Format for Details about the Institution seeking support for PhD candidates

Size: px
Start display at page:

Download "Format for Details about the Institution seeking support for PhD candidates"

Transcription

1 Format for Details about the Institution seeking support for PhD candidates Institution Details: Name of the University/ Institution : University of Calcutta Postal Address with phone/ Fax/ Senate House, 8 /1 College Street, Kolkata-0003, West Bengal, India. Phone : Status: Central Univ. /State University/ Deemed Univ./Private Univ. / Institute, etc. Contact details of Nodal Person with phone/fax/ appointed by Institution for the PhD Scheme of DeitY : Prof. Nabendu Chaki Department of Computer Science & Engineering Room No. 216, Block JD, Salt Lake, PIN Phone: Availability of Hostel accommodation : Yes Whether the institute is recognized by UGC for award of PhD degree: Yes Department Details: Name of Department Current Areas of Research of the department : : Computer Science and Engineering Software Engineering, Image Processing, Bio-Medical Engineering, Cloud Computing, Algorithms, VLSI, Smart Power Grid, Networking, Information and Network Security, Pervasive Computing, Big Data Number of faculties/ guides in the department with name and other details : Please see Annexure I Current number of PhDs in the department (average of last three year intake) : 28 A total of 84 PhD students have enrolled in last 3 years (34 in 2012, 2 in 2013 and 23 in 2014) Distribution of current PhD candidates among the Faculty/ Guides: Please see Annexure II for details Availability of Infrastructural Facilities in the department /Institute/ Univ.: Please see Annexure III for details Capacity to take additional PhD candidates : 16 (15.8) Please see Annexure II for details

2

3 Annexure I Serial Number List of Faculty Members and other Supervisors Departmental Faculty Members Name of the Faculty Member Designation Qualification No. of publications as per Scopus Listing Imternational Patents 1 Sankhayan Choudhury Professor and Head Ph.D., M. Tech (patent pending) 2 Nabendu Chaki Professor Ph.D., M. Tech (plus 2 pending) 3 Rajat Kumar Pal Professor Ph.D., M. Tech. 2 2 (patent pending) 4 Samir Kumar Bandyopadhyay Professor (Re-employed) Ph.D., M. Tech Samar Sen Sarma Professor (Re-employed) Ph.D., M. Tech Devadutta Sinha Professor (Re-employed) Ph.D., M. Tech. 2 0 Shefali Bose Associate Professor Ph.D., M. Tech Rajib Kumar Das Associate Professor Ph.D., M. Tech Kashinath Dey Associate Professor M. Tech Banani Saha Associate Professor Ph.D., M. Tech Sanjit Kumar Setua Associate Professor M. Tech Pritha Banerjee Assistant Professor Ph.D., M. Tech Sunirmal Khatua Assistant Professor M. Tech Supervisors from other Departments, Sister Institutes and other External Supervisors Serial Name of the Faculty Member Number 14 Amlan Chakraborty 15 B. B. Chaudhuri 16 C A Murty 1 Debaprasad Mondal 18 Debasis Giri 19 Gautam Roy 20 Kumar Shankar Roy 21 Kuntal Ghosh 22 Malay Kumar Kundu 23 Monalisa Banerjee 24 Nabanita Das 25 Pabitra Pal Choudhury 26 Paramartha Dutta 2 Pradipta Maji 28 Rajat Kumar De 29 Rajat Kumar Dey 30 Ranjan Das Gupta 31 Ranjan Ghosh 32 Rituparna Chaki 33 Sabnam Sengupta 34 Samir Roy 35 Samiran Chattopadhyay 36 Sanghamitra Bandyopadhyay 3 Sankar Kumar Pal 38 Sarbani Palit 39 Sasthicharan Ghosh 40 Sriyankar Acharya, WBUT Name of University / Institute A K Choudhury School of IT, University of Calcutta NIRJAFT, Kolkata Techno India, Salt Lake Bishwabharati University, Shantiniketan NITTTR, Kolkata Radio Physics & Electronics, University of Calcutta A K Choudhury School of IT, University of Calcutta B P Poddar Institute of Technology, Kolkata NITTTR, Kolkata Jadavpur University West Bengal University of Technology, Salt Lake

4 Serial Name of the Faculty Member Number 41 Subhamoy Mitra 42 Subhra Sankar Ray 43 Sushmita Mitra 44 Susmita Sur Koley 45 Umapada Pal 46 Utpal Garai 4 Utpal Roy Name of University / Institute Bishwabharati University, Shantiniketan Annexure I Supervisors from International Collaboration Programs Serial Name of the Faculty Member Number 48 Aditya Ghosh 49 Agostino Cortesi 50 Khalid Saeed Name of University / Institute Wollongong University, New South Wales Ca Foscari University, Venice AGH University of Science & Technology, Cracow Country Australia Italy Poland

5 Distribution of current PhD candidates among Supervisors Annexure II Serial Number Departmental Faculty Members Name of the Faculty Member Name of University / Institute Scholars enrolled Total in last 3 year* number of scholars** Sankhayan Choudhury University of Calcutta, Kolkata, India Nabendu Chaki University of Calcutta, Kolkata, India Rajat Kumar Pal University of Calcutta, Kolkata, India Samir Kumar Bandyopadhyay University of Calcutta, Kolkata, India Samar Sen Sarma University of Calcutta, Kolkata, India Devadutta Sinha University of Calcutta, Kolkata, India Shefali Bose University of Calcutta, Kolkata, India Rajib Kumar Das University of Calcutta, Kolkata, India Kashinath Dey University of Calcutta, Kolkata, India Banani Saha University of Calcutta, Kolkata, India Sanjit Kumar Setua University of Calcutta, Kolkata, India Pritha Banerjee University of Calcutta, Kolkata, India Sunirmal Khatua University of Calcutta, Kolkata, India * Full Time: 8 and Part Time: 42 Provision of new Scholars as per University PhD rule **Total number of enrolled PhD scholars includes the 8 scholars who has enrolled prior to 2012 and currently with the Program

6 Supervisors from other Departments, Sister Institutes and other External Supervisors Annexure II Serial Number Name of the Faculty Member Name of University / Institute Current number of Scholars Provision of new Scholars as per University PhD rule 14 Amlan Chakraborty A K Choudhury School of IT, University of Calcutta 1 15 B. B. Chaudhuri 1 16 C A Murty 1 1 Debaprasad Mondal Debasis Giri Haldia Institute of Technology, Haldia 1 19 Gautam Roy NIRJAFT, Kolkata 1 20 Kumar Shankar Roy 1 21 Kuntal Ghosh 1 22 Malay Kumar Kundu Monalisa Banerjee Techno India, Salt Lake 1 24 Nabanita Das 1 25 Pabitra Pal Choudhury Paramartha Dutta Bishwabharati University Pradipta Maji 1 28 Rajat Kumar De 1 29 Rajat Kumar Dey 1 30 Ranjan Das Gupta NITTTR, Kolkata 1 31 Ranjan Ghosh Radio Physics & Electronics, University of Calcutta 1 32 Rituparna Chaki A K Choudhury School of IT, University of Calcutta Sabnam Sengupta B P Poddar Institute of Technology, Kolkata 1 34 Samir Roy NITTTR, Kolkata 1 35 Samiran Chattopadhyay Jadavpur University 1 36 Sanghamitra Bandyopadhyay Sankar Kumar Pal Sarbani Palit 1 39 Sasthicharan Ghosh 1 40 Sriyankar Acharya, WBUT West Bengal University of Technology 1 41 Subhamoy Mitra 1 42 Subhra Sankar Ray Sushmita Mitra 1 44 Susmita Sur Koley Umapada Pal 1 46 Utpal Garai 1 4 Utpal Roy Bishwabharati University 3 5 Supervisors from International Collaboration Programs Serial Number Name of the Faculty Member Name of University / Institute Current number of Scholars Provision of new Scholars as per University PhD rule 48 Aditya Ghosh Wollongong University, New South Wales, Australia 1 49 Agostino Cortesi Ca Foscari University, Venice, Italy 1 50 Khalid Saeed AGH University of Science & Technology, Poland 1

7 Annexure IIA Computation for Capacity M S F S/F T A Capacity This calculation is done considering only the scholars enrolled under the supervision of Departmental faculty members.

8 Annexure III INFRASTRUCTURE IN THE DEPARTMENT / UNIVERSITY The Department of Computer Science and Engineering, was established in 1980 at Rashbihari campus at 92 APC Road, Rajabazar and probably the first department in country who had offered Bachelor course in Computer Science. Being one of the departments of the Engineering and Technology faculty since then, the department began to contribute in creation of intellectual foundations of Indian Technologies. These activities were started under the able leadership of Late Professor Arun Kumar Choudhury. Prof. Arun Kr. Choudhury is normally remembered as a father figure of switching theory and his contribution in Computer Science is like Von Neumann in our country. The computing community of the world today bears his legacy and legend. Obviously, the entire computing arena of the University of Calcutta including this Department and the School of Information Technology named after him is built on the foundation laid by Professor Arun Kumar Choudhury in the late eighties. The first batch passed out in The department has grown up steadily keeping pace with the development in the industries and need for qualified graduates, post-graduates to meet the challenging scenarios of the day. Now shifted to the newly constructed campus at Salt Lake, the Department has a new and excellent infrastructure with three full-time courses being conducted for B. Tech., M. Tech. and M. Sc. programs. Besides, it offers one of the largest PhD programs in the entire country with more than 100 enrolled PhD scholars. FACILITIES Department have plenty of infrastructural facilities with almost square feet area in the second floor of Technology campus at Salt lake. Six Software laboratories are well equipped with machines and the software for smooth running of the course. Specialized laboratories are there that offers the scope of cutting edge technology researches including cloud computing, sensor network laboratories. Classrooms are prepared with equipment for supporting ideal deliberation environment. Hardware laboratory is one of our strength for offering the courses like Digital logic, Microprocessor etc. The satisfactory performance of the department during last thirty five years is due to the strength of our faculty members. We have 18 sanctioned faculty positions, all the faculty members with their huge experience are actively participating for disseminating knowledge among the students in a very cordial environment. COURSES The Department of Computer Science and Engineering offers three courses: B. Tech. in Computer Science & Engineering (Intake 40), M.Sc. in Computer & Information Science (Intake: 30) and the M. Tech. in Computer Science & Engineering (Intake: 41). Beside this, the Department runs two PhD programs one in Technology and one for Science students. RESEARCH AREAS Distinctly the faculty members are involved in identified thrust areas. These are broadly Distributed Computing, Software Engineering, VLSI design, Information Security and

9 Image Analysis. At present four externally funded research projects are going on with the value of 2.50 crores. Research students, post graduate students are contributing in a regular basis under the able leadership of the supervisors (faculty members) in the national and international journals and conferences. The laboratories are also equipped for providing the necessary assistance to the research students. Publications and the patents in the last few years stand out as icons of research activities of the department. [Research Papers : 59, 2011: 94, 2012: 54, 2013: 1, Number of International Patents in last 3 years: 04, (3 more patent documents are published in USPTO, patents are pending). COLLABORATIVE INITIATIVE(S) The department has strong collaboration, especially for research work, with other National and International institutes. Some collaborative efforts are also going with Industry houses. Jadavpur University, NIT, Durgapur, IISET (Former BESU), ISI are the collaborators at National level. Some of the International collaborators are Ca Foscari University (Italy), Wollongong University (Australia), AGH University of Science & Technology (Poland). In Research program, collaborative efforts are going on with prominent industry houses like Tata Consultancy Service, Ixia etc. Nature of International Collaborations: Ca Foscari University, Venice, Italy Name of collaborators: Agostino Cortesi (Ca Foscari), Nabendu Chaki, Rituparna Chaki, Sankhayan Choudhury Activities: o Joint publications: 1 co-authored book (in press), 3 co-edited Springer proceedings, 4 research papers o Joint PhD supervision: 1 scholar registered in the University of Calcutta o Joint organization of international conferences in Europe and in India: 4 o Teaching by overseas collaborator in the University of Calcutta, India o Teaching by Indian collaborator in Ca Foscari University, Venice, Italy o MoU signed between the two Universities AGH University of Science & Technology, Cracow, Poland Name of overseas collaborator: Khalid Saeed (AGH), Nabendu Chaki, Rituparna Chaki, Sankhayan Choudhury Activities: o Joint publications: 2 co-authored books, 4 co-edited Springer proceedings, 6 research papers o Joint PhD supervision: 1 scholar completed PhD from the University of Calcutta o Joint organization of international conferences in Europe and in India: o Teaching by overseas collaborator in the University of Calcutta, India o Teaching by Indian collaborators in AGH University of Science & Tech., Poland o MoU signed between the two Universities Wollongong University, Australia Name of overseas collaborator: Aditya Ghosh (WU), Nabendu Chaki, Sankhayan Choudhury Activities: o Joint publications: 2 research papers o Joint PhD supervision: 1 scholar registered in the University of Calcutta

10 o Joint organization of international conferences: 2 o Teaching by overseas collaborator in the University of Calcutta, India o Visit by Indian collaborator in Wollongong University, Australia o MoU signed between the two Universities PLACEMENT Most of the students are placed in reputed industry houses through campus interview. We have a alumni base in Tata Consultancy Service, Cognizant Training Solutions, Wipro, Texas Instruments, Infosys, Amazon, SAS, Yahoo R&D, Ixia, Mahindra British Telecom etc. In academic world our alumni are participating successfully in the academic and research institutes like Jadavpur University, Indian Institute of Technology (IITs), IISC (Bangalore), IISET, Indian Statistical Institute, NITTTR, National Institute of Technology (NITs), University of Texas at Arlington, Colorado University, University of Wisconsin, etc. MISCELLANEOUS The faculty members of the Department are quite active in promoting academic activities like organizing conferences, publishing books, taking part in standard bodies, etc. in India and abroad. In last few years, the Department has jointly several organized conferences, symposiums and workshops in different parts of India and Europe including Italy, Poland, Czech Republic and Vietnam. Besides, the faculty members regularly serve as Program Chairs, Invited Speakers as well as Program Committee members for different conferences organized all over the world. Some of them serve in the Editorial Board of SCI indexed journals.

11 Annexure IV BRIEF ON RESEARCH AREAS PROPOSED I. Software Engineering: The focus of this area is on three diverse aspects of software engineering. These sub-areas are Requirements Engineering, Data Analytics, and Business Process design. Arguably, Requirements Specification and Analysis phase seems to be the most ambiguous phase of the System Development Life Cycle (SDLC). We propose to formalize the task using modeling. Formal models will also help in checking for inconsistencies and non-conformance to company policies. Analytical processing on multi-dimensional data is often performed over data warehouse. This, in general, is presented in the form of cuboids. All possible combination of the cuboids could be generated from base cuboid using successive roll-up operations and this corresponds to a lattice structure. The emphasis of the research group is towards developing appropriate semantic data models for analysis of semi-structured data in large volume. This includes transformation and loading of data into these data models and making them ready for analysis. Besides lattice and hyper-lattice, we propose to work with graph data models and the so-called schema-less frameworks for handling Big Data. An efficient and flexible business process helps an organization to meet the requirements of the evolving surroundings. Besides, this would facilitate a competitive advantage over other companies towards delivering services in a way that provides competitive edges over rivals. It is important that the possible process designs can be validated against the service goals and constraint satisfaction. In case more than one valid process designs are derived, the proposed mechanism should eventually be able to identify an optimal solution based on one or multiple criteria pertinent to specific clients. II. III. Medical Image processing to aid Diagnosis of Diseases: Biomedical imaging is the application of engineering methods to detect and visualize the biological processes in our body. Medical imaging is very helpful for the physician to measure, diagnose, treat and even simulate about the medical illness, conditions and treatment. This technique helps the doctor to see inside the body without making an incision. Basically it is a standard modern medical care for cancer, stroke, heart disease, trauma, neurological disorders and many more. Nowadays, it is used by a wide range of medical specialist from oncologists to robotic surgery. The research aims to build new, safe and low cost early prediction systems based on optical image processing. However, once the primary target is achieved, the research outcome on medical image processing can be extended for other purposes. This includes detection of patches that may lead to cancer, aid in cosmetic Surgery, etc. Smart Grid Computing: A smart power grid is an intelligent network that integrates activities like power generation, transmission, distribution and optimizes services like autonomic recovery management, smart billing, etc. Smart power grid makes use of advanced information, control, and communication technologies to save energy, lower cost and increase reliability and transparency in the entire system. The backbone of the Smart Grid will be its network that connects different components of the Smart Grid together, and allow two-way communication between them. Networking the components together will introduce security risks into the system. The primary focus of research in this area is to secure smart grids. Besides security, several novel computing issues are associated

12 with smart power grid. Dynamic distribution of power based on changing demands of users is another interesting and goal-oriented research aspect. IV. Pervasive Computing and Remote Healthcare: We aim to deliver an integrated framework for taking healthcare services to the doorsteps of those, who cannot come to the hospital for different reasons. This is especially for elderly, women, children, and people living in distant villages. The solution is also applicable to distressed people who cannot be brought to a hospital immediately. While the proposed research aims to devise innovative core technologies using clouds, sensors and mobile/pervasive computing with efficient utilization of resources, the findings of the project will be carried to the end users through active collaborations with healthcare-related Government agencies and NGOs. V. Biometrics and Networks Security: Biometrics is increasingly gaining importance in authenticating a user in the age of rapid spread of autonomic and ubiquitous computing. Biometric traits include fingerprint, hand shape, finger shape, palm-print, finger vein pattern, iris, retina, face, ear shape, teeth, voice, gait, keystroke, signature, body odor, brain wave, ECG, nail surface etc. User authentication based on biometric features is often considered more reliable than the traditional means of password authentication as biometric traits cannot be lost or forgotten and unlike conventional passwords or authentication keys, biometric signatures are very difficult to copy and share. However, in the current state of maturity, one of the major challenges of biometric authentication is its rather lower level of accuracy. Besides, session of valid users can be hijacked by impostor if the authentication is only one-time at the beginning of each session. We aim to devise a practical approach towards continuous or semi-continuous authentication, where user is verified repeatedly throughout the lifetime of session. Besides user authentication, securing data over heterogeneous networking platform is another major challenge that we plan to mitigate. These days networking for most of the applications involve heterogeneity and often it s a mix between conventional wired network and wireless, ad-hoc networks. Keeping in pace with the varied standards and protocols that are in use today securing a hybrid network is indeed a challenge. The broad objective of the scholars working in this area is to secure the next-generation networks.

13 Annexure V PUBLICATION LISTS FOR SUPERVISORS (FROM SCOPUS) PUBLICATION LIST FOR NABENDU CHAKI (FROM SCOPUS) OTHER THAN BOOKS Edited Volumes: 1. Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki; Applied Computation and Security Systems; Springer Advances in Intelligent Systems and Computing (AISC) Series, vol. 304, ISBN: Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki; Applied Computation and Security Systems; Springer Advances in Intelligent Systems and Computing (AISC) Series, vol. 305, ISBN: Meghanathan, Natarajan; Chaki, Nabendu; Nagamalai, Dhinaharan (Eds.); Proceedings of the Fourth International Conference on Networks & Communications (NetCom); Springer Lecture Notes in Electrical Engineering (LNEE), Vol. 131, ISBN: Cortesi, A.; Chaki, N.; Saeed, K.; Wierzchoń, S. (Eds.); Proceedings of the 11th IFIP TC 8 International Conference, CISIM 2012, Venice, Italy, September 26-28, 2012, Springer Lecture Notes in Computer Science (LNCS), Vol. 564, ISBN: Meghanathan, Natarajan; Chaki, Nabendu; Nagamalai, Dhinaharan (Eds.); Advances in Computer Science and Information Technology; Proceedings of 2 nd International Conference (CCSIT), Bangalore, India, Part I, Springer Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Vol. 84, ISBN Meghanathan, Natarajan; Chaki, Nabendu; Nagamalai, Dhinaharan (Eds.); Advances in Computer Science and Information Technology; Proceedings of 2 nd International Conference (CCSIT), Bangalore, India, Part II, Springer Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Vol. 85, ISBN Meghanathan, Natarajan; Chaki, Nabendu; Nagamalai, Dhinaharan (Eds.); Advances in Computer Science and Information Technology; Proceedings of 2 nd International Conference (CCSIT), Bangalore, India, Part III, Springer Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Vol. 86, ISBN: Meghanathan, Natarajan; Nagamalai, Dhinaharan; Chaki, Nabendu (Eds.); Advances in Computing and Information Technology; Proceedings of the 2 nd International Conference on Advances in Computing and Information Technology (ACITY), 2012, Chennai, India. Springer Advances in Intelligent Systems and Computing (AISC) Series, Vol. 16, ISBN: Meghanathan, Natarajan; Nagamalai, Dhinaharan; Chaki, Nabendu (Eds.); Advances in Computing and Information Technology; Proceedings of the 2 nd International Conference on Advances in Computing and Information Technology (ACITY), 2012, Chennai, India. Springer Advances in Intelligent Systems and Computing (AISC) Series, Vol. 1, ISBN: Meghanathan, Natarajan; Nagamalai, Dhinaharan; Chaki, Nabendu (Eds.); Advances in Computing and Information Technology; Proceedings of the 2 nd International Conference on Advances in Computing and Information Technology (ACITY), 2012, Chennai, India. Springer Advances in Intelligent Systems and Computing (AISC) Series, Vol. 18, ISBN: Chaki, Nabendu; Cortesi, Agostino (Eds.); Computer Information Systems - Analysis and Technologies; Proceedings of the 10 th International Conference, CISIM 2011, Kolkata, India, December 14-16, 2011, Springer CCIS Series, Vol. 245, ISBN

14 12. Wyld, D.C.; Wozniak, M.; Chaki, N.; Meghanathan, N.; Nagamalai, D.; Proceedings of the 4 th International Conference on Network Security and Applications, CNSA 2011, Chennai, India, July 15-1, Springer CCIS Series, Vol. 196, 2011, ISBN: Wyld, D.C.; Wozniak, M.; Chaki, N.; Meghanathan, N.; Nagamalai, D.; Proceedings of the 4 th International Conference on Trends in Network and Communications, NeCOM 2011, WeST 2011, WiMON 2011, Chennai, India. Springer CCIS Series, Vol. 19, 2011, ISBN: Wyld, D.C.; Wozniak, M.; Chaki, N.; Meghanathan, N.; Nagamalai, D.; Proceedings of the International Conference on Advances in Computing and Info. Tech., ACITY 2011, Chennai, India, July 15-1, Springer CCIS Series, Vol. 198, 2011, ISBN: Özcan, Abdulkadir; Chaki, Nabendu; Nagamalai, Dhinaharan; Proceedings of the 2 nd International Conference on Wireless & Mobile Networks, WiMo 2010, Ankara, Turkey, June 26-28, 2010, Springer CCIS Series, Vol. 84, 2010, ISBN: Meghanathan, N.; Boumerdassi, S.; Chaki, N.; Nagamalai, D.; Proceedings of the 3rd International Conference on Network Security and Applications, CNSA 2010, Chennai, India, July 23-25, 2010, Springer CCIS Series, Vol. 89, 2010, ISBN: Meghanathan, N.; Boumerdassi, S.; Chaki, N.; Nagamalai, D.; Proceedings of the International Conferences, NeCoM 2010, WiMoN 2010, WeST 2010,Chennai, India, July 23-25, Springer CCIS Series, Vol. 90, 2010, ISBN: Journals: 18. Deb N, Chakraborty M, Chaki N. CORIDS: A cluster-oriented reward-based intrusion detection system for wireless mesh networks. Security and Communication Networks. 2014; (3): Sen S, Roy S, Sarkar A, Chaki N, Debnath N. C. Dynamic discovery of query path on the lattice of cuboids using hierarchical data granularity and storage hierarchy. Journal of Computational Science. 2014; 5(4): Chakraborty S, Chaki N. Generic organization of semi-structured data. Computer Systems Science and Engineering. 2014; 29(1): Kanrar S, Chattopadhyay S, Chaki N. A new link failure resilient priority based fair mutual exclusion algorithm for distributed systems. Journal of Network and Systems Management 2013; 21(1): Shaikh S H, Maiti A K, Chaki N. A new image binarization method using iterative partitioning. Mach Vision Appl 2013; 24(2): Dey A, Chaki N, Sanyal S. Modeling smart grid using generalized stochastic petri net. Journal of Convergence Information Technology. 2011; 6(11): Sarkar A, Choudhury S, Chaki N, Bhattacharya S. Quality evaluation of conceptual level object-oriented multidimensional data model. International Journal of Computers and Applications. 2010; 32(3): Chaki N, Sarkar B B. Virtual data warehouse modeling using petri nets for distributed decision making. Journal of Convergence Information Technology. 2010; 5(5) 26. Roy D B, Chaki R, Chaki N. BHIDS: A new, cluster based algorithm for black hole IDS. Security and Communication Networks. 2010; 3(2-3): Kanrar S, Chaki N. FAPP: A new fairness algorithm for priority process mutual exclusion in distributed systems. Journal of Networks. 2010; 5(1): Choudhury S, Chaki N, Bhattacharya S. GDM: A new graph based data model using functional abstractionx. Journal of Computer Science and Technology. 2006; 21(3): Chaki N, Bhattacharya S. Performance analysis of multistage interconnection networks with a new high-level net model. J Syst Archit. 2006; 52(1):56-0. Peer-reviewed Conference Proceedings: 30. Ghosh A, Chaki N. Design of a new OFTM algorithm towards abort-free execution; p.

15 31. Sen S, Dutta A, Cortesi A, Chaki N. A new scale for attribute dependency in large database systems; p. 32. Dasgupta M, Chaudhury S, Chaki N. A hierarchical CPN model for mobility analysis in zone based MANET; p. 33. Chakraborty S, Chaki N. A survey on the semi-structured data models; p. 34. Mishra R K, Saha S, Choudhury S, Chaki N. Agent based approach for radio resource optimization for cellular networks; p. 35. Shaikh S H, Maiti AK, Chaki N. On creation of reference image for quantitative evaluation of image thresholding method; p. 36. Shaikh SH, Chaki N. A low cost moving object detection method using boundary tracking; p. 3. Chakraborty S, Chaki N. Trusted third party synchronized billing framework using multiple authorizations by multiple owners (MAMO); p. 38. Mishra RK, Choudhury S, Chaki N. E2IRP: A New Energy Efficient Integrated Routing Protocol for MANET; p. 39. Nath I, Chaki R, Chaki N. WACA: A new weighted adaptive clustering algorithm for MANET; p. 40. Saha A, Chatterjee A, Pal N, Ghosh A, Chaki N. A Lightweight Implementation of Obstruction-Free Software Transactional Memory; p. 41. Mandal A K, Sarkar A, Chaki N. Flexible cloud architecture for healthcare applications; p. 42. Mishra R K, Chaki N, Choudhury S. Study on handover mechanism in cellular network: An experimental approach; p. 43. Pandit D, Chaki N, Chattopadhyay S. Hyper object data model: A simple data model for handling semi-structured data; p. 44. Bhattasali T, Saeed K, Chaki N, Chaki R. A survey of security and privacy issues for biometrics based remote authentication in cloud; p. 45. Roy S, Saha S, Dey A, Shaikh SH, Chaki N. Performance Evaluation of Multiple Image Binarization Algorithms Using Multiple Metrics on Standard Image Databases; p. 46. Dey A, Shaikh SH, Saeed K, Chaki N. Modified majority voting algorithm towards creating reference image for binarization; p. 4. Bhattacharya A, Das A, Choudhury S, Chaki N. Agent-Based context management for service-oriented environments; p. 48. Shaikh S H, Tabedzki M, Chaki N, Saeed K. Bengali printed character recognition - A new approach; p. 49. Shaikh S H, Bhunia S K, Chaki N. On generation of silhouette of moving objects from video; p. 50. Bhattasali T, Chaki R, Chaki N. Study of security issues in pervasive environment of next generation Internet of Things; p. 51. Ghosh D, Chaki N. A hierarchical Color-net model for smart grid security monitoring; p. 52. Shaikh S H, Saeed K, Chaki N. Performance benchmarking of different binarization techniques for fingerprint-based biometric authentication; p. 53. Shaikh SH, Roy S, Chaki N. Recognition of object orientation from images. In: IEEE Proceedings of the International Conference On Emerging Trends in Science Engineering and Technology: Recent Advancements on Science and Engineering Innovation, INCOSET p Deb N, Chaki N. Verification of i* models for existential compliance rules in remote healthcare systems. In: Proceedings - International Conference on 2014 Applications and Innovations in Mobile Computing, AIMoC p Chakraborty M, Chaki N, Cortesi A. A new intrusion prevention system for protecting Smart Grids from ICMPv6 vulnerabilities. In: 2014 Federated Conference on Computer Science and Information Systems, FedCSIS p

16 56. Shaikh SH, Saeed K, Chaki N. Gait recognition using partial silhouette-based approach. In: 2014 International Conference on Signal Processing and Integrated Networks, SPIN p Pandit D, Chattopadhyay S, Chattopadhyay M, Chaki N. Resource allocation in cloud using simulated annealing. In: Proceedings - International Conference on 2014 Applications and Innovations in Mobile Computing, AIMoC p Bhattasali T, Chaki R, Chaki N. Secure and trusted cloud of things. In: 2013 Annual IEEE India Conference, INDICON Halder K, Chaki N, Dasgupta R. Analysis and design of Learner Quanta Graph properties for efficient query processing in an adaptive dynamic courseware. In: Proceedings of 2013 IEEE International Conference on Teaching, Assessment and Learning for Engineering, TALE p Sarkar B B, Cortesi A, Chaki N. Modeling the Bullwhip effect in a multi-stage multi-tier retail network by Generalized Stochastic Petri nets. In: 2013 Federated Conference on Computer Science and Information Systems, FedCSIS p Roy S, Sen S, Sarkar A, Chaki N, Debnath NC. Dynamic query path selection from lattice of cuboids using memory hierarchy. In: Proceedings - International Symposium on Computers and Communications. p Kanrar S, Chattopadhyay S, Chaki N. A new voting-based mutual exclusion algorithm for distributed systems. In: 2013 Nirma University International Conference on Engineering, NUiCONE Deb N, Chaki N. TIDS: Trust-based intrusion detection system for wireless ad-hoc networks; p. 64. Ghosh P, Sen S, Chaki N. Materialized view construction using linear regression on attributes. In: Proceedings rd International Conference on Emerging Applications of Information Technology, EAIT p Deb D, Chaki N, Ghose A. UNNOTI: Toolkit for rural service modeling. In: Proceedings rd International Conference on Services in Emerging Markets, ICSEM p Sen S, Datta D, Chaki N. An architecture to maintain materialized view in cloud computing environment for OLAP processing. In: Proceedings: Turing International Conference on Computing Sciences, ICCS p Chakraborty M, Chaki N. ETSeM: A energy-aware, trust-based, selective multi-path routing protocol; p. 68. Chakraborty S, Chaki N. DFRS: A domain-based framework for representing semi-structured data. In: ACM International Conference Proceeding Series. p Khatua A, Chaki N. Sustainable peer-based structure for content delivery networks. In: ACM International Conference Proceeding Series. p Mishra RK, Choudhury S, Chaki N. A light-weight, dynamic call admission control for sudden user influx management. In: nd International Conference on Computer and Communication Technology, ICCCT p Shaikh SH, Maiti A, Chaki N. Image binarization using iterative partitioning: A global thresholding approach. In: 2011 International Conference on Recent Trends in Information Systems, ReTIS Proceedings. p Mishra RK, Choudhury S, Chaki N. Optimizing mobile terminal equipment for video-medic services. In: ACWR Proceedings of the International Conference on Wireless Technologies for Humanitarian Relief. p Khatua S, Mukherjee N, Chaki N. A new agent based security framework for collaborative cloud environment. In: ACM International Conference Proceeding Series 4. Sarkar BB, Sanyal S, Chaki N. Distributed framework for tele health monitoring system. In: ACWR Proceedings of the International Conference on Wireless Technologies for Humanitarian Relief. p Deb N, Chakraborty M, Chaki N. A state-of-the-art survey on IDS for mobile ad-hoc networks and wireless mesh networks; p.

17 6. Sen S, Chaki N. Efficient traversal in data warehouse based on concept hierarchy using Galois connections. In: Proceedings - 2nd International Conference on Emerging Applications of Information Technology, EAIT p Dasgupta S, Sen S, Chaki N. A framework to convert XML schema to ROLAP. In: Proceedings - 2nd International Conference on Emerging Applications of Information Technology, EAIT p Sarkar A, Bhattacharya S, Choudhury S, Chaki N. Object relational implementation of graph based conceptual level multidimensional data model. In: 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM p Maulik R, Chaki N. A comprehensive review on wormhole attacks in MANET. In: 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM p Roy B, Banik S, Chaki N, Saha B. An improved route maintenance strategy for QoS based AODV Routing Protocol. In: Proceedings - 2nd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom p Ghanty SK, Shaikh SH, Chaki N. On recognition of spoken bengali numerals. In: 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM p Banik S, Roy B, Saha B, Chaki N. Design of QoS routing framework based on OLSR protocol. In: Proceedings - 2nd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom p Sarkar A, Choudhury S, Chaki N, Bhattacharya S. Business-object oriented requirements analysis framework for Data Warehouses. In: SEKE Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering. p Chaki N. LAR2P: A location aided reactive routing protocol for near-optimal route discovery in MANET. In: 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM p Shaikh SH, Chaki N, Tabedzki M, Saeed K. A view-based approach for recognition of Bengali printed characters. In: 2009 World Congress on Nature and Biologically Inspired Computing, NABIC Proceedings. p Sarkar A, Choudhury S, Chaki N, Bhattacharya S. Object specification language for graph based conceptual level multidimensional data model. In: Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering, SEKE p Maulik R, Chaki N. PhishNet: Enhancing the security aspect of IMS users. In: 1st International Conference on Networks and Communications, NetCoM p Sen S, Chaki N, Cortesi A. Optimal space and time complexity analysis on the lattice of cuboids using galois connections for data warehousing. In: ICCIT th International Conference on Computer Sciences and Convergence Information Technology. p Sarkar BB, Chaki N. Modeling & analysis of transaction management for distributed database environment using petri nets. In: 2009 World Congress on Nature and Biologically Inspired Computing, NABIC Proceedings. p Deb D, Roy SB, Chaki N. Design of a low-cost positioning framework for location aided energy efficient routing. In: 5th International Conference on Wireless Communication and Sensor Networks, WCSN p Sil A, Bandyopadhyay O, Chaki N. Data diverse fault tolerant architecture for component based systems. In: 2009 World Congress on Nature and Biologically Inspired Computing, NABIC Proceedings. p Lakshmi Priya R, Chaki N. A study on QoS issues for mobile Ad-hoc networks. In: ACM International Conference Proceeding Series. p Sarkar BB, Chaki N. High level net model for analyzing agent base distributed decision support system. In: 2009 International Association of Computer Science and Information Technology - Spring Conference, IACSIT-SC p

18 94. Dasgupta M, Choudhury S, Chaki N. A secure hyper cube based team multicast routing protocols (S-HTMRP). In: 2009 IEEE International Advance Computing Conference, IACC p Kanrar S, Choudhury S, Chaki N. A link-failure resilient token based mutual exclusion algorithm for directed graph topology. In: Proceedings of the th International Symposium on Parallel and Distributed Computing, ISPDC p Sarkar A, Choudhury S, Chaki N, Bhattacharya S. Measuring quality metrics for object oriented multidimensional conceptual data model. In: Proceedings of the 9th IASTED International Conference on Software Engineering and Applications, SEA p Sen P, Chaki N, Chaki R. HIDS: Honesty-rate based collaborative intrusion detection system for mobile ad-hoc networks. In: Proceedings - th Computer Information Systems and Industrial Management Applications, CISIM p Saha S, Chaki R, Chaki N. A new reactive secure routing protocol for mobile ad-hoc networks. In: Proceedings - th Computer Information Systems and Industrial Management Applications, CISIM p Chaki N, Chaki R. ORRP: Optimal reactive routing protocol for mobile ad-hoc networks. In: Proceedings - 6th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 200. p Mukherjee S, Choudhury S, Chaki N, Mukhopadhyay D. A novel algorithm towards designing the protocol for generation of secret-key with authentication in collaboration (PGSAC). In: Proceedings International Symposium on Information Technology Convergence, ISITC 200. p Chaki R, Chaki N. IDSX: A cluster based collaborative intrusion detection algorithm for mobile ad-hoc network. In: Proceedings - 6th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 200. p Chaki R, Chaki N, Bhattacharya U. Performance evaluation of the Scale-net: An optimal, irregular logical topology for all-optical networks. In: Proceedings of the 4th IASTED Asian Conference on Communication Systems and Networks, AsiaCSN 200. p Chaki N, Chaki R. A scalable barrel shifter topology for all optical networks. In: Proceedings of the 4th IASTED Asian Conference on Communication Systems and Networks, AsiaCSN 200. p Basu N, Chatterjee S, Chaki N. Design pattern mining from source code for reverse engineering. In: IEEE Region 10 Annual International Conference, Proceedings/TENCON 105. Dutta S, Chaki R, Chaki N. Optimal reactive routing protocol (ORRP): A new reactive routing protocol for the shortest path in ad hoc networks. In: 2006 Annual India Conference, INDICON 106. Ray S, Chaki N, Dasgupta R. Design of an adaptive web-based courseware. In: Proceedings of the IASTED International Conference on Intelligent Systems and Control. p Neogy S, Choudhury S, Chaki N. An adaptive constant time hashing scheme for dynamic key set. In: IEEE Region 10 Annual International Conference, Proceedings/TENCON. p. B Bhattacharya U, Chaki R, Sikdar BK, Chaki N. Design of a scalable logical topology for reliable optical communication. In: IEEE Region 10 Annual International Conference, Proceedings/TENCON. p Chaki N, Bhattacharya S. High level net models: A tool for permutation mapping and fault detection in multistage interconnection network. In: IEEE Region 10 Annual International Conference, Proceedings/TENCON. p Chaki N, Bhattacharya S. Permutation mapping for MIN using high level net models. In: Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS. p

19 PUBLICATION LIST FOR SANKHAYAN CHOUDHURY (FROM SCOPUS) OTHER THAN BOOKS Edited Volumes: 1. Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki; Applied Computation and Security Systems; Springer Advances in Intelligent Systems and Computing (AISC) Series, vol. 304, ISBN: Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki; Applied Computation and Security Systems; Springer Advances in Intelligent Systems and Computing (AISC) Series, vol. 305, ISBN: Journals: 1. Choudhury, S., Chaki, N., & Bhattacharya, S. (2006). GDM: A new graph based data model using functional abstractions. Journal of Computer Science and Technology, 21(3), Sarkar, A., Choudhury, S., Chaki, N., & Bhattacharya, S. (2010). Quality evaluation of conceptual level object-oriented multidimensional data model. International Journal of Computers and Applications, 32(3), Conference Publications: 5. Bhattacharya, A., & Choudhury, S. (2015). Non-functional property aware brokerage approach for cloud service discovery 6. Bhattacharya, A., & Choudhury, S. (2015). Service insurance: A new approach in cloud brokerage. Bhattacharya, A., Das, A., Choudhury, S., & Chaki, N. (2014). Agent-based context management for service-oriented environments 8. Chakraborty, U. K., Konar, D., Roy, S., & Choudhury, S. (2014). Intelligent fuzzy spelling evaluator for e-learning systems. Education and Information Technologies, Dasgupta, S., Chaki, R., & Choudhury, S. (2013). TruVAL: Trusted vehicle authentication logic for VANET 10. Mishra, R. K., Chaki, N., & Choudhury, S. (2015). Study on handover mechanism in cellular network: An experimental approach 11. Mishra, R. K., Choudhury, S., & Chaki, N. (2010). E2IRP: A new energy efficient integrated routing protocol for MANET 12. Mishra, R. K., Saha, S., Choudhury, S., & Chaki, N. (2011). Agent based approach for radio resource optimization for cellular networks 13. Sanyal, A., & Choudhury, S. (2011). Operational algebra for a graph based semantic web data model 14. Udit, U. K., Roy, S., & Choudhury, S. (2014). A novel semantic similarity based technique for computer assisted automatic evaluation of textual answers 15. Banerjee, S., Bera, P., Choudhury, S., & Dasgupta, M. (2010). A power aware multicast ondemand routing with load balancing. Paper presented at the ICCTD nd International Conference on Computer Technology and Development, Proceedings, Bhattacharya, A., & Choudhury, S. (2014). A graph based meta-model for speed-up service composition on web. Paper presented at the Proceedings of the IEEE International Conference on Industrial Technology, Choudhury, S., Dasgupta, R., & Bhattacharya, S. (2002). A graph object oriented database model in distributed environment. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON,, Dasgupta, M., Choudhury, S., & Chaki, N. (2009). A secure hyper cube based team multicast routing protocols (S-HTMRP). Paper presented at the 2009 IEEE International Advance Computing Conference, IACC 2009, Dasgupta, M., Santra, D., Bhattacharya, A., & Choudhury, S. (2014). A colored petri net model for NFP driven web service composition. Paper presented at the Proceedings of the IEEE International Conference on Industrial Technology, 82-8.

20 20. Dasgupta, M., Santra, D., & Choudhury, S. (2012). Network modelling of a blackhole prevention mechanism in mobile ad-hoc network. Paper presented at the Proceedings - 4th International Conference on Computational Intelligence and Communication Networks, CICN 2012, Kanrar, S., Choudhury, S., & Chaki, N. (2008). A link-failure resilient token based mutual exclusion algorithm for directed graph topology. Paper presented at the Proceedings of the th International Symposium on Parallel and Distributed Computing, ISPDC 2008, Mishra, R. K., Choudhury, S., & Chaki, N. (2011). A light-weight, dynamic call admission control for sudden user influx management. Paper presented at the nd International Conference on Computer and Communication Technology, ICCCT-2011, Mishra, R. K., Choudhury, S., & Chaki, N. (2011). Optimizing mobile terminal equipment for video-medic services. Paper presented at the ACWR Proceedings of the International Conference on Wireless Technologies for Humanitarian Relief, Mukherjee, S., Choudhury, S., Chaki, N., & Mukhopadhyay, D. (200). A novel algorithm towards designing the protocol for generation of secret-key with authentication in collaboration (PGSAC). Paper presented at the Proceedings International Symposium on Information Technology Convergence, ISITC 200, Neogy, S., Choudhury, S., & Chaki, N. (2004). An adaptive constant time hashing scheme for dynamic key set. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON,, B B364-B Sanyal, A., Basu, S. S., & Choudhury, S. (2010). A requirement framework for enablement of automatic generation of domain model. Paper presented at the 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010, Sanyal, A., & Choudhury, S. (2011). An aspect-oriented conceptual level design for semantic web based application. Paper presented at the nd International Conference on Computer and Communication Technology, ICCCT-2011, Sanyal, A., & Choudhury, S. (2009). An object-oriented conceptual level design for web data model. Paper presented at the Proceedings of International Conference on Methods and Models in Computer Science, ICM2CS09, 29. Sanyal, A., Sanyal, S., & Choudhury, S. (2011). Physical level implementation of a web data model. Paper presented at the ACM International Conference Proceeding Series, Sanyal, A., Sarkar, A., Choudhury, S., & Debnath, N. C. (2010). Automating web data model: Conceptual design to logical representation. Paper presented at the 19th International Conference on Software Engineering and Data Engineering 2010, SEDE 2010, Sarkar, A., Bhattacharya, S., Choudhury, S., & Chaki, N. (2010). Object relational implementation of graph based conceptual level multidimensional data model. Paper presented at the 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010, Sarkar, A., Choudhury, S., Chaki, N., & Bhattacharya, S. (2010). Business-object oriented requirements analysis framework for data warehouses. Paper presented at the SEKE Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering, Sarkar, A., Choudhury, S., Chaki, N., & Bhattacharya, S. (2008). Measuring quality metrics for object oriented multidimensional conceptual data model. Paper presented at the Proceedings of the 9th IASTED International Conference on Software Engineering and Applications, SEA 2008, Sarkar, A., Choudhury, S., Chaki, N., & Bhattacharya, S. (2009). Object specification language for graph based conceptual level multidimensional data model. Paper presented at the Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering, SEKE 2009, Sarkar, A., Choudhury, S., & Debnath, N. C. (2012). Graph semantic based design of XML data warehouse: A conceptual perspective. Paper presented at the IEEE International Conference on Industrial Informatics (INDIN),

21 36. Zaidi, A. Z., DeMonsabert, S. M., El-Farhan, R., & Choudhury, S. (2004). A framework for pollutant trading during the TMDL allocation phase. Paper presented at the Proceedings of the 2004 Self-Sustaining Solutions for Streams, Wetlands, and Watersheds Conference,

22 PUBLICATION LIST FOR RAJAT KUMAR PAL (FROM SCOPUS) OTHER THAN BOOKS Journals: 1. Changdar, C., Mahapatra, G. S., & Pal, R. K. (2015). An improved genetic algorithm based approach to solve constrained knapsack problem in fuzzy environment. Expert Systems with Applications, 42(4), Gayen, D. K., Chattopadhyay, T., Das, M. K., Roy, J. N., & Pal, R. K. (2011). All-optical binary to gray code and gray to binary code conversion scheme with the help of semiconductor optical amplifier-assisted sagnac switch. IET Circuits, Devices and Systems, 5(2), Gayen, D. K., Chattopadhyay, T., Pal, R. K., & Roy, J. N. (2010). All-optical multiplication with the help of semiconductor optical amplifier-assisted sagnac switch. Journal of Computational Electronics, 9(2), Gayen, D. K., Chattopadhyay, T., Pal, R. K., & Roy, J. N. (2011). All-optical prefix tree adder with the help of terahertz optical asymmetric demultiplexer. Chinese Optics Letters, 9(6) 5. Gayen, D. K., Pal, R. K., & Roy, J. N. (2009). All-optical adder/subtractor based on terahertz optical asymmetric demultiplexer. Chinese Optics Letters, (6), Gayen, D. K., Roy, J. N., & Pal, R. K. (2012). All-optical carry lookahead adder with the help of terahertz optical asymmetric demultiplexer. Optik, 123(1), Gayen, D. K., Roy, J. N., Taraphdar, C., & Pal, R. K. (2011). All-optical reconfigurable logic operations with the help of terahertz optical asymmetric demultiplexer. Optik, 122(8), Gayen, D. K., Taraphdar, C., Bhattacharyya, A., Pal, R. K., & Roy, J. N. (2011). All-optical binary-coded decimal adder with a terahertz optical asymmetric demultiplexer. Computing in Science and Engineering, 13(1), Gayen, D. K., Taraphdar, C., Roy, J. N., & Pal, R. K. (2010). Terahertz optical asymmetric demultiplexer based all optical data comparator. Journal of Circuits, Systems and Computers, 19(3), Pal, R. K., Pal, S. P., & Pal, A. (1998). An algorithm for finding a non-trivial lower bound for channel routing. Integration, the VLSI Journal, 25(1), Peer-reviewed Conference Proceedings: 11. Changdar, C., Mahapatra, G. S., & Pal, R. K. (2013). An ant colony optimization approach for binary knapsack problem under fuzziness. Applied Mathematics and Computation, 223, Dhal, D., Chakrabarty, A., Datta, P., & Pal, R. K. (2015). A new move toward parallel assay operations in a restricted sized chip in digital microfluidics 13. Dhal, D., Datta, P., Chakraborty, A., & Pal, R. K. (2015). Design of a mixer for performing efficient mixing to reduce overall assay response time 14. Maji, A. K., & Pal, R. K. (2015). A novel biometric template encryption scheme using sudoku puzzle 15. Mehera, R., Chakrabarty, A., Datta, P., & Pal, R. K. (2015). A 2D guard zone computation algorithm for reassignment of subcircuits to minimize the overall chip area 16. Mehera, R., Chakraborty, A., Datta, P., & Pal, R. K. (2015). Advancement in guard zone computation through detection and exclusion of the overlapped regions 1. Mehera, R., & Pal, R. K. (2009). A cost-optimal algorithm for guard zone problem 18. Saha, D., Pal, R. K., & Sarma, S. S. (2006). A mimetic algorithm for refinement of lower bound of number of tracks in channel routing problem 19. Sau, S. S., & Pal, R. K. (2015). An efficient algorithm for reducing wire length in three-layer channel routing Bandyopadhyay, S., Dhal, D., & Pal, R. K. (2008). A method to select programme slots for giving advertisements in different television channels. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON,

23 20. Bandyopadhyay, S., & Pal, R. K. (2011). An algorithm for selecting programme slots to broadcast advertisements in parallel in different television channels. Paper presented at the Proceedings IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011,, Bandyopadhyay, S., & Pal, R. K. (2014). Computation of all possible maximal cliques of a weakly triangulated graph in polynomial time. Paper presented at the Proceedings of 2014 Science and Information Conference, SAI 2014, Bandyopadhyay, S., & Pal, R. K. (2014). The problem of computing k-disjoint maximal cliques covering a maximum number of vertices for weakly triangulated graph. Paper presented at the Proceedings of 2014 Science and Information Conference, SAI 2014, Bhattacharjya, A., & Pal, R. K. (2011). Distributed design of universal lightweight RFID system for large-scale RFID operation. Paper presented at the APBITM Proceedings2011 IEEE International Summer Conference of Asia Pacific Business Innovation and Technology Management, Bhowal, S., & Pal, R. K. (2004). High performance multi-layer routing for VLSI circuit synthesis. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON,, D D328-D Das, S., Banerjee, S., & Pal, R. K. (200). Novelty of TAH framework in computing reduced wire length two- and three-layer routing solutions. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON, 26. Datta, P., Dutta, A., Majumder, R., Chakraborty, A., Dhal, D., & Pal, R. K. (2015). A technology shift towards triangular electrodes from square electrodes in design of digital microfluidic biochip. Paper presented at the 8th International Conference on Electrical and Computer Engineering: Advancing Technology for a Better Tomorrow, ICECE 2014, Debbarma, J., Debbarma, M. K., Roy, S., Debbarma, N., & Pal, R. K. (2013). An efficient energy protocol for power conservation in mobile ad-hoc networks. Paper presented at the Proceedings International Symposium on Computational and Business Intelligence, ISCBI 2013, Dhal, D., Chakrabarty, A., Datta, P., Roy, S., & Pal, R. K. (2013). A connect-5 structure based parallel assay operations in a restricted sized chip in digital microfluidics. Paper presented at the Proceedings of nd International Conference on Advances in Electrical Engineering, ICAEE 2013, Dhal, D., Datta, P., Chakrabarty, A., & Pal, R. K. (2014). Enhancement of multiple parallel assay operations with cross contamination avoidance in a given biochip. Paper presented at the 2014 International Conference on Electronics and Communication Systems, ICECS 2014, 30. Dhal, D., Datta, P., Chakrabarty, A., Saha, G., & Pal, R. K. (2014). An algorithm for parallel assay operations in a restricted sized chip in digital microfluidics. Proceedings of IEEE Computer Society Annual Symposium on VLSI, ISVLSI,, Gayen, D. K., Bhattacharyya, A., Pal, R. K., & Roy, J. N. (2009). All-optical binary coded decimal (BCD) adder. Paper presented at the Codec th International Conference on Computers and Devices for Communication, 32. Ghosh, J., Chakraborty, A., Datta, P., Dey, L., Nandy, A., Pal, R. K., & Samanta, R. K. (2015). The first algorithm for solving two coins counterfeiting with ω(δh) = ω(δl). Paper presented at the 8th International Conference on Electrical and Computer Engineering: Advancing Technology for a Better Tomorrow, ICECE 2014, Ghosh, J., Datta, P., Chakraborty, A., Nandy, A., Dey, L., Pal, R. K., & Samanta, R. K. (2015). An endeavour to find two unequal false coins. Paper presented at the 8th International Conference on Electrical and Computer Engineering: Advancing Technology for a Better Tomorrow, ICECE 2014, Ghosh, J., Senmajumdar, P., Maitra, S., Dhal, D., & Pal, R. K. (2011). A generalized algorithm for solving n coins problem. Paper presented at the Proceedings IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011,,

24 35. Khan, A. K., Roy, S., Das, B., & Pal, R. K. (2013). A new efficient layer assignment algorithm for partitioning in 3D VLSI physical design. Paper presented at the Proceedings st International Conference on Emerging Trends and Applications in Computer Science, ICETACS 2013, Maji, A. K., & Pal, R. K. (2014). Sudoku solver using minigrid based backtracking. Paper presented at the Souvenir of the 2014 IEEE International Advance Computing Conference, IACC 2014, Maji, A. K., Pal, R. K., & Roy, S. (2013). A novel steganographic scheme using sudoku. Paper presented at the 2013 International Conference on Electrical Information and Communication Technology, EICT 2013, 38. Mehera, R., Chatterjee, S., & Pal, R. K. (200). A time-optimal algorithm for guard zone problem. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON, 39. Mehera, R., Datta, P., Chakraborty, A., & Pal, R. K. (2015). A comprehensive approach towards guard zone computation detecting and excluding the overlapped regions. Paper presented at the 8th International Conference on Electrical and Computer Engineering: Advancing Technology for a Better Tomorrow, ICECE 2014, Mitra, P., Ghoshal, N., & Pal, R. K. (2003). A graph theoretic approach to minimize total wire length in channel routing. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON,, Pal, A., Kundu, D., Datta, A. K., Mandal, T. N., & Pal, R. K. (200). Algorithms for high performance two-layer channel routing. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON, 42. Pal, A., Mandal, T. N., Datta, A. K., Kundu, D., & Pal, R. K. (2008). Generation of random channel specifications for channel routing problem. Paper presented at the Proceedings of 11th International Conference on Computer and Information Technology, ICCIT 2008, Pal, A., Saha Sau, S., Mandal, T. N., Pal, R. K., Datta, A. K., & Chaudhuri, A. (2011). Yet an efficient algorithm for computing reduced area VLSI channel routing solutions with floating terminals. Paper presented at the 14th International Conference on Computer and Information Technology, ICCIT 2011, Pal, A., Singha, A., Ghosh, S., & Pal, R. K. (2002). Crosstalk minimization in two-layer channel routing. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON,, Pal, R. K. (2003). ARKEPIanGraphSort: A graph based sorting algorithm. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON,, Pal, R. K. (2011). CompleteGraphSort: A complete graph structure based sorting algorithm. Paper presented at the Proceedings IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011,, Pal, R. K. (2004). SieveSort: Yet another sorting algorithm. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON,, B B35-B Pal, R. K., Pal, S. P., & Pal, A. (199). Algorithm for finding a non-trivial lower bound for channel routing. Paper presented at the Proceedings of the IEEE International Conference on VLSI Design, Pal, R. K., Datta, A. K., Pal, S. P., & Pal, A. (1993). Resolving horizontal constraints and minimizing net wire length for multi-layer channel routing. Paper presented at the Proceedings of the 10th IEEE Region Conference on Computer, Communication, Control and Power Engineering, Pal, R. K., Pal, S. P., & Pal, A. (1993). New lower bound for channel routing. Paper presented at the Proceedings of the 10th IEEE Region Conference on Computer, Communication, Control and Power Engineering, Sau, S. S., Pal, A., Mandal, T. N., Datta, A. K., Pal, R. K., & Chaudhuri, A. (2011). A graph based algorithm to minimize total wire length in VLSI channel routing. Paper presented at the Proceedings IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011,,

25 52. Sau, S. S., & Pal, R. K. (2014). A re-router for optimizing wire length in two-and four-layer no-dogleg channel routing. Paper presented at the 18th International Symposium on VLSI Design and Test, VDAT 2014, 53. Sau, S. S., & Pal, R. K. (2012). An efficient high performance parallel algorithm to yield reduced wire length VLSI circuits. Paper presented at the CODEC th International Conference on Computers and Devices for Communication,

26 PUBLICATION LIST FOR BANANI SAHA (FROM SCOPUS) Journals: 1. Mitra, S., & Saha, B. (1989). Implementation of fault simulation and testing of combinational circuits. International Journal of Electronics, 66(5), Saha, B., & Bandyopadhyay, S. (1988). Representation and analysis of patrinets via the matrix state equation approach. International Journal of Electronics, 65(1), Saha, B., & Bandyopadhyay, S. (1991). Computer-based reduction technique for petri nets. International Journal of Systems Science, 22(1), Saha, B., & Bandyopadhyay, S. (1988). Realization of petrinets: A system theoretic approach. International Journal of Systems Science, 19(11), Peer-reviewed Conference Proceedings: 5. Bhattacharya, B., & Saha, B. (2015). Signalling cost analysis of community model 6. Biswas, A., Saha, B., & Guha, S. (2012). Performance analysis of AODV and DSR routing protocols for ad-hoc networks. Dolkar, D., & Saha, B. (2009). Optimal face recognition method using ant colony based back propagation network. Paper presented at the Codec th International Conference on Computers and Devices for Communication, 8. Saha, B., & Mukhoapdhyay, S. S. (2006). Subscription fraud in telecommunication modeling and behavior analysis through statistical measure. Paper presented at the Proceedings th International Conference on Advanced Computing and Communications, ADCOM 2006,

27 PUBLICATION LIST FOR RAJIB DAS (FROM SCOPUS) Journals: 1. Das, R. K., & Das, N. (199). GSE: A full-access multistage interconnection network of arbitrary size. International Journal of Systems Science, 28(11), Das, R. K., & Sinha, B. P. (1996). A new topology with odd degree for multiprocessor systems. Journal of Parallel and Distributed Computing, 39(1), Das, R. K., & Sinha, B. P. (1995). Optimal communication algorithms in distributed loop networks. Journal of Parallel and Distributed Computing, 30(1), Das, R. K., Mukhopadhyaya, K., & Sinha, B. P. (1994). New family of bridged and twisted hypercubes. IEEE Transactions on Computers, 43(10), Sen Gupta, S., Das, R. K., Mukhopadhyaya, K., & Sinha, B. P. (199). A family of network topologies with multiple loops and logarithmic diameter. Parallel Computing, 22(14), Sharma, U., Kalita, J. K., & Das, R. K. (2008). Acquisition of morphology of an indic language from text corpus. ACM Transactions on Asian Language Information Processing, (3) Peer-reviewed Conference Proceedings:. Das, R. K. (2004). Adaptive fault tolerant routing in star graph 8. Das, R. K. (2005). Fault tolerant routing in star graphs using fault vector 9. Dutta, A., Thakkar, K., Khatua, S., & Das, R. K. (2013). Power efficient data gathering for sensor network 10. Baksi, S., Sinha, A., Khatua, S., & Das, R. K. (2014). Finding the maximum lifetime datagathering tree in sensor networks. Paper presented at the IEEE ISSNIP IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings, 11. Das, R. K. (200). Diameter and routing in enhanced OTIS cube. Paper presented at the Proceedings - International Conference on Computing: Theory and Applications, ICCTA 200, Das, R. K. (2010). Fault tolerant routing using improved safety vectors. Paper presented at the st International Conference on Parallel, Distributed and Grid Computing, PDGC , Das, R. K., & Das, N. (1996). GSE: A generalized full-access multistage interconnection network with minimum cost. Paper presented at the Proceedings of the rd International Conference on High Performance Computing, HiPC, Reddy, P. S., Sarma, N., & Das, R. K. (200). Enhancing fault-tolerance in a distributed mutual exclusion algorithm. Paper presented at the Proceedings - 9th International Conference on Information Technology, ICIT 2006,

28 PUBLICATION LIST FOR PRITHA BANERJEE (FROM SCOPUS) Journals: 1. Banerjee, P., Saha, D., & Sur-Kolay, S. (2011). Cone-based placement for field programmable gate arrays. IET Computers and Digital Techniques, 5(1), Banerjee, P., Sangtani, M., & Sur-Kolay, S. (2011). Floorplanning for partially reconfigurable FPGAs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 30(1), Banerjee, P., Sur-Kolay, S., & Bishnu, A. (2009). Fast unified floorplan topology generation and sizing on heterogeneous FPGAs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 28(5), Banerjee, P., Sur-Kolay, S., Bishnu, A., Das, S., Nandy, S. C., & Bhattacharjee, S. (2009). FPGA placement using space-filling curves: Theory meets practice. Transactions on Embedded Computing Systems, 9(2), Banerjee, P., Susmita, S. Koley, & Bishnu, A. (2009). Fast unified floorplan topology generation and sizing on heterogeneous FPGAs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 28(1), Peer-reviewed Conference Proceedings: 6. Banerjee, P., Bhattacharjee, S., Sur-Kolay, S., Das, S., & Nandy, S. C. (2005). Fast FPGA placement using space-filling curve. Paper presented at the Proceedings International Conference on Field Programmable Logic and Applications, (2005) Banerjee, P., Sangtani, M., & Sur-Kolay, S. (2009). Floorplanning for partial reconfiguration in FPGAs. Paper presented at the Proceedings: 22nd International Conference on VLSI Design - Held Jointly with th International Conference on Embedded Systems, Banerjee, P., & Sur-Kolay, S. (200). Faster placer for island-style FPGAs. Paper presented at the Proceedings - International Conference on Computing: Theory and Applications, ICCTA 200, Banerjee, P., Sur-Kolay, S., & Bishnu, A. (200). Floorplanning in modern FPGAs. Paper presented at the Proceedings of the IEEE International Conference on VLSI Design, Banerjee, P. K., & Raahemifar, K. (2013). AC voltage regulation by switch mode PWM voltage controller. Paper presented at the Canadian Conference on Electrical and Computer Engineering, 11. Lin, T. -., Banerjee, P., & Chang, Y. -. (2013). An efficient and effective analytical placer for FPGAs. Paper presented at the Proceedings - Design Automation Conference, 12. Mukhopadhyay, S., Banerjee, P., & Sur-Kolay, S. (2011). Balanced bipartitioning of a multiweighted hypergraph for heterogeneous FPGAS. Paper presented at the Proceedings of the 2011 th Southern Conference on Programmable Logic, SPL 2011,

29 PUBLICATION LIST FOR RITUPARNA CHAKI (FROM SCOPUS) OTHER THAN BOOKS Edited Volumes: 1. Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki; Applied Computation and Security Systems; Springer Advances in Intelligent Systems and Computing (AISC) Series, vol. 304, ISBN: Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki; Applied Computation and Security Systems; Springer Advances in Intelligent Systems and Computing (AISC) Series, vol. 305, ISBN: Saeed, K.; Chaki, R.; Cortesi, A.; Wierzchoń, S. (Eds.); Proceedings of the 12th IFIP TC 8 International Conference, CISIM 2013, Krakow, Poland, Sep. 25-2, 2013, Springer Lecture Notes in Computer Science (LNCS), vol. 8104, ISBN: Journals: 4. Bhattacharya, U., & Chaki, R. (2005). A new scalable optimal topology for multi-hop optical networks. Computer Communications, 28(5), Roy, D. B., Chaki, R., & Chaki, N. (2010). BHIDS: A new, cluster based algorithm for black hole IDS. Security and Communication Networks, 3(2-3), Sharma, A., Sharma, P., Chaki, R., & Bhattacharya, U. (2014). Reducing call blocks in cellular network with non-uniform traffic conditions. Foundations of Computing and Decision Sciences, 39(4), Sinha, D., Bhattacharya, U., & Chaki, R. (2014). RSRP: A robust secure routing protocol in MANET. Foundations of Computing and Decision Sciences, 39(2), Peer-reviewed Conference Proceedings: 8. Bhattasali, T., & Chaki, R. (2011). A survey of recent intrusion detection systems for wireless sensor network 9. Bhattasali, T., Chaki, R., & Chaki, N. (2013). Study of security issues in pervasive environment of next generation internet of things 10. Bhattasali, T., Saeed, K., Chaki, N., & Chaki, R. (2014). A survey of security and privacy issues for biometrics based remote authentication in cloud 11. Das, A. K., & Chaki, R. (2011). A novel power-balanced routing scheme for WSN 12. Das, A. K., & Chaki, R. (2012). MERCC: Multiple events routing with congestion control for WSN 13. Das, A. K., Chaki, R., & Biswas, A. (2013). Power aware cluster based routing (PACBR) protocol for wireless sensor network 14. Dasgupta, S., & Chaki, R. (2011). SRPV: A speedy routing protocol for VANET 15. DasGupta, S., & Chaki, R. (2015). Trust-based routing for vehicular ad hoc network 16. Dasgupta, S., Chaki, R., & Choudhury, S. (2013). TruVAL: Trusted vehicle authentication logic for VANET 1. Ghosh, A., Sahin, A., Silsarma, A., & Chaki, R. (2014). A new contention management technique for obstruction free transactional memory 18. Mandal, S., & Chaki, R. (2012). A novel power balanced encryption scheme for secure information exchange in wireless sensor networks 19. Nath, I., Chaki, R., & Chaki, N. (2010). WACA: A new weighted adaptive clustering algorithm for MANET 20. Sinha, D., Bhattacharya, U., & Chaki, R. (2011). A novel distributed clustered approach towards building an agent based routing topology for MANET 21. Sinha, D., Bhattacharya, U., & Chaki, R. (2013). Clar: A novel cluster oriented agent based routing protocol for manet. Foundations of Computing and Decision Sciences, 38(1), Sinha, D., & Chaki, R. (2011). SRCHS - A stable reliable cluster head selection protocol 23. Roy, D. B., & Chaki, R. (2011). Detection of denial of service attack due to selfish node in MANET by mobile agent

30 24. Roy, D. B., & Chaki, R. (2011). MABHIDS: A new mobile agent based black hole intrusion detection system 25. Saha, A., & Chaki, R. (2011). VAMI - A novel architecture for vehicular ambient intelligent system 26. Saha, S., & Chaki, R. (2013). A brief review of data mining application involving protein sequence classification 2. Saha, S., & Chaki, R. (2011). Cluster based mobility considered routing protocol for mobile ad hoc network 28. Saha, S., & Chaki, R. (2012). Hierarchical cluster based query-driven routing protocol for wireless sensor networks 29. Saha, S., & Chaki, R. (2012). Weighted energy efficient cluster based routing for wireless sensor networks 30. Sarkar, P., & Chaki, R. (2012). A cryptographic approach towards black hole attack detection 31. Sen, S., & Chaki, R. (2011). Handling write lock assignment in cloud computing environment 32. Bhattacharya, U., Chaki, R., Sikdar, B. K., & Chaki, N. (2002). Design of a scalable logical topology for reliable optical communication. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON,, Bhattasali, T., & Chaki, R. (2012). BEAMS: Battery exhaustion anomaly monitoring system model in SENSORNET. Paper presented at the Proceedings of the International Conference on Sensing Technology, ICST, Bhattasali, T., Chaki, R., & Chaki, N. (2013). Secure and trusted cloud of things. Paper presented at the 2013 Annual IEEE India Conference, INDICON 2013, 35. Chaki, N., & Chaki, R. (200). A scalable barrel shifter topology for all optical networks. Paper presented at the Proceedings of the 4th IASTED Asian Conference on Communication Systems and Networks, AsiaCSN 200, Chaki, N., & Chaki, R. (200). ORRP: Optimal reactive routing protocol for mobile ad-hoc networks. Paper presented at the Proceedings - 6th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 200, Chaki, R. (2010). Intrusion detection: Ad-hoc networks to ambient intelligence framework. Paper presented at the 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010, Chaki, R., & Chaki, N. (200). IDSX: A cluster based collaborative intrusion detection algorithm for mobile ad-hoc network. Paper presented at the Proceedings - 6th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 200, Chaki, R., Chaki, N., & Bhattacharya, U. (200). Performance evaluation of the scale-net: An optimal, irregular logical topology for all-optical networks. Paper presented at the Proceedings of the 4th IASTED Asian Conference on Communication Systems and Networks, AsiaCSN 200, Chaki, R., & Niyogi, N. G. (2011). An improved scheme towards fast handover in a hierarchical mobile network. Paper presented at the th URSI General Assembly and Scientific Symposium, URSIGASS 2011, 41. Chaki, R., & Sinha, D. (2008). LCRACO - A new load and congestion controlled routing based on ant colony optimization. Paper presented at the Proceedings of 11th International Conference on Computer and Information Technology, ICCIT 2008, Chaki, R., & Bhattacharya, U. (2000). Design of a new scalable topology for multihop optical networks. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON,, 2 II-482-II Chakrabarti, C., & Chaki, R. (2011). Improved cluster based route discovery algorithm for adhoc networks. Paper presented at the Proceedings of the 2011 International Conference on Communication and Industrial Application, ICCIA 2011, 44. DasGupta, S., & Chaki, R. (2009). AMOBIROUTE: An advanced mobility based ad hoc routing protocol for mobile ad hoc networks. Paper presented at the 1st International Conference on Networks and Communications, NetCoM 2009,

31 45. Dutta, P., & Chaki, R. (2012). A survey of data mining applications in water quality management. Paper presented at the ACM International Conference Proceeding Series, Dutta, S., Chaki, R., & Chaki, N. (2006). Optimal reactive routing protocol (ORRP): A new reactive routing protocol for the shortest path in ad hoc networks. Paper presented at the 2006 Annual India Conference, INDICON, 4. Roy, D. B., & Chaki, R. (2013). MCBHIDS: Modified layered cluster based algorithm for black hole IDS. Paper presented at the 2013 Annual IEEE India Conference, INDICON 2013, 48. Roy, D. B., & Chaki, R. (2014). State of the art analysis of network traffic anomaly detection. Paper presented at the Proceedings - International Conference on 2014 Applications and Innovations in Mobile Computing, AIMoC 2014, Saha, S., Chaki, R., & Chaki, N. (2008). A new reactive secure routing protocol for mobile ad-hoc networks. Paper presented at the Proceedings - th Computer Information Systems and Industrial Management Applications, CISIM 2008, Saha, S. B., DasGupta, S., & Chaki, R. (2009). MOADRP: Mobile ad-hoc network routing protocol. Paper presented at the 5th International Conference on Wireless Communication and Sensor Networks, WCSN-2009, Sen, P., Chaki, N., & Chaki, R. (2008). HIDS: Honesty-rate based collaborative intrusion detection system for mobile ad-hoc networks. Paper presented at the Proceedings - th Computer Information Systems and Industrial Management Applications, CISIM 2008, Sharma, A., Chaki, R., & Bhattacharya, U. (2011). Applications of wireless sensor network in intelligent traffic system: A review. Paper presented at the ICECT rd International Conference on Electronics Computer Technology,, Sharma, A., Roy, A., Ghosal, S., Chaki, R., & Bhattacharya, U. (2012). Load balancing in cellular network: A review. Paper presented at the rd International Conference on Computing, Communication and Networking Technologies, ICCCNT 2012, 54. Sinha, D., & Chaki, R. (2014). AESCRT: Agent enabled secure CRT based routing topology for MANET. Paper presented at the Proceedings - International Conference on 2014 Applications and Innovations in Mobile Computing, AIMoC 2014, Sinha, D., & Chaki, R. (2009). MALBACO - A new multi-agent load balanced ant colony optimization algorithm for MANETs. Paper presented at the 2009 World Congress on Nature and Biologically Inspired Computing, NABIC Proceedings, Sinha, D., Chaki, R., & Bhattacharya, U. (2012). A secure routing scheme in MANET with CRT based secret sharing. Paper presented at the Proceeding of the 15th International Conference on Computer and Information Technology, ICCIT 2012,

32 PUBLICATION LIST FOR AMLAN CHAKRABARTI (FROM SCOPUS) Journals: 1. Lin, C., Chakrabarti, A., & Jha, N. K. (2014). FTQLS: Fault-tolerant quantum logic synthesis. IEEE Transactions on very Large Scale Integration (VLSI) Systems, 22(6), Lin, C., Chakrabarti, A., & Jha, N. K. (2013). Optimized quantum gate library for various physical machine descriptions. IEEE Transactions on very Large Scale Integration (VLSI) Systems, 21(11), Lin, C., Chakrabarti, A., & Jha, N. K. (2014). QLib: Quantum module library. ACM Journal on Emerging Technologies in Computing Systems, 11(1) 4. Mandal, S. B., Chakrabarti, A., & Sur-Kolay, S. (2014). Quantum ternary circuit synthesis using projection operations. Journal of Multiple-Valued Logic and Soft Computing, 24(1-4), Mukherjee, J., Kundu, R., & Chakrabarti, A. (2014). Variability of cobb angle measurement from digital X-ray image based on different de-noising techniques. International Journal of Biomedical Engineering and Technology, 16(2), Patra, B., Chandak, N., & Chakrabarti, A. (2011). An efficient methodology for full chip signal electromigration analysis for advanced technology node designs. Journal of Low Power Electronics, (3), Singh, J. P., Dutta, P., & Chakrabarti, A. (2014). Weighted delay prediction in mobile ad hoc network using fuzzy time series. Egyptian Informatics Journal, 15(2), Peer-reviewed Conference Proceedings: 8. Guha, K., Sahani, R. R., Chakraborty, M., Chakrabarti, A., & Saha, D. (2015). Analysis of secret key revealing trojan using path delay analysis for some cryptocores 9. Kundu, R., Chakrabarti, A., & Lenka, P. (2015). Automated vertebral segmentation from CT images for computation of lumbolumbar angle 10. Maity, S., Chakrabarti, A., & Bhattacharjee, D. (2011). An innovative technique for adaptive video summarization 11. Mandal, S. B., Chakrabarti, A., & Sur-Kolay, S. (2012). A synthesis method for quaternary quantum logic circuits 12. Patra, B., Chattopadhyay, S., & Chakrabarti, A. (2012). A novel approach to voltage-drop aware placement in large SoCs in advanced technology nodes 13. Ray, A., & Chakrabarti, A. (2012). Design and implementation of affective E-learning strategy based on facial emotion recognition 14. Samanta, S., Paik, S., Gangopadhyay, S., & Chakrabarti, A. (2011). Processing of image data using FPGA-based MicroBlaze core 15. Sen, A. K., Mukherjee, S., & Chakrabarti, A. (2014). Satellite image fusion using window based PCA 16. Bhattacharjee, S., Sil, S., Basak, B., & Chakrabarti, A. (2011). Evaluation of power efficient adder and multiplier circuits for FPGA based DSP applications. Paper presented at the Proceedings of the 2011 International Conference on Communication and Industrial Application, ICCIA 2011, 1. Bhattacharjee, S., Sil, S., Dey, S., & Chakrabarti, A. (2011). Simulation, design and analysis of a low power MIMO-OFDM system and its implementation on FPGA. Paper presented at the 2011 International Conference on Recent Trends in Information Systems, ReTIS Proceedings, Bhattacharyya, D., Chakrabarti, A., & Misra, S. (200). Design and simulation of parallel algorithms for motion estimation. Paper presented at the Proceedings - 10th International Conference on Information Technology, ICIT 200, Biswas, T., Pal, C., Mandal, S. B., & Chakrabarti, A. (2014). Audio de-noising by spectral subtraction technique implemented on reconfigurable hardware. Paper presented at the 2014 th International Conference on Contemporary Computing, IC3 2014,

33 20. Chakrabarti, A., Das, S., Ghosh, B., Adak, S., Panda, P. B., & Chattopadhyay, A. K. (2011). Developent of high creep resistant 50% grade alumina brick for anode baking furnace application. Paper presented at the Proceedings UNITECR 2011 Congress: 12th Biennial Worldwide Conference on Refractories - Refractories-Technology to Sustain the Global Environment, Chakrabarti, A., Lin, C., & Jha, N. K. (2012). Design of quantum circuits for random walk algorithms. Paper presented at the Proceedings IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2012, Chakrabarti, A., Sharma, N., Singh, K., Banik, P., Patwari, R., Bhattacharjee, S.,... Kasari, P. R. (2012). Observer based state feedback control of DC machine. Paper presented at the st International Conference on Power and Energy in NERIST, ICPEN Proceedings, 23. Chakrabarti, A., & Sur-Kolay, S. (2008). Designing quantum adder circuits and evaluating their error performance. Paper presented at the 2008 International Conference on Electronic Design, ICED 2008, 24. Chakrabarti, A., & Sur-Kolay, S. (200). Rules for synthesizing quantum boolean circuits using minimized nearest-neighbor templates. Paper presented at the Proceedings of the 15th International Conference on Advanced Computing and Communications, ADCOM 200, Cogan, D., Chakrabarti, A., & Harvey, R. W. (1995). TLM algorithms for laplace and poisson fields in semiconductor transport. Paper presented at the Proceedings of SPIE - the International Society for Optical Engineering,, Das, B., Chakrabarti, A., Kasari, P. R., & Sharma, N. (2013). Sensorless speed control of DC machine. Paper presented at the Proceedings of 2013 International Conference on Power, Energy and Control, ICPEC 2013, Das, R. K., De, A., Pal, C., & Chakrabarti, A. (2014). DSP hardware design for fingerprint binarization and thinning on FPGA. Paper presented at the International Conference on Control, Instrumentation, Energy and Communication, CIEC 2014, Ganguly, P., Roy, S., Biswas, T., Pal, C., & Chakrabarti, A. (2014). DSP hardware software co-design of audio de-noising algorithm. Paper presented at the International Conference on Control, Instrumentation, Energy and Communication, CIEC 2014, Ghosh, S., Goswami, S., & Chakrabarti, A. (2011). Outlier detection from ETL execution trace. Paper presented at the ICECT rd International Conference on Electronics Computer Technology,, Ghoshal, S., Chatterjee, P., Biswas, B., Chakrabarti, A., & Dey, K. N. (2013). A novel method for automatic image registration based on wavelet and near fuzzy set. Paper presented at the 2013 Annual IEEE India Conference, INDICON 2013, 31. Khanna, N., Nath, J., James, J., Chakrabarti, A., Chakraborty, S., & Nath, A. (2011). New symmetric key cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm. Paper presented at the Proceedings International Conference on Communication Systems and Network Technologies, CSNT 2011, Maity, S., Mandal, S. B., Pal, A., Chakrabarti, A., & Roy, T. (2010). Design of an efficient quantum circuit simulator. Paper presented at the Proceedings International Symposium on Electronic System Design, ISED 2010, Mandal, S. B., Chakrabarti, A., & Sur-Kolay, S. (2014). Synthesis of ternary grover's algorithm. Paper presented at the Proceedings of the International Symposium on Multiple- Valued Logic, Mandal, S. B., Chakrabarti, A., & Sur-Kolay, S. (2011). Synthesis techniques for ternary quantum logic. Paper presented at the Proceedings - 41st IEEE International Symposium on Multiple-Valued Logic, ISMVL 2011, Misra, S., & Chakrabarti, A. (200). An efficient approach to estimate velocity fields using optical flow and wavelet transform. Paper presented at the Proceedings of the 200 International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 200,

34 36. Nath, A., Das, S., & Chakrabarti, A. (2010). Data hiding and retrieval. Paper presented at the Proceedings International Conference on Computational Intelligence and Communication Networks, CICN 2010, Pal, C., Chaudhury, K. N., Samanta, A., Chakrabarti, A., & Ghosh, R. (2013). Hardware software co-design of a fast bilateral filter in FPGA. Paper presented at the 2013 Annual IEEE India Conference, INDICON 2013, 38. Paul, R., Saha, S., Sau, S., & Chakrabarti, A. (2012). Real time communication between multiple FPGA systems in multitasking environment using RTOS. Paper presented at the 2012 International Conference on Devices, Circuits and Systems, ICDCS 2012, Saha, S., Chakrabarti, A., & Ghosh, R. (2013). Exploration of multi-thread processing on XILKERNEL for FPGA based embedded systems. Paper presented at the Proceedings - 19th International Conference on Control Systems and Computer Science, CSCS 2013, Sau, S., Pal, C., & Chakrabarti, A. (2011). Design and implementation of real time secured RS232 link for multiple FPGA communication. Paper presented at the ACM International Conference Proceeding Series, Sau, S., Paul, R., Biswas, T., & Chakrabarti, A. (2012). A novel AES-256 implementation on FPGA using co-processor based architecture. Paper presented at the ACM International Conference Proceeding Series, Singh, J. P., Dutta, P., & Chakrabarti, A. (2012). Temporal characteristics of clustering in mobile ad hoc network. Paper presented at the ACM International Conference Proceeding Series, Som, A., & Chakrabarti, A. (2011). A new BSQDD approach for synthesis of quantum circuit. Paper presented at the Proceedings International Symposium on Electronic System Design, ISED 2011,

35 Annexure VI BRIEF EXTRACT OF RESEARCH PROPOSED FOR NEW PHDS I. Requirements Engineering: The focus of this research is in the horizontal direction of Requirements Engineering with applications and use cases from the Remote Healthcare Enterprise. The Requirements Specification and Analysis phase seems to be the most ambiguous phase of the System Development Life Cycle (SDLC). Formal models will ease the purpose of automating the code generation process of the SDLC from the analysis and subsequent design phases so that consistency is maintained and risks are mitigated. Further, formal models also help in checking for inconsistencies and non-conformance to company policies. Last, but not the least, models help designers in giving a graphical overview of the system. Graphical representations provide a better understanding to developers which help them in communicating with the Quality Assurance team or Code Testers during the Testing phase. The i* models proposed by Yu [1] is being studied at present. An i* model captures the requirements of the customer in an abstract, strategic, sequenceagnostic schema. Work in Progress: Novarun Deb, one of the applicants is working towards developing i* models from requirement specifications and specifying the necessary formalisms. We avoid Natural Language Processing and consider a more restricted environment where requirements are specified using First Order Logic or Predicates. Given such a requirement specification, we propose rules that define structural constructs of i* models. The work has been published in [2]. In another ongoing effort, the same scholar is working on extraction of state transition models from i* models. The motivation behind this particular work was that i* models have been in existence since 1995 yet without any major impact on the industry. The most important factor for this is probably the sequence agnostic nature of i* model. This work is a conscious effort to bridge the gap between a sequence agnostic model like i* and a sequence aware modeling language like UML. Any standard business process model, like BPMN or Petri-Nets, cannot be captured without knowing the flow of control and/or data within the system. In this research, our aim is to generate Labeled Kripke Structures from a given i* model. It is quite intuitive to realize that, since an i* model is sequence agnostic, there can be different permutations of the order in which model elements are processed during execution. All these permutations may not be valid; but we will always get a set of state transition models corresponding to a given i* model. The work has been communicated in [3]. Fidelity of Hierarchic i* model decompositions is another sub-area of research. The interesting thing here is to realize that there usually exists an employee hierarchy on the system developer side. The abstract view of the enterprise varies as we move through the hierarchy. As we move higher up the hierarchy, the abstraction increases and vice-versa. The higher levels of the employee hierarchy usually consist of the Managers, CEOs, CFOs, VPs, etc. These employees are agnostic to the design details of the enterprise architecture. Consider the i* representation of the enterprise obtained from the lower levels of the hierarchy consisting of system engineers, code developers, and architects. The question that arises is whether these different i* representations for users at different levels are consistent and if these maintain the fidelity of the enterprise architecture being designed. The same scholar plans to establish a mappings between i* models obtained from different levels of the hierarchy and defining hierarchic decomposition rules for checking the fidelity of such decompositions. Once i* representations obtained from successive levels of the hierarchy can be mapped as envisaged, then we can check the consistency of i* models throughout the hierarchy. The highest level i* model should derive the lowest level i* model by undergoing a series of such hierarchic decompositions. This work is currently in progress.

36 II. III. Medical Image Processing for Dental and other Diseases: Biomedical imaging is the application of engineering methods to detect and visualize the biological processes in our body. Medical imaging is very helpful for the physician to measure, diagnose, treat and even imagine about the medical illness, conditions and treatment. This technique helps the doctor to see inside the body without making an incision. Basically it is a standard modern medical care for cancer, stroke, heart disease, trauma, neurological disorders and many more. Nowadays, it is used by a wide range of medical specialist from oncologists to robotic surgery. With regard to Medicare s Sustainable Growth Rate (SGR) formula imaging services grew 4.9 percent per year faster than the other technique [4]. According to the National Electrical Manufacturer Association of USA, 2.6 percent people were shifted to the imaging services. Work in Progress: Soma Datta, one of the applicants is working towards design and development of a bio-medical image processing system towards early detection and classification of patient data for Tooth decay Monitoring system including teeth caries, gum disease, mouth ulcer property detection system etc. Dental caries is a bacterial disease of teeth caused by acid, carbohydrates and it destroys the enamel and dentine. The effective dentistry suggests that to identify the disease at early stage so that they can prevent the caries lesion progression and reduce the risk factor associated with it. Periodic monitoring and treatment is essential to observing and preventing the growth of the caries. It is difficult for a busy dentist to keep track and progress of each dental caries, gum disease etc. Her objective is to assist dentists to monitor the teeth decay, follow-up the progress report after applying some new kind of treatment. We are planning to design an alternate inexpensive system to monitor the teeth decay. Some work has been done on image segmentation [5, 6] by scholars from the same group working with the same supervisor, Prof. Nabendu Chaki. Soma plans to build on this on foundation and develop a system that will be portable and telemedicine compatible. It can keep track of the progress of the affected area of a tooth. Proposed system will store previous records of the patient. It will use special segmentation technique to reduce the storage requirement and hence this will also reduce the bandwidth in case of telemedicine. Optical image based caries monitoring system is advantageous for doctor to monitor the size of the caries. The proposed method is not injurious to health and it is completely safe for the children and pregnant ladies. Thus, the research aims to build a new, safe and low cost dental caries early prediction method that describes a technique based on optical images of teeth that are filtered and caries lesions are extracted followed by tooth region segmentation. The main goal of this research work is to find the exact caries lesion of affected teeth at early stage that assist dentist for better follow-up and diagnosis. However, once the primary target is achieved, the research outcome on medical image processing can be extended for other purposes. This include detection of patches in mouth that may lead to cancer, aid in Dental Cosmetic Surgery, Gum Disease or Gingivitis detection system, and Dental biometry based on RGB images. The work is in progress. Smart Grid Computing: A smart power grid [] is an intelligent electricity network that integrates the actions of all users connected to it and makes use of advanced information, control, and communication technologies to save energy, reduce cost and increase reliability and transparency. The backbone of the Smart Grid will be its network. This network will connect the different components of the Smart Grid together, and allow two-way communication between them. Networking the components together will introduce security risks into the system. Two-way communication has the potential to create a new avenue for cyber attacks to reach the bulk power system and cause serious damage to this critical infrastructure by way of a customer s smart meters and other grid-connected smart technology. An attacker who gained access to the

37 communication channels could order metering devices to disconnect customers, order previously shed load to come back on line prematurely, or order dispersed generation sources to turn off during periods when load is approaching generation capacity, causing instability and outages on the bulk power system. Thus to prevent these kinds of attacks we need to secure the routing protocols in smart grid networks and also implement some robust intrusion detection system for a second line of defense. Also the smart meters are one of the weakest links in smart grid security chain. Smart meters may be used by hackers as entry points into the broader power system. Hackers could hack into smart meters to take command and control of the AMI (Advanced Metering Infrastructure), allowing a mass manipulation of services to homes and businesses. One of the main challenges of connecting IPv6 with Smart grid will be address configuration [8, 9]. Identifying a new IPv6 address configuration schema customized for smart grid is another area of study. The proposed schema needs to be consistent with the demands of large, dynamic, hierarchical smart grid network. The schema would improve accessibility and scalability in terms of configuring a huge number of devices in the smart grid, thereby, fully extracting the potential of 128-bit IPv6 addressing mode. Work in Progress: Manali Chakrabarti, one of the applicants is working towards securing the future smart grid. With the huge number of devices including the smart electrical appliances, increasingly being used in homes, IPv6 become an obvious choice for smart grid for its bandwidth. An early work on this is published in FedCSIS 2014 held in Warsaw, Poland []. Besides security, several novel computing issues are associated with smart power grid. Dynamic distribution of power based on changing demands of users subscribed to smart grid is another interesting and much-awaited research aspect. The same scholar is also keeping this within her research scope. IV. Pervasive Computing and Remote Healthcare: This is an emerging area of research involving wireless networks, distributed computing and remote care for ailing patients as well as remote monitoring of patients. Remote pervasive care involves several challenges such as security of health data stored in cloud, proper scheduling to achieve the best possible remote allocation of nurse, communication between wearable sensor band to the remote health center, etc. Nurse scheduling in remote healthcare has been considered under the situation wherein the external ambience impacts on the scheduling inside the hospital, the number of urgent patients increases too much. In any emergency condition it becomes Unconstraint situation when no hospital restriction is imposed on the scheduling. This research work considers the situation when number of remote emergency patients (ce) become higher than the total number of the current critical patient (cc) and current normal patients (nc) inside the hospital. The demand of the hospital requires assigning available and part-time nurses to the increased number of patients. In this high demand place, we may consider an indirect coding based on the permutations of the nurses and a heuristic decoder (hybrid crossover operator) that builds schedule from these permutations. The term, indirect coding implies that the solutions are not directly obtained from the individual solution or chromosomes, rather its obtained from the heuristic decoder. The major challenge is to select the heuristic decoder, and the crossover operator on solution. The indirect algorithm is flexible as the GA can remain unchanged if the problem changes. Work in Progress: Paramita Sarkar, one of the applicants has done some initial work in this area [10]. The problem of remote monitoring of pregnant women in rural areas has also been considered.

38 The research aims to develop a framework to provide continuous monitoring in a non-invasive manner to the rural women who have very low chance of visiting the health center located far away. V. Biometrics and Networks Security: Privacy of data stored for ubiquitous applications is a major concern in any remote framework. There are three separate security aspects to it. These are information or data security in the data mart, securing data during transmission, i.e., network security and remote user authentication. User authentication based on biometric features is often considered more reliable than the traditional means of password authentication as biometric traits cannot be lost or forgotten and unlike conventional passwords or authentication keys, biometric signatures are very difficult to copy and share. Thus, biometric techniques provide a solution to ensure that the desired services are accessed only by a legitimate user and no one else. A number of biometric characteristics have been used for different applications [11]. Biometric traits include fingerprint, hand shape, finger shape, palm-print, finger vein pattern, iris, retina, face, ear shape, teeth, voice, gait, keystroke, signature, body odor, brain wave, ECG, nail surface etc. Each biometric trait has its strengths and weaknesses, and the choice depends on the application. However, in current state of maturity, one of the major challenges of biometric authentication is its rather lower level of accuracy. The false positive and false negatives either block access to legitimate users or grant access to unauthorized users. Beside this, session of valid users can be hijacked by impostor if the authentication is only one-time at the beginning of each session. We consider continuous or semi-continuous authentication, where user is verified repeatedly throughout the lifetime of session. Biometric authentication though typing pattern analysis is a valid method for identity verification. Typing pattern is a behavioral nature which can be used to identify users uniquely by utilizing the rhythm and manner in which an individual types characters on a keyboard [12]. Patterns show sufficiently distinct information that can be used for either identification or verification. Several studies show that a person s typing pattern show sufficiently distinct information that can be used for identification and authentication [12]. Use of keystroke detects the typing pattern of an individual by using only standard keyboard and simple software. Besides user authentication, securing data over heterogeneous networking platform is another major challenge. A group of M. Tech. students and PhD scholars are quite active over last few years and published significant results on intrusion detection and response systems for wireless, ad-hoc and sensor networks [14, 15, 16, 1]. The evolution of communication standards targeted at radio frequency (RF) applications has changed the perception of wireless technologies for sensor networks. IEEE networks fulfill the requirements for data services in a local area. IEEE standard family is developed for the wireless WPAN. These standards define the physical and MAC layers of WPAN. The IEEE is a standard that details the physical layer and media access control (MAC). ZigBee (IEEE ) compliant wireless devices are expected to transmit within 10 5 m. IEEE aims to serve the broadband wireless access in metropolitan area networks. WiMAX is the commercialization of the maturing IEEE standard. IEEE s defines a secure passwordbased authentication and key establishment protocol between the peers. There are many more in the list of standards. Keeping in pace with this varied standards and protocols that are in use today coupled with the fact that ad-hoc networks are built without any centralized control, securing a hybrid network is indeed a challenge. The broad objective of the scholars working in this area is to secure the next-generation networks. Work in Progress: A couple of M. Tech. students and one PhD scholar funded from an ITRA project are working on key-stroke based remote user authentication [13]. We plan to apply our work in remote health framework as a case study to check whether patients health records could be accessed by only valid caregivers or not. Currently, the proposed techniques are being tried in a

39 health kiosk set-up at Barha, a remote village in Birbhum district in West Bengal. The real-life data from the kiosk where multiple care-givers are using the same hardware will help to study the performance of the proposed schema. References 1. E.Yu, Modelling Strategic Relationships for Process Reengineering, Ph.D. Thesis, Dept. of Computer Science, University of Toronto, Novarun Deb, Nabendu Chaki, Verification of i* Models for Existential Compliance Rules in Remote Healthcare Systems, Proceedings of the International Conference on Applications and Innovations in Mobile Computing (AIMoC 2014), February 2 March 1, 2014, Kolkata, India. 3. Novarun Deb, Nabendu Chaki, Aditya Ghose, Extracting State Transition Models from i* Models, Communicated to the Journal of Systems and Software, SI: COMPSAC, Elsevier. 4. Smith, Cynthia, et al. "Health spending growth slows in 2003." Health Affairs, vol. 24(1), pp , Soharab Hossain Shaikh, Nabendu Chaki; A New Image Binarization Method using Iterative Partitioning ; Springer Journal on Machine Vision and Applications; vol. 24(2), pp , Feb ISSN: DOI: / _ Ayan Dey, Soharab Hossain Shaikh, Khalid Saeed, Nabendu Chaki; "Modified Majority Voting Algorithm towards Creating Reference Image for Binarization"; Proceedings of the Second International Conference on Advanced Computing, Networking and Informatics (ICACNI-2014) Springer Smart Innovation, Systems and Technologies Series; pp , Vol. 2, ISBN: DOI: / _26 The paper is short-listed for extended version publication in Special Issue (SI) of Springer Central European Journal of Computer Science.. Manali Chakraborty, Agostino Cortesi and Nabendu Chaki; "A New Intrusion Prevention System for Protecting Smart Grids from ICMPv6 Vulnerabilities"; IEEE proceedings of the 3 rd International Workshop on Smart Energy Networks & Multi-Agent Systems, Warsaw, Poland, Sep NIST Special Publication 1108R2 - NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 2.0, National Institute of Standards and Technology (NIST) Std., February X. N. Wang, H.Y. Qian, An IPv6 address configuration scheme for wireless sensor networks, Computer Standards & Interfaces, pp , vol. 34 (3), Paramita Sarkar, Ditipriya Sinha; An Approach to Continuous Pervasive Care of Remote Patients Based on Priority Based Assignment of Nurse ; Proceedings of 13th IFIP TC8 International Conference, CISIM 2014, Ho Chi Minh City, Vietnam, November 5-, 2014 CISIM pp , ISBN: X. Huang, Y. Xiang, A. Chonka, J. Zhou, and R. H. Deng, A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems, IEEE Transactions on Parallel and Distributed Systems, vol. 22(8), August A. A. Ahmed and I. Traore, Biometric Recognition Based on Free-Text Keystroke Dynamics, IEEE Transactions on Cybernetics, vol. 44(4), April Tapalina Bhattasali, Khalid Saeed, Nabendu Chaki, Rituparna Chaki; Bio-Authentication for Layered Remote Health Monitor Framework Journal of Medical Informatics and Technologies, Poland, pp , vol. 23, November ISSN: Nabendu Chaki, Rituparna Chaki, Intrusion Detection in Wireless Ad-Hoc Networks ; CRC Press,

40 Taylor & Francis Group, 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, Florida 3348, U.S.A, January ISBN: Novarun Deb, Manali Chakraborty, Nabendu Chaki; CORIDS: a cluster-oriented reward-based intrusion detection system for wireless mesh networks ; Wiley Journal of Security and Communication Networks, pp , vol. (3), Mar ISSN: Debdutta Barman Roy, Rituparna Chaki, Nabendu Chaki; BHIDS: A New Cluster Based Algorithm for Black Hole IDS ; Wiley Journal of Security and Communication Networks; SI on Security in Mobile Wireless Networks, pp , vol. 3(2-3), Mar ISSN: DOI= /sec Sunirmal Khatua, Nandini Mukherjee, Nabendu Chaki; A New Agent Based Security Framework for Collaborative Cloud Environment ; ACM ICPS Proceedings of Cyber Security and Information Intelligence Research Workshop (CSIIRW-), Oak Ridge, USA, Oct 12-14, ISBN:

41

ACADEMIC YEAR

ACADEMIC YEAR INTERNATIONAL JOURNAL SL.NO. NAME OF THE FACULTY TITLE OF THE PAPER JOURNAL DETAILS 1 Dr.K.Komathy 2 Dr.K.Komathy 3 Dr.K. Komathy 4 Dr.G.S.Anandha Mala 5 Dr.G.S.Anandha Mala 6 Dr.G.S.Anandha Mala 7 Dr.G.S.Anandha

More information

This list supersedes the one published in the November 2002 issue of CR.

This list supersedes the one published in the November 2002 issue of CR. PERIODICALS RECEIVED This is the current list of periodicals received for review in Reviews. International standard serial numbers (ISSNs) are provided to facilitate obtaining copies of articles or subscriptions.

More information

Great Minds. Internship Program IBM Research - China

Great Minds. Internship Program IBM Research - China Internship Program 2017 Internship Program 2017 Jump Start Your Future at IBM Research China Introduction invites global candidates to apply for the 2017 Great Minds internship program located in Beijing

More information

Profile of Dr.M.SELVI

Profile of Dr.M.SELVI Name : Dr.M.Selvi Designation : Assistant Professor Department : Electronics and Communication Bapatla College, Bapatla, Andhra Pradesh 522102 e-mail : drselvimunuswamy@gmail.com Scopus ID : 56046397600

More information

MSc(CompSc) List of courses offered in

MSc(CompSc) List of courses offered in Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The

More information

Ph.D : Technology & Science Fellowship available for meritorious Full-Time, candidates GATE / NET qualified Rs.

Ph.D : Technology & Science Fellowship available for meritorious Full-Time, candidates GATE / NET qualified Rs. QS Ranking NAAC Accredited A Emerging Researchers with creative dynamism for promising innovations are invited to join Hindustan, a blossoming Deemed University with a rich heritage and commitment for

More information

USTGlobal. Internet of Medical Things (IoMT) Connecting Healthcare for a Better Tomorrow

USTGlobal. Internet of Medical Things (IoMT) Connecting Healthcare for a Better Tomorrow USTGlobal Internet of Medical Things (IoMT) Connecting Healthcare for a Better Tomorrow UST Global Inc, August 2017 Table of Contents Introduction 3 What is IoMT or Internet of Medical Things? 3 IoMT New

More information

Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities

Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities Timely access to data, particularly data relevant to a patient s medical and genetic

More information

Journal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS

Journal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS List of Journals with impact factors Date retrieved: 1 August 2009 Journal Title ISSN Impact Factor 5-Year Impact Factor 1. ACM SURVEYS 0360-0300 9.920 14.672 2. VLDB JOURNAL 1066-8888 6.800 9.164 3. IEEE

More information

INDUSTRY 4.0. Modern massive Data Analysis for Industry 4.0 Industry 4.0 at VŠB-TUO

INDUSTRY 4.0. Modern massive Data Analysis for Industry 4.0 Industry 4.0 at VŠB-TUO INDUSTRY 4.0 Modern massive Data Analysis for Industry 4.0 Industry 4.0 at VŠB-TUO Václav Snášel Faculty of Electrical Engineering and Computer Science VŠB-TUO Czech Republic AGENDA 1. Industry 4.0 2.

More information

FACULTY PROFILE. Total Experience : 18 Years 7 Months Academic : 18 Years 7 Months. Degree Branch / Specialization College University

FACULTY PROFILE. Total Experience : 18 Years 7 Months Academic : 18 Years 7 Months. Degree Branch / Specialization College University FACULTY PROFILE Name Designation Email ID Area of Specialization : Dr.P.VETRIVELAN : Associate Professor : vetrivelan.ece@srit.org vetrivelanece@gmail.com : Signal & Image Processing Total Experience :

More information

Faculty Profile. Dr. T. R. VIJAYA LAKSHMI JNTUH Faculty ID: Date of Birth: Designation:

Faculty Profile. Dr. T. R. VIJAYA LAKSHMI JNTUH Faculty ID: Date of Birth: Designation: Faculty Profile Dr. T. R. VIJAYA LAKSHMI JNTUH Faculty ID: 25150330-153821 Date of Birth: 08-12-1979 Designation: Asst. Professor Teaching Experience: 15 years E-mail ID: vijaya.chintala@mgit.ac.in AREAS

More information

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET Latest Research Topics on MANET Routing Protocols Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET In this topic, the existing Route Repair method in AODV can be enhanced

More information

High Performance Computing Systems and Scalable Networks for. Information Technology. Joint White Paper from the

High Performance Computing Systems and Scalable Networks for. Information Technology. Joint White Paper from the High Performance Computing Systems and Scalable Networks for Information Technology Joint White Paper from the Department of Computer Science and the Department of Electrical and Computer Engineering With

More information

Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases.

Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases. Biomedical Research 2017; Special Issue: S315-S320 ISSN 0970-938X www.biomedres.info Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases. Deepa R 1*, Sutha J

More information

Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration

Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration Research Supervisor: Minoru Etoh (Professor, Open and Transdisciplinary Research Initiatives, Osaka University)

More information

UNIVERSITY OF CALCUTTA FACULTY ACADEMIC PROFILE

UNIVERSITY OF CALCUTTA FACULTY ACADEMIC PROFILE UNIVERSITY OF CALCUTTA FACULTY ACADEMIC PROFILE Full name of the faculty member: KAUSHIK DAS SHARMA Designation: ASSOCIATE PROFESSOR Specialization: Control System Date of Joining the University: December

More information

Iowa State University Library Collection Development Policy Computer Science

Iowa State University Library Collection Development Policy Computer Science Iowa State University Library Collection Development Policy Computer Science I. General Purpose II. History The collection supports the faculty and students of the Department of Computer Science in their

More information

A CYBER PHYSICAL SYSTEMS APPROACH FOR ROBOTIC SYSTEMS DESIGN

A CYBER PHYSICAL SYSTEMS APPROACH FOR ROBOTIC SYSTEMS DESIGN Proceedings of the Annual Symposium of the Institute of Solid Mechanics and Session of the Commission of Acoustics, SISOM 2015 Bucharest 21-22 May A CYBER PHYSICAL SYSTEMS APPROACH FOR ROBOTIC SYSTEMS

More information

Dr. Charles Watt. Educational Advancement & Innovation

Dr. Charles Watt. Educational Advancement & Innovation Dr. Charles Watt Educational Advancement & Innovation 1 21st Century Education What are the critical skills our undergraduate students need? Technical depth in a particular field Creativity and innovation

More information

A Report 1 st International Conference on Recent Advances in Information Technology (RAIT- 2012)

A Report 1 st International Conference on Recent Advances in Information Technology (RAIT- 2012) A Report 1 st International Conference on Recent Advances in Information Technology (RAIT- 2012) The Department of Computer Science & Engineering of Indian School of Mines, Dhanbad organized the 1 st International

More information

Advances and Perspectives in Health Information Standards

Advances and Perspectives in Health Information Standards Advances and Perspectives in Health Information Standards HL7 Brazil June 14, 2018 W. Ed Hammond. Ph.D., FACMI, FAIMBE, FIMIA, FHL7, FIAHSI Director, Duke Center for Health Informatics Director, Applied

More information

REPORT ON IEEE ComSoc Distinguished Lecturer Tour DLT 2010 IEEE Nano-CAS Jointly Organized By:

REPORT ON IEEE ComSoc Distinguished Lecturer Tour DLT 2010 IEEE Nano-CAS Jointly Organized By: REPORT ON IEEE ComSoc Distinguished Lecturer Tour DLT 2010 IEEE Nano-CAS 2010 Date : 17 July 2010 (Saturday) Venue: Tata Consultancy Services (TCS) GDC Building, Delta Park Lords (Besides IEM & IDBI Bank)

More information

B.P. Poddar Institute of Management & Technology Chapte. Annual Report ( )

B.P. Poddar Institute of Management & Technology Chapte. Annual Report ( ) B.P. Poddar Institute of Management & Technology Chapte Annual Report (2017-2018) Chapter activities at B. P. Poddar Institute of Management and Technology student chapter of SPIE (in short SPIE BPPIMT

More information

Two day NADC workshop on Android Application Development. Technical Talk on Digital Universe: Challenges and Opportunities

Two day NADC workshop on Android Application Development. Technical Talk on Digital Universe: Challenges and Opportunities No. Date Topic Invited Speaker 5 th - 6 th February, Two day NADC workshop on Android Application Development ARK Technosoluti on in association with IIT Madras 18 th April, Technical Talk on Digital Universe:

More information

PUBLICATIONS BY THE STAFF Springer Vol 32, Issue 2, Dec Ms.S.Sujatha

PUBLICATIONS BY THE STAFF Springer Vol 32, Issue 2, Dec Ms.S.Sujatha PUBLICATIONS BY THE 2009-2010 JOURNAL NAME AND Springer Vol 32, Issue 2, Dec 2009 - Intelligent Agent Based Artificial Immune System for computer security review 2010-2011 Ms.R.Mala JOURNAL NAME AND CIIT

More information

Dr. Pinaki Chakraborty. Dr. A. K. Atta. Dr. Nabakumar Pramanik. Anish Kumar Saha. List of Publications of ( ) Journals

Dr. Pinaki Chakraborty. Dr. A. K. Atta. Dr. Nabakumar Pramanik. Anish Kumar Saha. List of Publications of ( ) Journals List of Publications of (2012-2013) Journals Dr. Pinaki Chakraborty Dr. A. K. Atta 1. Atta, A. K.; Kim, Seul-bee.; Heo, J.; Cho, D-G. Hg(II)-Mediated Intramolecular Cyclization Reaction in Aqueous Media

More information

Authenticated Document Management System

Authenticated Document Management System Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College

More information

COURSE 2. Mechanical Engineering at MIT

COURSE 2. Mechanical Engineering at MIT COURSE 2 Mechanical Engineering at MIT The Department of Mechanical Engineering MechE embodies the Massachusetts Institute of Technology s motto mens et manus, mind and hand as well as heart by combining

More information

SPTF: Smart Photo-Tagging Framework on Smart Phones

SPTF: Smart Photo-Tagging Framework on Smart Phones , pp.123-132 http://dx.doi.org/10.14257/ijmue.2014.9.9.14 SPTF: Smart Photo-Tagging Framework on Smart Phones Hao Xu 1 and Hong-Ning Dai 2* and Walter Hon-Wai Lau 2 1 School of Computer Science and Engineering,

More information

Postgraduate Diploma In Patinformatics (Patent Informatics)

Postgraduate Diploma In Patinformatics (Patent Informatics) URDIP Postgraduate Diploma In Patinformatics (Patent Informatics) Offered by CSIR Unit for Research and Development of Information Products (URDIP) Under the Aegis of Admission Brochure (2017 2018) About

More information

University/college Present Position Date of Joining Total Experience Associate Professor Till Date 28+ years

University/college Present Position Date of Joining Total Experience Associate Professor Till Date 28+ years Dr. M. VENKATESWARA RAO GITAM Institute of Technology Dept. of. Information Technology GITAM University Rushikonda, Visakhapatnam-45 AP, India. Phone no: 0891-2840285 email id: mandapati_venkat@yahoo.co.in

More information

WFEO STANDING COMMITTEE ON ENGINEERING FOR INNOVATIVE TECHNOLOGY (WFEO-CEIT) STRATEGIC PLAN ( )

WFEO STANDING COMMITTEE ON ENGINEERING FOR INNOVATIVE TECHNOLOGY (WFEO-CEIT) STRATEGIC PLAN ( ) WFEO STANDING COMMITTEE ON ENGINEERING FOR INNOVATIVE TECHNOLOGY (WFEO-CEIT) STRATEGIC PLAN (2016-2019) Hosted by The China Association for Science and Technology March, 2016 WFEO-CEIT STRATEGIC PLAN (2016-2019)

More information

CURRICULUM VITAE. Brief Bio data. Sumit Kumar Maji is Assistant Professor at the Department of Commerce of the University

CURRICULUM VITAE. Brief Bio data. Sumit Kumar Maji is Assistant Professor at the Department of Commerce of the University CURRICULUM VITAE Sumit Kumar Maji Assistant Professor Department of Commerce The University of Burdwan Burdwan, West Bengal, India Mob: 09475939809 E-mail id: 2009sumitbu@gmail.com Brief Bio data Sumit

More information

GTU BOARD for MOBILE COMPUTING and WIRELESS TECHNOLOGIES. Mobile Computing, Networking and Applications (MNA).

GTU BOARD for MOBILE COMPUTING and WIRELESS TECHNOLOGIES. Mobile Computing, Networking and Applications (MNA). TO ALL FACULTY MEMBER: Research is an important part of the Learning System in any institution of Higher Learning. Since last year, the University has been working with the faculty to upgrade our Learning

More information

SOURAV PATRA. Thesis: Linear matrix inequality approach to H-infinity Loop shaping control problems

SOURAV PATRA. Thesis: Linear matrix inequality approach to H-infinity Loop shaping control problems SOURAV PATRA RESEARCH INTERESTS Robust Control o H-infinity control o Control of negative-imaginary systems o Generalized distance measure for uncertain systems o Control of dynamical systems with actuator

More information

Department of Electrical & Computer Engineering. Five-Year Strategic Plan: Improving Lives. Transforming Louisiana. Changing the World.

Department of Electrical & Computer Engineering. Five-Year Strategic Plan: Improving Lives. Transforming Louisiana. Changing the World. Department of Electrical & Computer Engineering Five-Year Strategic Plan: 2010-2015 Improving Lives. Transforming Louisiana. Changing the World. Engineering is intertwined with our very own way of life.

More information

Performance Evaluation of MANET Using Quality of Service Metrics

Performance Evaluation of MANET Using Quality of Service Metrics Performance Evaluation of MANET Using Quality of Service Metrics C.Jinshong Hwang 1, Ashwani Kush 2, Ruchika,S.Tyagi 3 1 Department of Computer Science Texas State University, San Marcos Texas, USA 2,

More information

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique TECHNICAL REPORT ISO/IEC TR 24741 First edition 2007-09-15 Information technology Biometrics tutorial Technologies de l'information Tutoriel biométrique Reference number ISO/IEC 2007 Contents Page Foreword...

More information

Situational security, controlled privacy

Situational security, controlled privacy Situational security, controlled privacy Session: Advanced technologies for a hyper-connected society including security aspects 6 th Japan-EU Symposium on ICT Research and Innovation 7 th October 2016

More information

Proposers Day Workshop

Proposers Day Workshop Proposers Day Workshop Monday, January 23, 2017 @srcjump, #JUMPpdw Cognitive Computing Vertical Research Center Mandy Pant Academic Research Director Intel Corporation Center Motivation Today s deep learning

More information

CURRICULUM VITAE. Examination University/Board Year

CURRICULUM VITAE. Examination University/Board Year CURRICULUM VITAE 1. Name : Akashdeep 2. Designation : Assistant Professor 3. Department : Computer Science and Engineering 4. Address : Room # 212, Academic Block # 1, UIET, Panjab University, Sector-25,

More information

Introduction to Computational Intelligence in Healthcare

Introduction to Computational Intelligence in Healthcare 1 Introduction to Computational Intelligence in Healthcare H. Yoshida, S. Vaidya, and L.C. Jain Abstract. This chapter presents introductory remarks on computational intelligence in healthcare practice,

More information

The Key to the Internet-of-Things: Conquering Complexity One Step at a Time

The Key to the Internet-of-Things: Conquering Complexity One Step at a Time The Key to the Internet-of-Things: Conquering Complexity One Step at a Time at IEEE QRS2017 Prague, CZ June 19, 2017 Adam T. Drobot Wayne, PA 19087 Outline What is IoT? Where is IoT in its evolution? A

More information

EXTENDED TABLE OF CONTENTS

EXTENDED TABLE OF CONTENTS EXTENDED TABLE OF CONTENTS Preface OUTLINE AND SUBJECT OF THIS BOOK DEFINING UC THE SIGNIFICANCE OF UC THE CHALLENGES OF UC THE FOCUS ON REAL TIME ENTERPRISES THE S.C.A.L.E. CLASSIFICATION USED IN THIS

More information

About NEC. Co-creation. Highlights for social value creation. Telecommunications. Safety. Internet of Things. AI/Big Data.

About NEC. Co-creation. Highlights for social value creation. Telecommunications. Safety. Internet of Things. AI/Big Data. About NEC Company Name NEC Corporation Head Office 7-1, Shiba 5-chome Minato-ku, Tokyo 108-8001 Japan Phone: +81-3-3454-1111 Established July 17, 1899 Representative Directors: Chairman of the Board Nobuhiro

More information

Global Alzheimer s Association Interactive Network. Imagine GAAIN

Global Alzheimer s Association Interactive Network. Imagine GAAIN Global Alzheimer s Association Interactive Network Imagine the possibilities if any scientist anywhere in the world could easily explore vast interlinked repositories of data on thousands of subjects with

More information

Information Communication Technology

Information Communication Technology # 115 COMMUNICATION IN THE DIGITAL AGE. (3) Communication for the Digital Age focuses on improving students oral, written, and visual communication skills so they can effectively form and translate technical

More information

MSc Chemical and Petroleum Engineering. MSc. Postgraduate Diploma. Postgraduate Certificate. IChemE. Engineering. July 2014

MSc Chemical and Petroleum Engineering. MSc. Postgraduate Diploma. Postgraduate Certificate. IChemE. Engineering. July 2014 Faculty of Engineering & Informatics School of Engineering Programme Specification Programme title: MSc Chemical and Petroleum Engineering Academic Year: 2017-18 Degree Awarding Body: University of Bradford

More information

V.S.B. ENGINEERING COLLEGE, KARUR. Department of Computer Science and Engineering

V.S.B. ENGINEERING COLLEGE, KARUR. Department of Computer Science and Engineering V.S.B. ENGINEERING COLLEGE, KARUR. Department of and Details of Faculty Paper Publications in National and International Journals Academic Year : 2016-2017 International Journals : Sl. Name of the Title

More information

Ankur Sinha, Ph.D. Indian Institute of Technology, Kanpur, India Bachelor of Technology, Department of Mechanical Engineering, 2006

Ankur Sinha, Ph.D. Indian Institute of Technology, Kanpur, India Bachelor of Technology, Department of Mechanical Engineering, 2006 Ankur Sinha, Ph.D. Department of Information and Service Economy Aalto University School of Business Former: Helsinki School of Economics Helsinki 00100 Finland Email: Ankur.Sinha@aalto.fi EDUCATION Aalto

More information

Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain

Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain This fiche is part of the wider roadmap for cross-cutting KETs activities Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain Cross-cutting

More information

Dr. Sohail Abbas. Assistant Professor. Department of Computer Science University of Sharjah

Dr. Sohail Abbas. Assistant Professor. Department of Computer Science University of Sharjah Assistant Professor Department of Computer Science University of Sharjah E-Mail: sabbas@sharjah.ac.ae Phone office:+971 (0)65052520 OFFICE Department of Computer Science University of Sharjah, P.O. Box

More information

Adopting Standards For a Changing Health Environment

Adopting Standards For a Changing Health Environment Adopting Standards For a Changing Health Environment November 16, 2018 W. Ed Hammond. Ph.D., FACMI, FAIMBE, FIMIA, FHL7, FIAHSI Director, Duke Center for Health Informatics Director, Applied Informatics

More information

Application of combined TOPSIS and AHP method for Spectrum Selection in Cognitive Radio by Channel Characteristic Evaluation

Application of combined TOPSIS and AHP method for Spectrum Selection in Cognitive Radio by Channel Characteristic Evaluation International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 10, Number 2 (2017), pp. 71 79 International Research Publication House http://www.irphouse.com Application of

More information

National Conference on Science, Technology and Communication Skills (NCSTCS 2K18), 21st April, 2018, Narula Institute of Technology.

National Conference on Science, Technology and Communication Skills (NCSTCS 2K18), 21st April, 2018, Narula Institute of Technology. Name of faculty: Dr. Debjani Chakraboti Designation: Assistant Professor Contact Details: 9432137013 Qualification: M.Sc, M.Phil, MBA, Ph.D Research Experience: 11 Years Seminar/Conference Attended: National

More information

Brief to the. Senate Standing Committee on Social Affairs, Science and Technology. Dr. Eliot A. Phillipson President and CEO

Brief to the. Senate Standing Committee on Social Affairs, Science and Technology. Dr. Eliot A. Phillipson President and CEO Brief to the Senate Standing Committee on Social Affairs, Science and Technology Dr. Eliot A. Phillipson President and CEO June 14, 2010 Table of Contents Role of the Canada Foundation for Innovation (CFI)...1

More information

Pan-Canadian Trust Framework Overview

Pan-Canadian Trust Framework Overview Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document

More information

VLSI. at IIT Delhi Placements Placement Brochure. Department of Electrical Engineering. Department of Computer Science and Engineering

VLSI. at IIT Delhi Placements Placement Brochure. Department of Electrical Engineering. Department of Computer Science and Engineering VLSI at IIT Delhi Placements 2009-10 http://web.iitd.ac.in/~ee/~iec/ http://web.iitd.ac.in/~vdtt/ Department of Electrical Engineering Department of Computer Science and Engineering Center for Applied

More information

AI MAGAZINE AMER ASSOC ARTIFICIAL INTELL UNITED STATES English ANNALS OF MATHEMATICS AND ARTIFICIAL

AI MAGAZINE AMER ASSOC ARTIFICIAL INTELL UNITED STATES English ANNALS OF MATHEMATICS AND ARTIFICIAL Title Publisher ISSN Country Language ACM Transactions on Autonomous and Adaptive Systems ASSOC COMPUTING MACHINERY 1556-4665 UNITED STATES English ACM Transactions on Intelligent Systems and Technology

More information

Gesticulation Based Smart Surface with Enhanced Biometric Security Using Raspberry Pi

Gesticulation Based Smart Surface with Enhanced Biometric Security Using Raspberry Pi www.ijcsi.org https://doi.org/10.20943/01201705.5660 56 Gesticulation Based Smart Surface with Enhanced Biometric Security Using Raspberry Pi R.Gayathri 1, E.Roshith 2, B.Sanjana 2, S. Sanjeev Kumar 2,

More information

Introduction to IEEE CAS Publications

Introduction to IEEE CAS Publications Introduction to IEEE CAS Publications Gianluca Setti 12 1 Dep. of Engineering (ENDIF) University of Ferrara 2 Advanced Research Center on Electronic Systems for Information Engineering and Telecommunications

More information

Dr. S. Kanaga Suba Raja

Dr. S. Kanaga Suba Raja Dr. S. Kanaga Suba Raja Academic title Professor Contact Information Official No. 044-43923049 Personal No. 9486684400 Educational Qualification Ph. D Computer Science and Engineering M. E Computer Science

More information

Assessment of Smart Machines and Manufacturing Competence Centre (SMACC) Scientific Advisory Board Site Visit April 2018.

Assessment of Smart Machines and Manufacturing Competence Centre (SMACC) Scientific Advisory Board Site Visit April 2018. Assessment of Smart Machines and Manufacturing Competence Centre (SMACC) Scientific Advisory Board Site Visit 25-27 April 2018 Assessment Report 1. Scientific ambition, quality and impact Rating: 3.5 The

More information

Detailed Bio Data of DR. DIPANKAR GHOSH as per AICTE Format

Detailed Bio Data of DR. DIPANKAR GHOSH as per AICTE Format Detailed Bio Data of DR. DIPANKAR GHOSH as per AICTE Format DR. DIPANKAR GHOSH HOD & Associate Professor Date of Joining the Institute: 09/07/2012 B.SC (1 st M.SC (1 st M.TECH (1 st Study And Performance

More information

Visiting Assistant Professor(January December 2002), Department of Computer. Sciences, Purdue University, West Lafayette.

Visiting Assistant Professor(January December 2002), Department of Computer. Sciences, Purdue University, West Lafayette. Curriculum Vitáe Vineeth K Paleri Professor Department of Computer Science and Engineering National Institute of Technology, Calicut Kerala-673601, INDIA. Tel: 0495-2286802 Email: vpaleri@nitc.ac.in Personal

More information

Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.

Notes from a seminar on Tackling Public Sector Fraud presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Tackling Public Sector Fraud Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Glenis Bevan audit Manager, Audit

More information

2.6.1: Program Outcomes

2.6.1: Program Outcomes 2.6.1: Program Outcomes Program: M.Sc. Informatics Program Specific Outcomes (PSO) PSO1 This program provides studies in the field of informatics, which is essentially a blend of three domains: networking,

More information

DEPARTMENT OF TEXTILE TECHNOLOGY

DEPARTMENT OF TEXTILE TECHNOLOGY DEPARTMENT OF TEXTILE TECHNOLOGY Programmes offered Full Time B. Tech (Textile Technology) M. Tech (Textile Engineering and Management) Part time M. Tech (Textile Engineering) Curriculum is designed to

More information

Kosuke Imamura, Assistant Professor, Department of Computer Science, Eastern Washington University

Kosuke Imamura, Assistant Professor, Department of Computer Science, Eastern Washington University CURRICULUM VITAE Kosuke Imamura, Assistant Professor, Department of Computer Science, Eastern Washington University EDUCATION: PhD Computer Science, University of Idaho, December

More information

IEEE IoT Vertical and Topical Summit - Anchorage September 18th-20th, 2017 Anchorage, Alaska. Call for Participation and Proposals

IEEE IoT Vertical and Topical Summit - Anchorage September 18th-20th, 2017 Anchorage, Alaska. Call for Participation and Proposals IEEE IoT Vertical and Topical Summit - Anchorage September 18th-20th, 2017 Anchorage, Alaska Call for Participation and Proposals With its dispersed population, cultural diversity, vast area, varied geography,

More information

Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models

Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models Rohit Kumar Department of Computer Sc. & Engineering Chandigarh University, Gharuan Mohali, Punjab

More information

Mechanical Engineering

Mechanical Engineering Mechanical Engineering 1 Mechanical Engineering Degree Awarded Bachelor of Science in Mechanical Engineering Nature of Program Mechanical engineering is one of the largest technical professions with a

More information

Digital Identity Innovation Canada s Opportunity to Lead the World. Digital ID and Authentication Council of Canada Pre-Budget Submission

Digital Identity Innovation Canada s Opportunity to Lead the World. Digital ID and Authentication Council of Canada Pre-Budget Submission Digital Identity Innovation Canada s Opportunity to Lead the World Digital ID and Authentication Council of Canada Pre-Budget Submission August 4, 2017 Canadian governments, banks, telcos, healthcare providers

More information

A STUDY ON THE DOCUMENT INFORMATION SERVICE OF THE NATIONAL AGRICULTURAL LIBRARY FOR AGRICULTURAL SCI-TECH INNOVATION IN CHINA

A STUDY ON THE DOCUMENT INFORMATION SERVICE OF THE NATIONAL AGRICULTURAL LIBRARY FOR AGRICULTURAL SCI-TECH INNOVATION IN CHINA A STUDY ON THE DOCUMENT INFORMATION SERVICE OF THE NATIONAL AGRICULTURAL LIBRARY FOR AGRICULTURAL SCI-TECH INNOVATION IN CHINA Qian Xu *, Xianxue Meng Agricultural Information Institute of Chinese Academy

More information

II. ROBOT SYSTEMS ENGINEERING

II. ROBOT SYSTEMS ENGINEERING Mobile Robots: Successes and Challenges in Artificial Intelligence Jitendra Joshi (Research Scholar), Keshav Dev Gupta (Assistant Professor), Nidhi Sharma (Assistant Professor), Kinnari Jangid (Assistant

More information

Framework Programme 7

Framework Programme 7 Framework Programme 7 1 Joining the EU programmes as a Belarusian 1. Introduction to the Framework Programme 7 2. Focus on evaluation issues + exercise 3. Strategies for Belarusian organisations + exercise

More information

Demonstration of DeGeL: A Clinical-Guidelines Library and Automated Guideline-Support Tools

Demonstration of DeGeL: A Clinical-Guidelines Library and Automated Guideline-Support Tools Demonstration of DeGeL: A Clinical-Guidelines Library and Automated Guideline-Support Tools Avner Hatsek, Ohad Young, Erez Shalom, Yuval Shahar Medical Informatics Research Center Department of Information

More information

The IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems. Overview June, 2017

The IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems. Overview June, 2017 The IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems Overview June, 2017 @johnchavens Ethically Aligned Design A Vision for Prioritizing Human Wellbeing

More information

CATALOGUE. HBRP Publication

CATALOGUE. HBRP Publication CATALOGUE HBRP Publication ARCHITECTURE Journal of Housing and Advancement in Interior Designing Є Housing Science and Management Є Computer Techniques in Architectural Design Є Construction Industry and

More information

OASIS concept. Evangelos Bekiaris CERTH/HIT OASIS ISWC2011, 24 October, Bonn

OASIS concept. Evangelos Bekiaris CERTH/HIT OASIS ISWC2011, 24 October, Bonn OASIS concept Evangelos Bekiaris CERTH/HIT The ageing of the population is changing also the workforce scenario in Europe: currently the ratio between working people and retired ones is equal to 4:1; drastic

More information

Humanities for a Digital Society, Towards The Tilburg School of Humanities and Digital Sciences

Humanities for a Digital Society, Towards The Tilburg School of Humanities and Digital Sciences Humanities for a Digital Society, 2018-2021 Towards The Tilburg School of Humanities and Digital Sciences Version 4.0, dd 23 November 2017, approved by Faculty Council Vision Human identities and responsibilities,

More information

Dr. KAUSHIK ROY. Newbarrackpore, Kolkata-131

Dr. KAUSHIK ROY.   Newbarrackpore, Kolkata-131 Dr. KAUSHIK ROY 213/A/1, East Kodalia E-mail: kaushik_mrg@hotmail.com, Newbarrackpore, Kolkata-131 Ph: +919432841740 / +918013921318 http://www.wbsubregistration.org/cv/kaushik_roy.pdf RESEARCH INTEREST

More information

Biometric Recognition: How Do I Know Who You Are?

Biometric Recognition: How Do I Know Who You Are? Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu

More information

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) Contribution to the CSTD ten-year review of the implementation of WSIS outcomes Submitted by PAKISTAN DISCLAIMER: The views presented

More information

Malaviya National Institute of Technology Jaipur

Malaviya National Institute of Technology Jaipur Malaviya National Institute of Technology Jaipur Advanced Pattern Recognition Techniques 26 th 30 th March 2018 Overview Pattern recognition is the scientific discipline in the field of computer science

More information

FACULTY PROFILE. : Wireless Communication, Biomedical Image Processing, Total Experience : 12 years 7 months Academic : 12 years 1 Month

FACULTY PROFILE. : Wireless Communication, Biomedical Image Processing, Total Experience : 12 years 7 months Academic : 12 years 1 Month FACULTY PROFILE Name Designation Email ID : Dr. S.MARY PRAVEENA : Associate Professor :marypraveena.ece@srit.org Area of Specialization : Wireless Communication, Biomedical Image Processing, Optical communication

More information

Computer & Information Science & Engineering (CISE)

Computer & Information Science & Engineering (CISE) Computer & Information Science & Engineering (CISE) Wendy J. Nilsen, PhD Computer and Information Science and Engineering http://www.nsf.gov/cise Advanced Cyberinfrastructure Computing & Communication

More information

HACETTEPE ÜNİVERSİTESİ COMPUTER ENGINEERING DEPARTMENT BACHELOR S DEGREE INFORMATION OF DEGREE PROGRAM 2012

HACETTEPE ÜNİVERSİTESİ COMPUTER ENGINEERING DEPARTMENT BACHELOR S DEGREE INFORMATION OF DEGREE PROGRAM 2012 HACETTEPE ÜNİVERSİTESİ COMPUTER ENGINEERING DEPARTMENT BACHELOR S DEGREE INFORMATION OF DEGREE PROGRAM 2012 1 a. General Description Hacettepe University, Computer Engineering Department, was established

More information

UNIT 2 TOPICS IN COMPUTER SCIENCE. Emerging Technologies and Society

UNIT 2 TOPICS IN COMPUTER SCIENCE. Emerging Technologies and Society UNIT 2 TOPICS IN COMPUTER SCIENCE Emerging Technologies and Society EMERGING TECHNOLOGIES Technology has become perhaps the greatest agent of change in the modern world. While never without risk, positive

More information

Curriculum Vitae. Degree Institute/Board Specialization CGPA/% Year Ph.D. IIT Guwahati RF & Microwave M.Tech NIT Durgapur

Curriculum Vitae. Degree Institute/Board Specialization CGPA/% Year Ph.D. IIT Guwahati RF & Microwave M.Tech NIT Durgapur Curriculum Vitae SOMEN BHATTACHARJEE PhD (IIT Guwahati) Phone: +91 9732080815 Email: b.somen@iitg.ernet.in, somen.aec@gmail.com 1 Personal Information Name : Dr. Somen Bhattacharjee Father s Name : Sanjib

More information

Doctoral College Environmental Informatics

Doctoral College Environmental Informatics Doctoral College Environmental Informatics Prof. Schahram Dustdar Head of the Doctoral College Kick-Off Event 12 th March 2013 http://ei.infosys.tuwien.ac.at Agenda Introduction Faculty of Informatics

More information

SRM Research Institute

SRM Research Institute 1 SRM Research Institute About SRM Research Institute (SRM RI) SRM Research Institute, a unit of SRM University, is formed to catalyze proactive applied research to help solve industry s technical problems

More information

Durham Research Online

Durham Research Online Durham Research Online Deposited in DRO: 29 August 2017 Version of attached le: Accepted Version Peer-review status of attached le: Not peer-reviewed Citation for published item: Chiu, Wei-Yu and Sun,

More information

SPQR RoboCup 2016 Standard Platform League Qualification Report

SPQR RoboCup 2016 Standard Platform League Qualification Report SPQR RoboCup 2016 Standard Platform League Qualification Report V. Suriani, F. Riccio, L. Iocchi, D. Nardi Dipartimento di Ingegneria Informatica, Automatica e Gestionale Antonio Ruberti Sapienza Università

More information

Keynotes. Visual Mining Interpreting Image and Video. Stefan Rüger Professor Knowledge Media Institute, The Open University, UK

Keynotes. Visual Mining Interpreting Image and Video. Stefan Rüger Professor Knowledge Media Institute, The Open University, UK Keynotes Visual Mining Interpreting Image and Video Stefan Rüger Professor Knowledge Media Institute, The Open University, UK Like text mining, visual media mining tries to make sense of the world through

More information

Global Journal on Technology

Global Journal on Technology Global Journal on Technology Vol 5 (2014) 73-77 Selected Paper of 4 th World Conference on Information Technology (WCIT-2013) Issues in Internet of Things for Wellness Human-care System Jae Sung Choi*,

More information

Privacy and Security in an On Demand World

Privacy and Security in an On Demand World Privacy and Security in an On Demand World Harriet Pearson, V.P. Workforce & Chief Privacy Officer IBM Corporation Almaden Institute Symposium on Privacy April 9, 2003 2002 IBM Corporation Outline Where

More information

Resume. Specialty: Clustering analysis, Image and Speech Processing, Data Mining

Resume. Specialty: Clustering analysis, Image and Speech Processing, Data Mining Cover Letter Experience for living and studying abroad with strong communication and writing skill in English Solid research background: NOKIA grant and CIMO grant were awarded, participated several international

More information

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used

More information