VIDYASAGAR UNIVERSITY
Faculty Information System
Self Declared Document


Name Dr. Biswapati Jana
Designation Associate Professor , Head
Department Name COMPUTER SCIENCE
Office Phone No +91 3222 298-274 / Centrex Extn. 274
Email ID biswapati.jana@mail.vidyasagar.ac.in
Fax 03222-257297
Mobile No 9126661253
Personal Website
Address Department of Computer Science Vidyasagar University
Educational Qualification
Degree NameInstituteYear of passing/awarded
Ph.D. in Computer ScienceVidyasagar University2017
M.Tech. in Computer Science & EngineeringCalcutta University2002
B.Tech. in Computer Science & EngineeringCalcutta University1999
B.Sc. in Physics [Hons] Calcutta University1996


Career Profile / Teaching Experience
Associate Professor, Department of Computer Science, Vidyasagar University, P.O:-Vidyasagar University, Dist:- Paschim Medinipur, Pin:-721102.
Assistant Professor, Department of Computer Science, Vidyasagar University, P.O:-Vidyasagar University, Dist:- Paschim Medinipur, Pin:-721102.
Lecturer, Department of Computer Science & Engineering , Haldia Institute of Technology (HIT), P.O. – HIT Campus, Dist:- Purba Medinipur. Pin:-721657.

Specialization/Research Area
Field of SpecializationResearch Area/ Areas of Interest
Data Hiding
Steganography
Watermarking
Image Processing
Cryptography
Computer Vision
Machine Learning
Natural Language Processing
Mobile Ad-Hoc Network

Course/ Subject Taught
Compiler Design
Image Processing
Cryptography and Steganography
Multimedia Security
Computer Fundamental (CBCS)
Research Methodology

Conference/ Symposium /Journal Paper / Books Published
International Publication
TitlePublished inYearPublished by
A secure reversible color image watermarking scheme based on LBP, lagrange interpolation polynomial and weighted matrixMultimedia Tools and Application2021Springer
Improving the Reversible LSB MatchingScheme Based on the Likelihood Re-encoding StrategyEntropy2021Entropy
Application of Fuzzy Logic based GA and PSO to solve 4D Multi-item transportation problem for substitute and complementary itemsEvolutionary Intelligence2021Springer
An Image Authentication and Tampered De- tection Scheme Exploiting Local Binary Pattern along with Hamming Error Correcting CodeWireless Personal Communications2021Springer
A new DCT based robust image watermarking scheme using cellular automataInformation Security Journal: A Global Perspective2021Taylor & Francis
Fuzzy logic with superpixel based block similarity measures for secured data hiding schemeCOMSYS-20212021Springer
A Data Hiding Technique Based on QR Code Decomposition in Transform DomainCOMSYS-20212021Springer
Dual image based data hiding scheme using Quorum FunctionEAIT-20202021Springer
Application of Dynamic Weight with Distance to Reduce Packet Loss in RED based AlgorithmEAIT-20202021Springer
Comparative analysis of bio- inspired dragonfly and honeybee algorithm-based routing protocols with the ant colony algorithm for MANETEAIT-20202021Springer
A Nobel Congestion Control Algorithm Using Buffer Occupancy REDCIPR-20212021Springer
A Novel Data Hiding Technique Based on QR Code Decomposition in Transform DomainCIPR-20212021Springer
A Predictable Active Queue Management to Reduce Sensitivity of RED ParameterInternational Journal of Engineering &Technology 2021Science Publishing Corporation, Dubai, UAE
Superpixel based Robust Reversible Data Hiding Scheme Exploiting Arnold Transform with DCT and CAJournal of King Saud University - Computer and Information Sciences2020Elsevier
Robust Watermarking scheme for compressed image through DCT exploiting Superpixel and Arnold transformConference Proceeding2020Springer
Multi-Sensor Tracking Simulator Design and its ChallengesConference Proceeding2020Springer
Weighted matrix based random data hiding scheme within a pair of interpolated imageConference Proceeding2020Springer
Multiple Radar Data Fusion to Improve the Accuracy in Position Measurement Basedon K-means AlgorithmConference Proceeding2020Springer
Center-Symmetric Local Binary Pattern-Based Image Authentication Using Local and Global Features Vector.Advances in Intelligent Systems and Computing2020Springer
High Payload RDH Through Directional PVO Exploiting Center- Folding Strategy.Conference Proceeding2020Springer
A Robust Audio Authentication Scheme Using (11,7) Hamming Error Correcting Code.Conference Proceeding2020Springer
Authentication on Interpolated Sub-Sampled based Image Steganography Exploiting Secret Sharing.Conference Proceeding2020Springer
Data Hiding Based on Decagon-Shaped ShellAdvances in Intelligent Systems and Computing2020Springer
A Survey to Analyse Routing Algorithms for Opportunistic NetworkProcedia Computer Science2020Elsevier
Application of fuzzy programming techniques to solve solid transportation problem with additional constraintsOperations Research And Decisions2020Operations Research And Decisions
Improved center-folding based directional pixel value ordering for reversible data hiding schemeMultimedia Tools and Applications2020Springer
Application of random triangular and Gaussian type-2 fuzzy variable to solve fixed charge multi-item four-dimensional transportation problemApplied Soft Computing2020Elsevier
Improved center folding based directional pixel value ordering for reversible data hiding schemeMultimedia Tools and Applications2020Springer
A New Efficient Swarm-based Routing Protocol for MANET Exploiting DRAGONFLY with HONEY BEEVCIPECH-20202020KIET Group of Institutions Ghaziabad
Hiding data in dual color images reversibly via weighted matrixJournal of Information Security and Applications,50,20202020Elsevier
A New Repeated Pixel Value Difference-Based Steganographic Scheme with Overlapped PixelIntelligent Computing: Image Processing Based Applications,2020Springer
A Method of Building Ontology Based Information knowledgebaseInternational Journal of Computer Sciences and Engineering (IJCSE), 7(1), Jan 20192019IJCSE, (UGC Approved)
Watermarking Scheme using LBP for Image Authentication and Tamper Detection through dual imageSecurity and Privacy, Wiley Online Library2019Wiley Online Library
Pixel Value Ordering with Prediction Error Expansion Based High Fidelity Reversible Data Hiding SchemeInternational Journal of Applied Engineering Research (IJAER), 14(4), (2019) pp. 998-10062019IJAER, (UGC Approved)
LFSR-based Multi-ant Cellular Automation and Chaotic Map based Image EncryptionSecurity and Privacy, Wiley Online Library, 1(6), e522019Wiley Online Library.
A robust reversible data hiding scheme for Color Image using Reed-Solomon CodeMultimedia Tools and Application (MTA), Springer, 20192019Springer, (IF-1.541)
Fake Image and News Detection on Social Media ThroughTrust-ware Based Community PortalConference Proceeding2019YSC-2019
FC 4D MITPs in Crisp and Rough Environments for Substitutable and Complementary Items with Budget ConstraintsMDPI-mathematics. Mathematics 7, no. 3 (2019): 281, IF-1.105 (SCI Journal)2019MDPI
A Novel Method for High Capacity Reversible Data Hiding Scheme Using Difference ExpansionInternational Journal of Natural Computing Research (IJNCR), IGI Global.2019IGI Global.
Robust Watermarking Scheme for Tamper Detection and Authentication Exploiting Cellular AutomataIET Image Processing, IEEE, DOI: 10.1049/iet-ipr.2018.66382019IEEE
Directional Pixel Value Ordering Based Secret Sharing Using Sub-Sampled Image Exploiting Lagrange PolynomialDOI :10.1007/s42452-019-0659-1, SN Applied Sciences, Springer2019Springer
Analysis of Factors and their Impacts in Measurement Accuracy and Prioritization of RadarsInternational Journal of Research and Analytical Reviews (IJRAR),, Vol-5, Issue-4, December 2018, pp- 548-554. (UGC Approved).2018IJRAR
Analysis of Factors and their Impacts in Measurement Accuracy and Prioritization of RadarsInternational Journal of Research and Analytical Reviews (IJRAR), 5(4), December 20182018IJRAR, (UGC Approved)
Secured Steganographic Scheme For Highly Compressed Color Image Using Weighted Matrix Through DCTInternational Journal of Computers and Applications (IJCA)2018Taylor & Francis
Weighted matrix based reversible watermarking scheme using color imageMultimedia Tools and Application (MTA), Springer2018Springer (IF-1.530)
Directional PVO for Reversible Data Hiding Scheme withImage InterpolationMultimedia Tools and Application (MTA), Springer2018Springer (IF-1.530)
Improved data hiding capacity through repeated embedding using modified weighted matrix for color imageInternational Journal of Computers and Applications (IJCA)2018Taylor and Francis
Copy Move Forgery Detection through Graph Neighborhood DegreeInternational Journal of Applied Engineering Research (IJAER), 13(18), pp. 13421-134272018IJAER, (UGC Approved)
Reversible Watermarking Scheme Using PVD-DEProceedings of the International Conference at Calcutta Business School, Kolkata on March 24-25, 20172017Springer
Reversible Data Hiding Scheme Using Sub-Sampled ImageExploiting Lagrange’s Interpolating PolynomialMultimedia Tools and Application (MTA), Springer. 2017Springer (IF-1.530)
Extended Directional IPVO for Reversible Data Hiding SchemeProceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) was held in Haldia, India during November 2-3, 2017 2017Springer
Representation and Exploring the Semantic Organization of Bangla Word in theMental Lexicon: Evidence from Cross-modal Priming Experiments and VectorSpace ModelProceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) was held in Haldia, India during November 2-3, 2017 2017Springer
High Capacity Reversible Data Hiding Scheme Using Dual Color Image through(7, 4) Hamming CodeProceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) was held in Haldia, India during November 2-3, 2017 2017Springer
Hamming code based watermarking scheme for Image Authentication andTampered detectionProceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) will be held in Haldia, India during November 2-3, 2017 2017Springer
Exploring the semantic organization of Bangla words in the mental lexiconProcedia Computer Science 115 (2017) 556–5622017Procedia Computer Science , Elsevier
Partial reversible data hiding scheme using (7, 4) hamming codeMultimedia Tools and Application, Springer, 1-162016Springer (IF-1.530)
Dual Image Based Reversible Data Hiding Scheme Using (7,4) Hamming CodeMultimedia Tools and Application, Springer. 1-232016Springer (IF-1.530)
Dual Image based Reversible Data Hiding Scheme Using Pixel Value Difference With Exploiting Modification DirectionProceedings of the First International Conference on Intelligent Computing and Communication Volume 458 of the series Advances in Intelligent Systems and Computing, Pages 549-5572016Springer
Dual-Image Based Reversible Data Hiding Scheme Using Pixel Value Difference ExpansionInternational Journal of Network Security, 18(04),633-643, DOI: 10.6633/IJNS.201607.18(4).042016IJNS
High payload reversible data hiding scheme using weighted matrixOptik -International Journal for Light and Electron Optics, 127(6), 3347-3358, http://dx.doi.org/10.1016/j.ijleo.2015.12.0552016Elsevier (Impact Factor: 0.677)
Dual Image based Reversible Data Hiding Scheme using Weighted MatrixInt. J. of Electronics and Information Engineering, Vol.5, No.1, PP.6-19, Sept. 2016, DOI: 10.6636/IJEIE.201609.5(1).02) 2016IJEIE
An Efficient Weight Matrix based Reversible DataHiding SchemeInternational Conference on Computers and Management (ICCM-2015), Jaipur (Rajasthan), India2015ACM
Hierarchical Visual Secret Sharing Scheme Using SteganographyMathematics and Computing,Springer Proceedings in Mathematics & Statistics, Volume 139, pp 363-389, 20152015Springer
An Efficient Data Hiding Scheme Using Hamming Error Correcting CodeProceedings of the Sixth International Conference on Computer and Communication Technology (ICCCT '15), 2015, Pages 360-365.2015ACM digital library
Reversible Data Hiding Through Hamming Code Using Dual ImageProceedings of the International Congress on Information and Communication Technology, Volume 439 of the series Advances in Intelligent Systems and Computing, Pages 495-5042015Springer (AISC).
Dual Image Based Reversible Data Hiding Scheme Using Three Pixel Value DifferenceInformation Systems Design and Intelligent Applications Volume 434 of the series Advances in Intelligent Systems and Computing, Pages 403-4122015AISC-Springer.
Weighted Matrix Based Reversible Data Hiding Scheme Using Image InterpolationComputational Intelligence in Data Mining—Volume 2 Volume 411 of the series Advances in Intelligent Systems and Computing pp 239-2482015Springer
Cheating Prevention In Visual Cryptographic Schemes Using Message Embedding: A Hardware Based Practical ApproachProceedings of International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT-2014), pp 319 – 324, DOI: 10.1109/ICICICT.2014.6781300, 20142014IEEE
Survey on Cheating and Prevention Techniques in Visual CryptographyMathematical Sciences International Research Journal, 3(Special Issue), 961-9762014IMRF
Cheating Prevention in Hierarchical Visual Secret Sharing Scheme using weight matrix-based SteganographyMathematical Sciences International Research Journal, 3(2), 796-7992014IMRF
Survey on Size Invariant Visual CryptographyInternational Journal of Computer Science and Information Technologies, 5(3), 3985-39902014IJCST
Cheating Prevention in Hierarchical Visual Secret Sharing Scheme Using Weight Matrix-Based SteganographyMathematical Sciences International Research Journal, Volume 3, No 2, ISSN-22788697, pp 796-799, 20142014International Multidisciplinary Research Foundation
Survey on Size Invariant Visual CryptographyInternational Journal of Computer Science and Information Technologies, Volume 5, No. 3, pp 3985-3990, ISSN-0975-9646, 20142014Tech Science Publications
Key Distribution In Wireless Sensor Networks Using Quantum CryptographyInternational Journal of Mobile & Adhoc Network, Volume 3 Issue- 4, pp 250-256, ISSN 2231–6825, 20132013International forum of researchers Students and Academician (IFRSA)
Image Steganography based on Cellular AutomataInternational Journal of Pure and Applied Mathematics, Volume 83, No 5, pp 701-715, ISSN-1311-8080, 20132013Academic Publications
Key Distribution in Wireless Sensor Networks using Quantum CryptographyInternational Journal of Mobile & Adhoc Network, 3(4), 250-256.2013IJMAN
New Image Noise Reduction Schemes Based on Cellular AutomataInternational Journal of Soft Computing and Engineering, Volume-2, Issue-2, pp 98-103, ISSN 2231-2707, 20122012Blue Eyes Intelligence Engineering & Sciences Publication
A Cryptosystem For Encryption and Decryption of Long Confidential MessageInformation Security and Assurance Communications in Computer and Information Science, Springer, Volume 76, pp 86-96, 20102010Springer
Object Extraction Using Novel Region Merging and Multidimensional FeaturesFourth Pacific-Rim Symposium on Image and Video Technology (PSIVT), pp 356 – 361, Print ISBN: 978-1-4244-8890-2 , DOI: 10.1109/PSIVT.2010.66, 20102010IEEE
Recognition Of Partially Occluded, Expression Variant Faces Using Elastic Bunch Graph MatchingProceedings of 1st IEEE-International Conference on Signal and Image Processing (IEEE-ICSIP-06), 20062006IEEE


National Publication
TitlePublished inYearPublished by
Parity based Image Steganography using Cellular AutomataProceedings of National Seminar on Emerging Trends in Mathematics2012Vidyasagar University In collaboration with Calcutta Mathematical Society, Midnapore-721102, West Bengal
Automatic Pitman Shorthand Script Recognition Using Fuzzy Rule Based Technique” National Seminar On Recent Trends in Advanced Computing Organized by the Department of Computer Science Vidyasagar University.2012Department of Computer Science Vidyasagar University.
Cellular Automata for Image noise reduction using Neighbor pixelAdvanced Communication Systems and Design Techniques (NCACD-2011), pp. 130-137.2011Conference Proceeding, Department of ECE, Haldia Institute of Technology, Haldia
Text Classifiers and Performance IssuesConference Proceeding of National Seminar on Data Mining & Decision Support, pp.51-59,Computer Centre, Vidyasagar University, Midnapore-721102.2010Computer Centre, Vidyasagar University.
An Extension of Nave Bayes Classifier using Frequent Closed Item setsTwo days National Conference on “Ubiquitous Computing 2009”, Organized by R&D Cell of Guru Nanak Institute of Technology, 157/F, Nilgunj Road, Panihati, Sodpur, Kolkata-7001142009GNIT, Sodpur, Kolkata
Expression and Pose Variant Face Image Identification Under Different Illumination Condition Using EBGMTwo days National Conference on “Ubiquitous Computing 2009”, Organized by R&D Cell of Guru Nanak Institute of Technology, 157/F, Nilgunj Road, Panihati, Sodpur, Kolkata-7001142009GNIT, Sodpur, Kolkata
A Scheme To Improve The Security Using Diffie-Helmann’s Key Distribution Scheme Coupling With RSA AlgorithmNational Conference on Broad Band Integrated Digital Systems And Networks -2005, NIEC, Shatri Park, New Delhi-1100532005NIEC, New Delhi.


Other Publication
TitlePublished inYearPublished by
A Hybrid System for Mood Recognition of Face Images using DS Theory and Fuzzy LogicProceedings of the Workshop on Multimedia System & Communication, ISM, Dhanbad.2004ISM, Dhanbad


Books Published

Ph. D. Thesis Guidence


Awarded Ph. D. Thesis
Scholar NameThesis TitleCo SupervisorStatusComplete in Year
Partha ChowdhuriDesign and Analysis of Image Steganographic ProtocolDr. Debasis Giri, MAKAUTAwarded2021
Sourav KaityPrioritization of Multi-Sensor Tracked DataDr. P K Das Gupta, DRDOAwarded2021
Soamdeep SinghaDesign of An Effective Congestion Control Routing Protocol forMobile-Ad-Hoc NetworkDr. Niranjan Kumar MandalAwarded2021
Pabitra PalDesign of Reversible Watermarking Techniques in Spatial DomainDr. Jaydeb Bhaumik, JUAwarded2020

Project Work

Ongoing Project Works
Project titleWorked asFunding AgencyAmount in Rs.Duration in yearsPeriod
Year to Year
Status
Fake Image and News Detection on Social Media Through Trustware Based Community PortalPISERB20240203 year20192022


Completed Project Works
Project titleWorked asFunding AgencyAmount in Rs.Duration in yearsPeriod
Year to Year
Status
Prospects of Growth of IT/ITes in an Urban periphery: A Sociological studyCo- InvestigatorUGC620002 year20152017
Some Security Solutions based on Image Steganographic TechniquesPrincipal InvestigatorUGC1250002 year20152017

Invited Lectures 
TitleOrganized byVenueYear
Dual Image AuthenticationOne Week FDP on Image Authentication, WSN & IoT organised by JIS College of Engineering, West BengalWebinar2020
Steganography: an art of hidden communicationDepartment of Mathematics and Computer Science, Mahishadal Raj College.Mahishadal Raj College, Purba Midnapore2020
Watermarking SchemesEgra SSB College, Paschim MedinipurEgra SSB College, Paschim Medinipur2020
Reversible Data Hiding SchemesDepartment of Computer Applications, Sikkim University, Gangtok, Sikkim, IndiaSikkim University, Gangtok, Sikkim, India2020
MATLAB and its ApplicationsDepartment of Mathematics, Kharagpur College, WB, IndiaKharagpur College, WB, India2020
Machine Learning and Its Trending ApplicationsDepartment of Computer Science and Application, Hijli College, Kharagpur, Paschim Medinipur WBKharagpur, Paschim Medinipur WB2020
Machine Learning and SteganographyDepartment of Computer Science and BCA Kharagpur College, WB, IndiaKharagpur College, WB, India2020
Changing Times and New ClassroomsOrganized by the WBCUPA, South 24 PGSWBCUPA, South 24 PGS2020
Emerging Need of Digital Education in the Context of Covid -19 PandemicOrganized by the Department of BCA, Garhbeta College, WBGarhbeta College, WB2020
Multimedia SecuritySikkim University, Gangtok, Sikkim, IndiaSikkim University, Gangtok, Sikkim, India2020
Steganography -An Art of Hidden CommunicationGuru Nanak Institute Of Technology (GNIT) KolkataKolkata2020
Cyber Security used in Asian BusinessBIBS, Kolkata with Vidyasagar University at Dubai, United Arab EmiratesDubai, United Arab Emirates2019
Data Hiding SchemesSilda Chandra Sekhar Colleg, Silda, Jhargram, West BengalSilda, Jhargram, West Bengal2019
Fake Image and News Detection on Social Media Through Trust-ware Based Community PortalBiswa Bangla Convention Center, KolkataBiswa Bangla Convention Center, Kolkata2019
Steganography: an art of hidden communicationDepartment of Computer Science and BCA, Belda College, Paschim MedinipurBelda College, Paschim Medinipur2019
Image Steganography- An art of hidden communicationDepartment of Computer and Information Science (DCIS), Raiganj University, West Bengal, RaiganjRaiganj University, West Bengal, Raiganj2019
Secure Reversible Data Hiding ApproachThe Department of Computer Science, Belda College, Midnapore, West Bengal, IndiaBelda College, Midnapore, West Bengal, India2019
Steganography-an art of Hidden CommunicationDepartment of BCA, Silda Chandra Sekhar College, Silda, West Bengal, India.Silda Chandra Sekhar College, Silda.2019
Special lecture on “Steganography –An art of hidden communication”Bangabasi Morning College, 19, Rajkumar Chakraborty Sarani, Kolkata- 700009 on 19th November 2016.Bangabasi Morning College2016
Steganography-an art of hidden communicationDepartment of Computer Science and Application, Hijli College, Midnapore-721306Hijli College2015
Emerging Trend on Computer ScienceDepartment of Computer Science, Belda College, Belda, Paschim Midnapore, West BengalBelda College2014
C Language and its ApplicationsDepartment of Mathematics, Kharagpur College, Inda, Kharagpur, Paschim Medinipur, West Bengal, IndiaKharagpur College2012
Call Admission Control in Mobile Cellular NetworkDepartment of Computer Science, Vivekananda Mission Mahavidyalaya , Chaitanyapur, Purba Medinipur, Pin-721645 West BengalVivekananda Mission Mahavidyalaya2009

Membership of Learned Society 
Computer Society of India (CSI), Membership No. I1510360

Association with Professional Bodies
Type of Professional ActivityPeriod
Reviewer of the International Journal of Security and Communication Networks, Hindawi Publishing Corporation.2016 to 2016
Reviewer of the International Journal of Network Security (IJNS),ISSN 1816-353X (Print), ISSN 1816-3548 (Online), Impact Factor: 1.39212015 to 2015
Technical Committee Member, International Symposium on Advanced Computing and Communication(ISACC)-2015 which was held on 14-15 September,2015 in the Department of Computer Science and Engineering,Assam University, Silchar, Assam, India.2015 to 2015
Reviewer of the International Conference on Intelligent Computing and Communication (ICIC2-2016), February 18-19, 2016, Organized by the Faculty of Engineering, Management and Technology, University of Kalyani, West Bengal, India2016 to 2016
Reviewer of the International Journal , IETE Technical Review2018 to 2019
Reviewer of Engineering Science and Technology, an International Journal, Elsevier,2018 to 2019
Reviewer of “2nd International Conference on Information Technology and Applied Mathematics (ICITAM 2019)” is going to be a premier conference which is being organized during March 07-09, 2019 at Haldia Institute of Technology, India. ICITAM 2019”2018 to 2019
Reviewer of “CICBA 2018” Kalyani Government Engineering College, Kalyani, West Bengal, India on July 27-28, 2018”2018 to 2018
Reviewer of “Optik- International Journal for Light and Electron Optics”- Elsevier, IF- 1.1912018 to 2018
Reviewer of “IEEE Access -Multidisciplinary Open Access Journal” IEEE, IF- 3.5572018 to 2019
Reviewer of “1st International Conference on Contemporary Advances in Innovative & Applicable Information Technology (ICCAIAIT-2018)” Organized by Kingston Educational Institute, Berunanpukuria, Barasat, Kolkata-7000126, March 24-25, 20182018 to 2018
11. Reviewer of “CSI2017 (International Conference on Social Transformation - Digital Way)” – 19-21 January, 2018, Kolkata.2017 to 2017
Reviewer of The Visual Computer, International Journal of Computer Graphics, Springer (IF-1.036)2018 to 2019
Reviewer of Future Generation Computer Systems, The International Journal, Elsevier, (IF-4.639)2018 to 2019
Technical Program Committee Member of the “Online Conference on Green Communication, Network and Systems (OGCNS-2018)”, July 7, 2018, India.2017 to 2017
Technical Program Committee Member of the “International Conference on Information Technology and Applied Mathematics (ICITAM 2017)” October 30-Nvember 01, 2017 at Haldia Institute of Technology, India.2017 to 2017
Reviewer of “International Conference on Computer, Electrical & Communication Engineering (ICCECE-2017)” 16-17, December-2106, Techno India University, Kolkata, West Bengal India.2016 to 2017

Conference /Seminar/Workshop Attended/Organised

Conference /Seminar/Workshop Attended

Title of the Seminar/Conference/WorkshopYearRoleHeld at and Organiser
International Conference on Politics, Trade and Business in Asia-The 21st Century2019Paper PresenterDubai, United Arab Emirates
International Conference On Computational Intelligence In Pattern Recognition (CIPR 2019)2019Paper PresenterIndian Institute Of Engineering Science And Technology, Shibpur, 19th-20th January 2019.
Young Scientists’ Conference, A part of India International Science Festival -2019.2019Paper PresenterBiswa Bangla Convention Centre, Kolkata, West Bengal, India.
International Conference on Innovations in Computer Science, (ICICS-2018)2018AuthorThe Department of Computer Science, The University of Burdwan, West Bengal, India
International Conference on Communication, Devices, and Computing (ICCDC 2017)2017AuthorHaldia, India during November 2-3, 2017.
First International Conference on “Intelligent Computing and Communication (ICIC2-2016)”, February 18-19, 20162016Paper PresenterUniversity of Kalyani, West Bengal, India
Third International Conference on Computing and Systems (ICCS - 2016), January 21-22, 20162016Paper PresenterDepartment of Computer Science, The University of Burdwan, Burdwan, West Bengal, India
International Conference on Computer and Management (ICCM - 2015), December 16-17, 20152015Paper PresenterOrganized by the Center for Global Management, California State University, USA and International Association of Academicians (IAASSE), Jaipur, Rajasthan, India
International Conference on Mathematics and Computing (ICMC – 2015)2015Paper PresenterHaldia Institute of Technology ICARE Complex, HIT Campus, Hatiberia, Haldia Purba Medinipur, West Bengal – 721657, India, January 05-10, 2015
National Seminar on Information Technology-20152015Resource PersonDepartment of Computer Science and Application, Hijli College, Midnapore-721306 on 7/10/2015
Use of ICT in Teaching –Learning process2014ParticipatedNational Institute of Technical Teacher’s Training and Research (NITTTR) Kolkata-700106 from 04th August 2014 to 08th August 2014
International Conference on Mathematical Sciences – 20142014Paper PresenterSchool of Mathematics, Madurai Kamaraj University, Madurai, Tamil Nadu, India
International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT-2014)2014Paper PresenterKrishna Institute of Engineering & Technology, Ghaziabad, India
IMRF Overseas Conference2014Paper PresenterIMRF at Thailand, Hotel DVaree, Jomtien Beach Road, Pattya City, Chonburi,Thailand-20260
Workshop on Algorithms2014ParticipatedDepartment of Information Technology, National Institute of Technology Durgapur, during 22nd -26th January, 2014.
International Conference on Mathematics and Computing(ICMC – 2013)2013ParticipatedHaldia Institute of Technology ICARE Complex, HIT Campus, Hatiberia, Haldia Purba Medinipur, West Bengal – 721657, India
Two days Zonal Seminar on “ ICT in Present Wireless Revolution: Challenges and Issues”2013Paper PresenterThe IETE, Kolkata Centre, Saltlake, Kolkata, west Bengal, India
Three days State Level Work Shop on” C Language and its Applications”2012Invited SpeakerDepartment of Mathematics, Kharagpur College, Inda, Kharagpur, Paschim Medinipur, West Bengal, India
National Conference on Recent Trends in Mathematical Sciences and Their Applications( NCRTMSA-2012)2012Paper PresenterFaculty of Engineering & Technology, Mody Institute of Technology & Science, Lakshmangarh-332311, Sikar, Rajasthan, India
National Seminar on Emerging Trends in Mathematics2012ParticipantVidyasagar University In collaboration with Calcutta Mathematical Society, Midnapore-721102, West Bengal
National Conference on Advanced Communication Systems and Design Techniques (NCACD) , November 5-6, 2011.2011ParticipantDepartment of Electronics and Communication Engineering HALDIA INSTITUTE OF TECHNOLOGY, Haldia, Purba Medinipur, West Bengal PIN: 721657, India
The International Conference on Information Security and Assurance [ISA-2010] , June 23 - 25, 2010.2010Paper PresenterSheraton Grande Ocean Resort, Miyazaki, Japan
State Level Seminar on “ Call Admission Control in Mobile Cellular Network” , 15th January, 2009.2009Invited Speaker.Deaprtment of Computer Science, Vivekananda Mission Mahavidyalaya , Chaitanyapur, Purba Medinipur, Pin-721645 West Bengal.
Workshop on “ Researching Distance and Online Learning “ October 03-05, 2007.2007ParticipantIGNOU Regional Centre, Bhubaneswar & STRIDE, IGNOU, New Delhi. At IGNOU Regional Centre, Bhubaneswar.
1st IEEE-International Conference on Signal and Image Processing (IEEE-ICSIP-06),2006Paper Presenter B V Bhoomaraddi College of Engineering and Technology, Hubli, Karnataka, India
Eastern Regional Students Convention , CSI-2002.2002ParticipantComputer Society of India (CSI), Kolkata Chapter
International Workshop on Distributed Computing2001ParticipantDepartment of Computer Science & Engineering , Calcutta University


Conference /Seminar/Workshop Organised

Title of the Conference/Seminar/WorkshopYearRole in the EventFunding Agency
3rd National Seminar on Advanced Computation, Algorithm and Security (ACAS-2K18), 29th March, 2018, Organized by the Department of Computer Science, Vidyasagar University2018Member of Organizing CommitteUGC
2nd National Seminar on Advanced Computation, Algorithm and Security (ACAS-2K17), 30th March, 2017, Organized by the Department of Computer Science, Vidyasagar University2017Member of Organizing CommitteUGC
National Seminar on Advanced Computation, Algorithm and Security (ACAS-2K16), 29th – 30th March, 2016, Organized by the Department of Computer Science, Vidyasagar University2016Joint Organizing SecretaryUGC
UGC Sponsored National Seminar on Emerging Trends in Mathematics Organised by Vidyasagar University In collaboration with Calcutta Mathematical Society, Midnapore-721102, West Bengal2012Member of Organizing CommitteeUGC
National Seminar On Recent Trends in Advanced Computing Organized by Department of Computer Science, Vidyasagar University2012Organizing SecretaryUGC
Workshop on .(DOT) Net Technology Organized by Department of Computer Science, Vidyasagar University, February 15-19, 2010.2010Joint SecretaryUGC
National Seminar on Data Mining & Decision Support Organized by Computer Centre, Vidyasagar University, March 4-5, 2010.2010Member of Organizing CommitteeUGC
National Seminar On Next Generation Computing Organized by Department of Computer Science, Vidyasagar University, March 30-31st , 2010.2010Joint SecretaryUGC
National Seminar on Image Classification & Pattern Recognition Organized by Department of Computer Science, Vidyasagar University, 26-27th March, 2009.2009Organizing SecretaryUGC

Awards
Award NameAwarded ByYear
Best Paper Award, in The International Conference at Calcutta Business School, Kolkata on March 24-25, 2017Springer2017

Disclaimer : The information on this website has been prepared with the greatest possible care and the aim is to keep all information up-to-date. The University cannot gurantee the correctness, completeness, topicality or quality of the information presented. In the event of doubt concerning the content of the website, please contact the relevant faculty.