modified Mergesort algorithm for large set of data , IJIRSE, vol 3, special issue 2,2014<\/li>\n<li>SouravSaha, Nilanjana Dutta Roy , Automatic Detection of Bifurcation Points in Retinal Fundus-Images , International Journal of Latest Research and Technology, ISSN 2278-5299<\/li>\n<li>Nilanjana Dutta Roy et. al., \u201cDetection of Bifurcation Angle in a Retinal Fundus Image\u201d, IEEE Xplore publication of the conference ICAPR 2015, ISI, Kolkata.<\/li>\n<\/ol>\n<h2>Prof: Sanjay Chakraborty<\/h2>\n<h3>Assistant Professor \u2013 Computer Science and Engineering<\/h3>\n<p><i class=\"fa fa-envelope\"><\/i> sanjay_ciem@yahoo.com<\/p>\n<ol>\n<li>Sanjay Chakraborty, Comparison of Various Cluster Validation Indices Using K-means, DBSCAN and PSO-K-means Clustering Algorithms (Paper-528) , International Journal of Information Technology and Computer Science(IJITCS), Communicated and Accepted.<\/li>\n<li>Chakraborty Sanjay and N. K. Nagwani. &#8220;Analysis and study of incremental DBSCAN clustering algorithm.&#8221; Int. J. Enterprise Comput. Bus. Syst (2011).<\/li>\n<li>Chakraborty Sanjay, N. K. Nagwani, and LopamudraDey. &#8220;Performance Comparison of Incremental K-means and Incremental DBSCAN Algorithms.&#8221; International Journal of Computer Applications, Vol.27, (2011)(IF-0.821).<\/li>\n<li>Chakraborty Sanjay and N. K. Nagwani, \u201cPerformance Evaluation of Incremental K-means Clustering Algorithm\u201d,IIJDWM (IFRSA International Journal of Data warehousing and Mining), Vol.1, 2011.<\/li>\n<li>Chakraborty Sanjay, N. K. Nagwani, and LopamudraDey, \u201cWeather Forecasting using Incremental K-means Clustering Algorithm\u201d, CiiT International Journal of Data Mining and Knowledge Engineering, May, 2012(IF-0.621).<\/li>\n<li>Manna Sayani, Chatterjee Satarupa, KoleyTuhina and Chakraborty Sanjay, \u201cStudy and Analysis of a New Encryption Technique using Special Symbols Shifting\u201d, CiiT International Journal of Networking and Communication Engineering, (IF-0.567).<\/li>\n<li>Chakraborty Sanjay and N. K. Nagwani, \u201cStudy and Analysis of Incremental K-Means Clustering Algorithm\u201d- International Conference (HPAGC-2011) Springer (Germany), CCIS-169, 2011.<\/li>\n<li>Chakraborty Sanjay and DeyLopamudra, \u201cCanonical PSO Based K-Means Clustering Approach for Real Datasets\u201d, International Scholarly Research Notices (ISRN Software Engineering), HindawiPublishing Corporation, Vol. 2014.<\/li>\n<li>Chakraborty Sanjay et. al., An Advanced Dictionary Based Lossless Compression Technique for English Text Data\u201dCiiT International Journal of Biometrics and Bioinformatics, Vol. 7,No. 1, 2015<\/li>\n<li>Chakraborty Sanjay et. al., &#8220;Weather Forecasting using Convex hull &amp; K-Means Techniques- An Approach&#8221;, 1st International Science &amp; Technology Congress(IEMCON), Elsevier Science &amp;Technology, pp. 288-295, 2014.<\/li>\n<\/ol>\n<h2>Prof: Sourav Saha<\/h2>\n<h3>Assistant Professor \u2013 Computer Science and Engineering<\/h3>\n<p><i class=\"fa fa-envelope\"><\/i> souravsaha1977@gmail.com<\/p>\n<ol>\n<li>Tamal Chakrabarti, SouravSaha and Devadatta Sinha , A Cellular Automata Based DNA Pattern Classifier , CiiT International Journal of Biometrics and Bioinformatics ISSN 0974 \u2013 9675<\/li>\n<li>Tamal Chakrabarti, SouravSaha and Devadatta Sinha , DNA Multiple Sequence Alignment by a Hidden Markov Model and Fuzzy Levenshtein Distance based Genetic Algorithm , International Journal of Computer Applications ,ISBN 973-93-80876-16-7, 73(16):26-30&#8243;<\/li>\n<li>SouravSaha, Nilanjana Dutta Roy , Automatic Detection of Bifircation Points in Retinal Fundus-Images , International Journal of Latest Research and Technology, ISSN 2278-5299<\/li>\n<li>SouravSaha, SubhabrataSengupta, SukalyanGoswami , An Efficient NLP Based Approach To Personalized Information Retrieval In Web Mining , International Conference on Innovative Techno-Management Solutions for Social Sector, IEMCON, January &#8211; 2012<\/li>\n<li>Chandrama Shaw, PradiptaMaji, SouravSaha, Biplab K. Sikdar, Samir Roy, Parimal Pal Chaudhuri , Cellular Automata Based Encompression Technology for Voice Data , ACRI-2004, Springerlink, Volume 3305 2493<\/li>\n<li>SouravSaha, PradiptaMaji, NiloyGanguly, Samir Roy, and P. Pal Chaudhuri , Cellular Automata Based Model for Pattern Clustering , International Conference on Advances in Pattern Recognition<\/li>\n<li>SouravSaha, PradiptaMaji, NiloyGanguly, Biplab K. Sikdar, and P. Pal Chaudhuri , Evolving Cellular Automata Model for Pattern Recognition and Classification , IEEE International Conference on Systems, Man and Cybernetics (SMC-02)<\/li>\n<li>PradiptaMaji, NiloyGanguly, SouravSaha, Anup K. Roy, and P. Pal Chaudhuri , Cellular Automata Machine for Pattern Recognition , ACRI-2002, Springerlink, Volume 2493.<\/li>\n<\/ol>\n<h2>Prof. Sukanya Mukherjee<\/h2>\n<h3>Assistant Professor \u2013 Computer Science and Engineering<\/h3>\n<p><i class=\"fa fa-envelope\"><\/i> sukanyaiem@gmail.com<\/p>\n<ol>\n<li>Sukanta Das, Nazma N. Naskar, Sukanya Mukherjee, MamataDalui, and Biplab K. Sikdar. &#8220;Characterization of CA rules for SACA targeting detection of faulty nodes in WSN.&#8221; In Cellular Automata, pp. 300-311. Springer Berlin Heidelberg, 2010.<\/li>\n<li>Sukanta Das, Sukanya Mukherjee, NazmaNaskar, and Biplab K. Sikdar. &#8220;Modeling single length cycle nonlinear cellular automata for pattern recognition.&#8221; In Nature &amp; Biologically Inspired Computing, 2009. NaBIC 2009. World Congress on, pp. 198-203. IEEE, 2009.<\/li>\n<li>Sukanta Das, Sukanya Mukherjee, NazmaNaskar, and Biplab K. Sikdar. &#8220;Characterization of Single Cycle CA and its Application in Pattern Classification.&#8221; Electronic Notes in Theoretical Computer Science 252 (2009): 181-203.<\/li>\n<li>Sukanta Das, NazmaNaskar, Sukanya Mukherjee, Biplab K. Sikdar: CA Rules Identification for Efficient Design of Pattern Classifier.CSC 2009: 336-341<\/li>\n<\/ol>\n<h2>Prof. Shraddha Keshav Tripathi<\/h2>\n<h3>Assistant Professor \u2013 Computer Science and Engineering<\/h3>\n<p><i class=\"fa fa-envelope\"><\/i> shuklashraddha28@gmail.com<\/p>\n<ol>\n<li>Review of Reliability Analysis for Component Based Software Systems, Proceedings of 6th National Conference on Computing for Nation Development, INDIACom-2012, New Delhi, India, February 23-24, 2012.<\/li>\n<li>Failure Dependent Reliability Analysis for Component Based Software Systems, 3rd IEEE International Conference on Computer and Communication Technology,ICCCT-2012, MNNIT, Allahabad, Nov 23-24, 2012.<\/li>\n<\/ol>\n<h2>Prof. Soumyadip Banerjee<\/h2>\n<h3>Assistant Professor \u2013 Computer Science and Engineering<\/h3>\n<p><i class=\"fa fa-envelope\"><\/i> soumyadip.banerjee@iemcal.com<\/p>\n<ol>\n<li>S. Banerjee , &#8220;Diffraction Tomog<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Dr. Debika Bhattacharyya Professor &amp; HoD \u2013 Computer Science and Engineering bdebika@yahoo.com POST DOCTORAL PUBLICATIONS Book Chapter: Dr. Debika Bhattacharyya et al., \u201cOverview of End-to-End Wimax Network Achitecture\u201d, accepted as a book chapter for the book \u201cWimax Security and Quality of Service: Providing an End-to-End Explanation\u201d, Book editors: Seok-Yee Tang, Hamid Sharif and Peter Mueller; &hellip; <a href=\"https:\/\/uem.edu.in\/uem-kolkata\/paper-publication\/\">Continued<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-433","page","type-page","status-publish","hentry","wpautop"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Paper Publication - UEM Kolkata<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uem.edu.in\/uem-kolkata\/paper-publication\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Paper Publication - UEM Kolkata\" \/>\n<meta property=\"og:description\" content=\"Dr. Debika Bhattacharyya Professor &amp; HoD \u2013 Computer Science and Engineering bdebika@yahoo.com POST DOCTORAL PUBLICATIONS Book Chapter: Dr. Debika Bhattacharyya et al., \u201cOverview of End-to-End Wimax Network Achitecture\u201d, accepted as a book chapter for the book \u201cWimax Security and Quality of Service: Providing an End-to-End Explanation\u201d, Book editors: Seok-Yee Tang, Hamid Sharif and Peter Mueller; &hellip; Continued\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uem.edu.in\/uem-kolkata\/paper-publication\/\" \/>\n<meta property=\"og:site_name\" content=\"UEM Kolkata\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"19 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-kolkata\\\/paper-publication\\\/\",\"url\":\"https:\\\/\\\/uem.edu.in\\\/uem-kolkata\\\/paper-publication\\\/\",\"name\":\"Paper Publication - UEM Kolkata\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-kolkata\\\/#website\"},\"datePublished\":\"2015-05-21T19:45:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-kolkata\\\/paper-publication\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uem.edu.in\\\/uem-kolkata\\\/paper-publication\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-kolkata\\\/paper-publication\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uem.edu.in\\\/uem-kolkata\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Paper Publication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uem.edu.in\\\/uem-kolkata\\\/#website\",\"url\":\"https:\\\/\\\/uem.edu.in\\\/uem-kolkata\\\/\",\"name\":\"UEM Kolkata\",\"description\":\"University of Engineering and Management Kolkata\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uem.edu.in\\\/uem-kolkata\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Paper Publication - UEM Kolkata","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uem.edu.in\/uem-kolkata\/paper-publication\/","og_locale":"en_US","og_type":"article","og_title":"Paper Publication - UEM Kolkata","og_description":"Dr. Debika Bhattacharyya Professor &amp; HoD \u2013 Computer Science and Engineering bdebika@yahoo.com POST DOCTORAL PUBLICATIONS Book Chapter: Dr. Debika Bhattacharyya et al., \u201cOverview of End-to-End Wimax Network Achitecture\u201d, accepted as a book chapter for the book \u201cWimax Security and Quality of Service: Providing an End-to-End Explanation\u201d, Book editors: Seok-Yee Tang, Hamid Sharif and Peter Mueller; &hellip; Continued","og_url":"https:\/\/uem.edu.in\/uem-kolkata\/paper-publication\/","og_site_name":"UEM Kolkata","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"19 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/uem.edu.in\/uem-kolkata\/paper-publication\/","url":"https:\/\/uem.edu.in\/uem-kolkata\/paper-publication\/","name":"Paper Publication - UEM Kolkata","isPartOf":{"@id":"https:\/\/uem.edu.in\/uem-kolkata\/#website"},"datePublished":"2015-05-21T19:45:37+00:00","breadcrumb":{"@id":"https:\/\/uem.edu.in\/uem-kolkata\/paper-publication\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uem.edu.in\/uem-kolkata\/paper-publication\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uem.edu.in\/uem-kolkata\/paper-publication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uem.edu.in\/uem-kolkata\/"},{"@type":"ListItem","position":2,"name":"Paper Publication"}]},{"@type":"WebSite","@id":"https:\/\/uem.edu.in\/uem-kolkata\/#website","url":"https:\/\/uem.edu.in\/uem-kolkata\/","name":"UEM Kolkata","description":"University of Engineering and Management Kolkata","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uem.edu.in\/uem-kolkata\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack-related-posts":[{"id":7046,"url":"https:\/\/uem.edu.in\/uem-kolkata\/department-of-electrical-engineering\/placement\/","url_meta":{"origin":433,"position":0},"title":"Placement","author":"UEM Group","date":"February 11, 2019","format":false,"excerpt":"Placement Details of Students EE 4th\u00a0Year (2019 Pass out Till 18\/01\/2019) NAME COMPANY PICTURE NANDINI BHATTACHARYYA TCS RAJDEEP ROY TCS SANKHADEEP KUNDU WIPRO SHRAMANA ROY TCS TUHIN SARKAR WIPRO DWIPAYAN GUPTA WIPRO DEBDOOT GANGULY WIPRO RAJESH DUSAD WIPRO TANMOY DUTTA WIPRO SOUMYA GHATAK WIPRO SILAJIT GHOSH WIPRO","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":511,"url":"https:\/\/uem.edu.in\/uem-kolkata\/management\/","url_meta":{"origin":433,"position":1},"title":"Management","author":"UEM Group","date":"May 28, 2015","format":false,"excerpt":"Prof. Banani Chakrabarti, Chancellor Chancellor Prof. Dr. Satyajit Chakrabarti Vice Chancellor, University of Engineering & Management (UEM), Kolkata Prof. Dr. Satyajit Chakrabarti, Vice Chancellor, UEM a premier organization in education sector in India, started many entrepreneurial ventures. He is also Director of Institute of Engineering & Management (IEM) and University\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/media.uem.edu.in\/uploads\/sites\/2\/2024\/07\/WhatsApp-Image-2024-07-18-at-12.57.06-PM.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/media.uem.edu.in\/uploads\/sites\/2\/2024\/07\/WhatsApp-Image-2024-07-18-at-12.57.06-PM.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/media.uem.edu.in\/uploads\/sites\/2\/2024\/07\/WhatsApp-Image-2024-07-18-at-12.57.06-PM.jpeg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/media.uem.edu.in\/uploads\/sites\/2\/2024\/07\/WhatsApp-Image-2024-07-18-at-12.57.06-PM.jpeg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/media.uem.edu.in\/uploads\/sites\/2\/2024\/07\/WhatsApp-Image-2024-07-18-at-12.57.06-PM.jpeg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":6455,"url":"https:\/\/uem.edu.in\/uem-kolkata\/department-of-hotel-hospitality-management\/news-and-achievements\/","url_meta":{"origin":433,"position":2},"title":"News and Achievements","author":"UEM Group","date":"February 8, 2019","format":false,"excerpt":"Print Media coverage of BHM Department, UEM Kolkata MoU signed between UEM Kolkata and Novotel Kolkata \u2013 Hotel and Residences on 14th February, 2022. MoU signed between UEM Kolkata and Lemon Tree Premium Kolkata on 13th April, 2022. Distinguished Guest Lecture Series SL NO Personality Name and Organization Date Topic\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/media.uem.edu.in\/uploads\/sites\/2\/2022\/06\/9th-Page-1_page-0001-150x150.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/media.uem.edu.in\/uploads\/sites\/2\/2022\/06\/9th-Page-1_page-0001-150x150.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/media.uem.edu.in\/uploads\/sites\/2\/2022\/06\/9th-Page-1_page-0001-150x150.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/media.uem.edu.in\/uploads\/sites\/2\/2022\/06\/9th-Page-1_page-0001-150x150.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/media.uem.edu.in\/uploads\/sites\/2\/2022\/06\/9th-Page-1_page-0001-150x150.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/media.uem.edu.in\/uploads\/sites\/2\/2022\/06\/9th-Page-1_page-0001-150x150.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":1844,"url":"https:\/\/uem.edu.in\/uem-kolkata\/department-of-electrical-engineering\/paper-publications\/","url_meta":{"origin":433,"position":3},"title":"Paper Publications","author":"UEM Group","date":"March 16, 2016","format":false,"excerpt":"Books Published: Sl No Name Details 1 Dr. N. K. Mandal A Text Book of Electrical Technology NabaPrakashani, Kolkata(2017) Book Chapter Published: Sl No Name Details 1 Dr. N. K. Mandal Chapter 5: Performance Evaluation of Robotic Systems Book Name: Novel Perspective of Engineering Research Book Publisher International ISBN: 978-93-5547-166-6\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6690,"url":"https:\/\/uem.edu.in\/uem-kolkata\/department-of-computer-applications\/achievements\/","url_meta":{"origin":433,"position":4},"title":"Achievements","author":"UEM Group","date":"February 9, 2019","format":false,"excerpt":"Student Achievements: Research Paper Published (International Journal): Sl no Name Details 1 Sayan Kumar Dey, Deepjyoti Chakraborty, Aritra Ghosal, Shadab Akhtar \u201cCharacter Segmentation for Handwritten Bangla Words using Image Processing\u201d, P.Mitra, K.Bhattacharjee, A.Das, et. al., in American Journal of Electronics & Communication (AJEC), Vol. 1, Issue 3, Pp. 8 -\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":13394,"url":"https:\/\/uem.edu.in\/uem-kolkata\/department-of-computer-science-and-engineering-iot-cs-bt\/faculty-achievements\/","url_meta":{"origin":433,"position":5},"title":"Faculty Achievements","author":"UEM Group","date":"October 26, 2024","format":false,"excerpt":"Dr. Sandip Mandal, Reviewer of IEEE CCWC 2023 Dr. Sandip Mandal, Reviewer of UEMCON 2023 Dr. Sandip Mandal, Reviewer of IEMCON 2023 Dr. Sandip Mandal, Reviewer of CCWC 2023 Dr. Sandip Mandal, Reviewer of IRTM 2023 Dr. Sandip Mandal, Editorial Board Member of Edwin Group of Journals (SCI & SCOPUS).\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_shortlink":"https:\/\/wp.me\/P7ldC2-6Z","_links":{"self":[{"href":"https:\/\/uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/pages\/433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/comments?post=433"}],"version-history":[{"count":0,"href":"https:\/\/uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/pages\/433\/revisions"}],"wp:attachment":[{"href":"https:\/\/uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/media?parent=433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}