VIDYASAGAR UNIVERSITY
Faculty Information System
|
Self Declared Document
|
|
Name |
|
Dr. Biswapati Jana
|
Designation |
Associate Professor , Head
|
Department Name |
COMPUTER SCIENCE
|
Office Phone No |
+91 3222 298-274 / Centrex Extn. 274
|
Email ID |
biswapati.jana@mail.vidyasagar.ac.in
|
Fax |
03222-257297
|
Mobile No |
9126661253
|
Personal Website |
|
Address |
Department of Computer Science
Vidyasagar University
|
|
Degree Name | Institute | Year of passing/awarded |
Ph.D. in Computer Science | Vidyasagar University | 2017 |
M.Tech. in Computer Science & Engineering | Calcutta University | 2002 |
B.Tech. in Computer Science & Engineering | Calcutta University | 1999 |
B.Sc. in Physics [Hons] | Calcutta University | 1996 |
|
|
|
Associate Professor, Department of Computer Science, Vidyasagar University, P.O:-Vidyasagar University, Dist:- Paschim Medinipur, Pin:-721102. |
Assistant Professor, Department of Computer Science, Vidyasagar University, P.O:-Vidyasagar University, Dist:- Paschim Medinipur, Pin:-721102. |
Lecturer, Department of Computer Science & Engineering , Haldia Institute of Technology (HIT), P.O. – HIT Campus, Dist:- Purba Medinipur. Pin:-721657. |
|
|
|
Data Hiding |
Steganography |
Watermarking |
Image Processing |
Cryptography |
|
Computer Vision |
Machine Learning |
Natural Language Processing |
Mobile Ad-Hoc Network |
|
|
|
Compiler Design |
Image Processing |
Cryptography and Steganography |
Multimedia Security |
Computer Fundamental (CBCS) |
Research Methodology |
|
|
|
International Publication |
Title | Published in | Year | Published by |
A secure reversible color image watermarking scheme based on LBP, lagrange interpolation polynomial and weighted matrix | Multimedia Tools and Application | 2021 | Springer |
Improving the Reversible LSB MatchingScheme Based on the Likelihood Re-encoding Strategy | Entropy | 2021 | Entropy |
Application of Fuzzy Logic based GA and PSO
to solve 4D Multi-item transportation problem for substitute and complementary
items | Evolutionary Intelligence | 2021 | Springer |
An Image Authentication and Tampered De-
tection Scheme Exploiting Local Binary Pattern along with Hamming Error Correcting
Code | Wireless Personal Communications | 2021 | Springer |
A new DCT based robust image watermarking scheme
using cellular automata | Information Security Journal: A Global Perspective | 2021 | Taylor & Francis |
Fuzzy logic with superpixel based
block similarity measures for secured data hiding scheme | COMSYS-2021 | 2021 | Springer |
A Data Hiding Technique Based on QR Code Decomposition in
Transform Domain | COMSYS-2021 | 2021 | Springer |
Dual image based data hiding scheme using Quorum
Function | EAIT-2020 | 2021 | Springer |
Application of Dynamic Weight
with Distance to Reduce Packet Loss in RED based Algorithm | EAIT-2020 | 2021 | Springer |
Comparative analysis of bio-
inspired dragonfly and honeybee algorithm-based routing protocols with the ant colony
algorithm for MANET | EAIT-2020 | 2021 | Springer |
A Nobel Congestion Control Algorithm Using Buffer
Occupancy RED | CIPR-2021 | 2021 | Springer |
A Novel Data Hiding Technique Based on
QR Code Decomposition in Transform Domain | CIPR-2021 | 2021 | Springer |
A Predictable Active Queue Management to Reduce Sensitivity of RED Parameter | International Journal of Engineering &Technology | 2021 | Science Publishing Corporation, Dubai, UAE |
Superpixel based Robust Reversible
Data Hiding Scheme Exploiting Arnold Transform with DCT and CA | Journal
of King Saud University - Computer and Information Sciences | 2020 | Elsevier |
Robust
Watermarking scheme for compressed image through DCT exploiting Superpixel and
Arnold transform | Conference Proceeding | 2020 | Springer |
Multi-Sensor Tracking Simulator Design and its
Challenges | Conference Proceeding | 2020 | Springer |
Weighted matrix based random data hiding scheme within a pair of interpolated image | Conference Proceeding | 2020 | Springer |
Multiple Radar Data Fusion to Improve the Accuracy in Position Measurement Basedon K-means Algorithm | Conference Proceeding | 2020 | Springer |
Center-Symmetric
Local Binary Pattern-Based Image Authentication Using Local and Global Features
Vector. | Advances in Intelligent Systems and Computing | 2020 | Springer |
High Payload RDH Through Directional PVO Exploiting Center-
Folding Strategy. | Conference Proceeding | 2020 | Springer |
A
Robust Audio Authentication Scheme Using (11,7) Hamming Error Correcting Code. | Conference Proceeding | 2020 | Springer |
Authentication
on Interpolated Sub-Sampled based Image Steganography Exploiting Secret Sharing. | Conference Proceeding | 2020 | Springer |
Data Hiding Based on
Decagon-Shaped Shell | Advances in Intelligent Systems and Computing | 2020 | Springer |
A Survey to Analyse
Routing Algorithms for Opportunistic Network | Procedia Computer Science | 2020 | Elsevier |
Application of fuzzy programming techniques to solve solid transportation problem with additional constraints | Operations Research And Decisions | 2020 | Operations Research And Decisions |
Improved center-folding based directional pixel value
ordering for reversible data hiding scheme | Multimedia Tools and Applications | 2020 | Springer |
Application of random triangular and Gaussian
type-2 fuzzy variable to solve fixed charge multi-item four-dimensional transportation
problem | Applied Soft Computing | 2020 | Elsevier |
Improved center folding based directional pixel value
ordering for reversible data hiding scheme | Multimedia Tools and Applications | 2020 | Springer |
A New Efficient Swarm-based
Routing Protocol for MANET Exploiting DRAGONFLY with HONEY BEE | VCIPECH-2020 | 2020 | KIET Group of Institutions Ghaziabad |
Hiding data in dual color images reversibly via weighted matrix | Journal of Information Security and Applications,50,2020 | 2020 | Elsevier |
A New Repeated Pixel Value Difference-Based Steganographic Scheme with Overlapped Pixel | Intelligent Computing: Image Processing Based Applications, | 2020 | Springer |
A Method of Building Ontology Based Information knowledgebase | International Journal of Computer Sciences and Engineering (IJCSE), 7(1), Jan 2019 | 2019 | IJCSE, (UGC Approved) |
Watermarking Scheme using LBP for Image Authentication and Tamper Detection through dual image | Security and Privacy, Wiley Online Library | 2019 | Wiley Online Library |
Pixel Value Ordering with Prediction Error Expansion Based High Fidelity Reversible Data Hiding Scheme | International Journal of Applied Engineering Research (IJAER), 14(4), (2019) pp. 998-1006 | 2019 | IJAER, (UGC Approved) |
LFSR-based Multi-ant Cellular Automation and Chaotic Map based Image Encryption | Security and Privacy, Wiley Online Library, 1(6), e52 | 2019 | Wiley Online Library. |
A robust reversible data hiding scheme for Color Image using Reed-Solomon Code | Multimedia Tools and Application (MTA), Springer, 2019 | 2019 | Springer, (IF-1.541) |
Fake Image and News Detection on Social Media ThroughTrust-ware Based Community Portal | Conference Proceeding | 2019 | YSC-2019 |
FC 4D MITPs in Crisp and Rough Environments for Substitutable and Complementary Items with Budget Constraints | MDPI-mathematics. Mathematics 7, no. 3 (2019): 281, IF-1.105 (SCI Journal) | 2019 | MDPI |
A Novel Method for High Capacity Reversible Data Hiding Scheme Using Difference Expansion | International Journal of Natural Computing Research (IJNCR), IGI Global. | 2019 | IGI Global. |
Robust Watermarking Scheme for Tamper
Detection and Authentication Exploiting Cellular Automata | IET Image Processing, IEEE, DOI: 10.1049/iet-ipr.2018.6638 | 2019 | IEEE |
Directional Pixel Value Ordering Based Secret Sharing Using Sub-Sampled Image Exploiting Lagrange Polynomial | DOI :10.1007/s42452-019-0659-1, SN Applied Sciences, Springer | 2019 | Springer |
Analysis of Factors and their Impacts in Measurement Accuracy and Prioritization of Radars | International Journal of Research and Analytical Reviews (IJRAR),, Vol-5, Issue-4, December 2018, pp- 548-554. (UGC Approved). | 2018 | IJRAR |
Analysis of Factors and their Impacts in Measurement Accuracy and Prioritization of Radars | International Journal of Research and Analytical Reviews (IJRAR), 5(4), December 2018 | 2018 | IJRAR, (UGC Approved) |
Secured Steganographic Scheme For Highly Compressed Color Image Using Weighted Matrix Through DCT | International Journal of Computers and Applications (IJCA) | 2018 | Taylor & Francis |
Weighted matrix based reversible watermarking scheme using color image | Multimedia Tools and Application (MTA), Springer | 2018 | Springer (IF-1.530) |
Directional PVO for Reversible Data Hiding Scheme withImage Interpolation | Multimedia Tools and Application (MTA), Springer | 2018 | Springer (IF-1.530) |
Improved data hiding capacity through repeated embedding using modified weighted matrix for color image | International Journal of Computers and Applications (IJCA) | 2018 | Taylor and Francis |
Copy Move Forgery Detection through Graph Neighborhood Degree | International Journal of Applied Engineering Research (IJAER), 13(18), pp. 13421-13427 | 2018 | IJAER, (UGC Approved) |
Reversible Watermarking Scheme Using PVD-DE | Proceedings of the International Conference at Calcutta Business School, Kolkata on March 24-25, 2017 | 2017 | Springer |
Reversible Data Hiding Scheme Using Sub-Sampled ImageExploiting Lagrange’s Interpolating Polynomial | Multimedia Tools and Application (MTA), Springer. | 2017 | Springer (IF-1.530) |
Extended Directional IPVO for Reversible Data Hiding Scheme | Proceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) was held in Haldia, India during November 2-3, 2017 | 2017 | Springer |
Representation and Exploring the Semantic Organization of Bangla Word in theMental Lexicon: Evidence from Cross-modal Priming Experiments and VectorSpace Model | Proceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) was held in Haldia, India during November 2-3, 2017 | 2017 | Springer |
High Capacity Reversible Data Hiding Scheme Using Dual Color Image through(7, 4) Hamming Code | Proceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) was held in Haldia, India during November 2-3, 2017 | 2017 | Springer |
Hamming code based watermarking scheme for Image Authentication andTampered detection | Proceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) will be held in Haldia, India during November 2-3, 2017 | 2017 | Springer |
Exploring the semantic organization of Bangla words in the mental
lexicon | Procedia Computer Science 115 (2017) 556–562 | 2017 | Procedia Computer Science , Elsevier |
Partial reversible data hiding scheme using (7, 4) hamming code | Multimedia Tools and Application, Springer, 1-16 | 2016 | Springer (IF-1.530) |
Dual Image Based Reversible Data Hiding Scheme Using (7,4) Hamming Code | Multimedia Tools and Application, Springer. 1-23 | 2016 | Springer (IF-1.530) |
Dual Image based Reversible Data Hiding Scheme Using Pixel Value Difference With Exploiting Modification Direction | Proceedings of the First International Conference on Intelligent Computing and Communication Volume 458 of the series Advances in Intelligent Systems and Computing, Pages 549-557 | 2016 | Springer |
Dual-Image Based Reversible Data Hiding Scheme Using Pixel Value Difference Expansion | International Journal of Network Security, 18(04),633-643, DOI: 10.6633/IJNS.201607.18(4).04 | 2016 | IJNS |
High payload reversible data hiding scheme using weighted matrix | Optik -International Journal for Light and Electron Optics, 127(6), 3347-3358, http://dx.doi.org/10.1016/j.ijleo.2015.12.055 | 2016 | Elsevier (Impact Factor: 0.677) |
Dual Image based Reversible Data Hiding Scheme using Weighted Matrix | Int. J. of Electronics and Information Engineering, Vol.5, No.1, PP.6-19, Sept. 2016, DOI: 10.6636/IJEIE.201609.5(1).02) | 2016 | IJEIE |
An Efficient Weight Matrix based Reversible DataHiding Scheme | International Conference on Computers and Management (ICCM-2015), Jaipur (Rajasthan), India | 2015 | ACM |
Hierarchical Visual Secret Sharing Scheme Using Steganography | Mathematics and Computing,Springer Proceedings in Mathematics & Statistics, Volume 139, pp 363-389, 2015 | 2015 | Springer |
An Efficient Data Hiding Scheme Using Hamming Error Correcting Code | Proceedings of the Sixth International Conference on Computer and Communication Technology (ICCCT '15), 2015, Pages 360-365. | 2015 | ACM digital library |
Reversible Data Hiding Through Hamming Code Using Dual Image | Proceedings of the International Congress on Information and Communication Technology, Volume 439 of the series Advances in Intelligent Systems and Computing, Pages 495-504 | 2015 | Springer (AISC). |
Dual Image Based Reversible Data Hiding Scheme Using Three Pixel Value Difference | Information Systems Design and Intelligent Applications Volume 434 of the series Advances in Intelligent Systems and Computing, Pages 403-412 | 2015 | AISC-Springer. |
Weighted Matrix Based Reversible Data Hiding Scheme Using Image Interpolation | Computational Intelligence in Data Mining—Volume 2
Volume 411 of the series Advances in Intelligent Systems and Computing pp 239-248 | 2015 | Springer |
Cheating Prevention In Visual Cryptographic Schemes Using Message Embedding: A Hardware Based Practical Approach | Proceedings of International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT-2014), pp 319 – 324, DOI: 10.1109/ICICICT.2014.6781300, 2014 | 2014 | IEEE |
Survey on Cheating and Prevention Techniques in Visual Cryptography | Mathematical Sciences International Research Journal, 3(Special Issue), 961-976 | 2014 | IMRF |
Cheating Prevention in Hierarchical Visual Secret Sharing Scheme using weight matrix-based Steganography | Mathematical Sciences International Research Journal, 3(2), 796-799 | 2014 | IMRF |
Survey on Size Invariant Visual Cryptography | International Journal of Computer Science and Information Technologies, 5(3), 3985-3990 | 2014 | IJCST |
Cheating Prevention in Hierarchical Visual Secret Sharing Scheme Using Weight Matrix-Based Steganography | Mathematical Sciences International Research Journal, Volume 3, No 2, ISSN-22788697, pp 796-799, 2014 | 2014 | International Multidisciplinary Research Foundation |
Survey on Size Invariant Visual Cryptography | International Journal of Computer Science and Information Technologies, Volume 5, No. 3, pp 3985-3990, ISSN-0975-9646, 2014 | 2014 | Tech Science Publications |
Key Distribution In Wireless Sensor Networks Using Quantum Cryptography | International Journal of Mobile
& Adhoc Network, Volume 3 Issue- 4, pp 250-256, ISSN 2231–6825, 2013 | 2013 | International forum of researchers Students and Academician (IFRSA) |
Image Steganography based on Cellular Automata | International Journal of Pure and Applied Mathematics, Volume 83, No 5, pp 701-715, ISSN-1311-8080, 2013 | 2013 | Academic Publications |
Key Distribution in Wireless Sensor Networks using Quantum Cryptography | International Journal of Mobile & Adhoc Network, 3(4), 250-256. | 2013 | IJMAN |
New Image Noise Reduction Schemes Based on Cellular Automata | International Journal of Soft Computing and Engineering, Volume-2, Issue-2, pp 98-103, ISSN 2231-2707, 2012 | 2012 | Blue Eyes Intelligence Engineering & Sciences Publication |
A Cryptosystem For Encryption and Decryption of Long Confidential Message | Information Security and Assurance Communications in Computer and Information Science, Springer, Volume 76, pp 86-96, 2010 | 2010 | Springer |
Object Extraction Using Novel Region Merging and Multidimensional Features | Fourth Pacific-Rim Symposium on Image and Video Technology (PSIVT), pp 356 – 361, Print ISBN: 978-1-4244-8890-2 , DOI: 10.1109/PSIVT.2010.66, 2010 | 2010 | IEEE |
Recognition Of Partially Occluded, Expression Variant Faces Using Elastic Bunch Graph Matching | Proceedings of 1st IEEE-International Conference on Signal and Image Processing (IEEE-ICSIP-06), 2006 | 2006 | IEEE |
|
National Publication |
Title | Published in | Year | Published by |
Parity based Image Steganography using Cellular Automata | Proceedings of National Seminar on Emerging Trends in Mathematics | 2012 | Vidyasagar University In collaboration with Calcutta Mathematical Society, Midnapore-721102, West Bengal |
Automatic Pitman Shorthand Script Recognition Using Fuzzy Rule Based Technique | ” National Seminar On Recent Trends in Advanced Computing Organized by the Department of Computer Science Vidyasagar University. | 2012 | Department of Computer Science Vidyasagar University. |
Cellular Automata for Image noise reduction using Neighbor pixel | Advanced Communication Systems and Design Techniques (NCACD-2011), pp. 130-137. | 2011 | Conference Proceeding, Department of ECE, Haldia Institute of Technology, Haldia |
Text Classifiers and Performance Issues | Conference Proceeding of National Seminar on Data Mining & Decision Support, pp.51-59,Computer Centre, Vidyasagar University, Midnapore-721102. | 2010 | Computer Centre, Vidyasagar University. |
An Extension of Nave Bayes Classifier using Frequent Closed Item sets | Two days National Conference on “Ubiquitous Computing 2009”, Organized by R&D Cell of Guru Nanak Institute of Technology, 157/F, Nilgunj Road, Panihati, Sodpur, Kolkata-700114 | 2009 | GNIT, Sodpur, Kolkata |
Expression and Pose Variant Face Image Identification Under Different Illumination Condition Using EBGM | Two days National Conference on “Ubiquitous Computing 2009”, Organized by R&D Cell of Guru Nanak Institute of Technology, 157/F, Nilgunj Road, Panihati, Sodpur, Kolkata-700114 | 2009 | GNIT, Sodpur, Kolkata |
A Scheme To Improve The Security Using Diffie-Helmann’s Key Distribution Scheme Coupling With RSA Algorithm | National Conference on Broad Band Integrated Digital Systems And Networks -2005, NIEC, Shatri Park, New Delhi-110053 | 2005 | NIEC, New Delhi. |
|
Other Publication |
Title | Published in | Year | Published by |
A Hybrid System for Mood Recognition of Face Images using DS Theory and Fuzzy Logic | Proceedings of the Workshop on Multimedia System & Communication, ISM, Dhanbad. | 2004 | ISM, Dhanbad |
|
Books Published |
|
|
|
|
Awarded Ph. D. Thesis
Scholar Name | Thesis Title | Co Supervisor | Status | Complete in Year |
Partha Chowdhuri | Design and Analysis of Image Steganographic Protocol | Dr. Debasis Giri, MAKAUT | Awarded | 2021 |
Sourav Kaity | Prioritization of Multi-Sensor Tracked Data | Dr. P K Das Gupta, DRDO | Awarded | 2021 |
Soamdeep Singha | Design of An Effective Congestion Control Routing Protocol forMobile-Ad-Hoc Network | Dr. Niranjan Kumar Mandal | Awarded | 2021 |
Pabitra Pal | Design of Reversible Watermarking Techniques in Spatial Domain | Dr. Jaydeb Bhaumik, JU | Awarded | 2020 |
|
|
|
Title | Organized by | Venue | Year |
Dual Image Authentication | One Week FDP on Image Authentication, WSN & IoT organised by JIS College of Engineering, West Bengal | Webinar | 2020 |
Steganography: an art of hidden communication | Department of Mathematics and Computer Science, Mahishadal Raj College. | Mahishadal Raj College, Purba Midnapore | 2020 |
Watermarking Schemes | Egra SSB College, Paschim Medinipur | Egra SSB College, Paschim Medinipur | 2020 |
Reversible Data Hiding Schemes | Department of Computer Applications, Sikkim University, Gangtok, Sikkim, India | Sikkim University, Gangtok, Sikkim, India | 2020 |
MATLAB and its Applications | Department of Mathematics, Kharagpur College, WB, India | Kharagpur College, WB, India | 2020 |
Machine Learning and Its Trending Applications | Department of Computer Science and Application, Hijli College, Kharagpur, Paschim Medinipur WB | Kharagpur, Paschim Medinipur WB | 2020 |
Machine Learning and Steganography | Department of Computer Science and BCA Kharagpur College, WB, India | Kharagpur College, WB, India | 2020 |
Changing Times and New Classrooms | Organized by the WBCUPA, South 24 PGS | WBCUPA, South 24 PGS | 2020 |
Emerging Need of Digital Education in the Context of Covid -19 Pandemic | Organized by the Department of BCA, Garhbeta College, WB | Garhbeta College, WB | 2020 |
Multimedia Security | Sikkim University, Gangtok, Sikkim, India | Sikkim University, Gangtok, Sikkim, India | 2020 |
Steganography -An Art of Hidden Communication | Guru Nanak Institute Of Technology
(GNIT) Kolkata | Kolkata | 2020 |
Cyber Security used in Asian Business | BIBS, Kolkata with Vidyasagar University at Dubai, United Arab Emirates | Dubai, United Arab Emirates | 2019 |
Data Hiding Schemes | Silda Chandra Sekhar Colleg, Silda, Jhargram, West Bengal | Silda, Jhargram, West Bengal | 2019 |
Fake Image and News Detection on Social Media Through Trust-ware Based Community Portal | Biswa Bangla Convention Center, Kolkata | Biswa Bangla Convention Center, Kolkata | 2019 |
Steganography: an art of hidden communication | Department of Computer Science and BCA, Belda College, Paschim Medinipur | Belda College, Paschim Medinipur | 2019 |
Image Steganography- An art of hidden communication | Department of Computer and Information Science (DCIS), Raiganj University, West Bengal, Raiganj | Raiganj University, West Bengal, Raiganj | 2019 |
Secure Reversible Data Hiding Approach | The Department of Computer Science, Belda College, Midnapore, West Bengal, India | Belda College, Midnapore, West Bengal, India | 2019 |
Steganography-an art of Hidden Communication | Department of BCA, Silda Chandra Sekhar College, Silda,
West Bengal, India. | Silda Chandra Sekhar College, Silda. | 2019 |
Special lecture on “Steganography –An art of hidden communication” | Bangabasi Morning College, 19, Rajkumar Chakraborty Sarani, Kolkata- 700009 on 19th November 2016. | Bangabasi Morning College | 2016 |
Steganography-an art of hidden communication | Department of Computer Science and Application, Hijli College, Midnapore-721306 | Hijli College | 2015 |
Emerging Trend on Computer Science | Department of Computer Science, Belda College, Belda, Paschim Midnapore, West Bengal | Belda College | 2014 |
C Language and its Applications | Department of Mathematics, Kharagpur College, Inda, Kharagpur, Paschim Medinipur, West Bengal, India | Kharagpur College | 2012 |
Call Admission Control in Mobile Cellular Network | Department of Computer Science, Vivekananda Mission Mahavidyalaya , Chaitanyapur, Purba Medinipur, Pin-721645 West Bengal | Vivekananda Mission Mahavidyalaya | 2009 |
|
|
|
Computer Society of India (CSI), Membership No. I1510360 |
|
|
|
Type of Professional Activity | Period |
Reviewer of the International Journal of Security and Communication Networks, Hindawi Publishing Corporation. | 2016 to 2016 |
Reviewer of the International Journal of Network Security (IJNS),ISSN 1816-353X (Print), ISSN 1816-3548 (Online), Impact Factor: 1.3921 | 2015 to 2015 |
Technical Committee Member, International Symposium on Advanced Computing and Communication(ISACC)-2015 which was held on 14-15 September,2015 in the Department of Computer Science and Engineering,Assam University, Silchar, Assam, India. | 2015 to 2015 |
Reviewer of the International Conference on Intelligent Computing and Communication (ICIC2-2016), February 18-19, 2016, Organized by the Faculty of Engineering, Management and Technology, University of Kalyani, West Bengal, India | 2016 to 2016 |
Reviewer of the International Journal , IETE Technical Review | 2018 to 2019 |
Reviewer of Engineering Science and Technology, an International Journal, Elsevier, | 2018 to 2019 |
Reviewer of “2nd International Conference on Information Technology and Applied Mathematics (ICITAM 2019)” is going to be a premier conference which is being organized during March 07-09, 2019 at Haldia Institute of Technology, India. ICITAM 2019” | 2018 to 2019 |
Reviewer of “CICBA 2018” Kalyani Government Engineering College, Kalyani, West Bengal, India on July 27-28, 2018” | 2018 to 2018 |
Reviewer of “Optik- International Journal for Light and Electron Optics”- Elsevier, IF- 1.191 | 2018 to 2018 |
Reviewer of “IEEE Access -Multidisciplinary Open Access Journal” IEEE, IF- 3.557 | 2018 to 2019 |
Reviewer of “1st International Conference on Contemporary Advances in Innovative & Applicable Information Technology (ICCAIAIT-2018)” Organized by Kingston Educational Institute, Berunanpukuria, Barasat, Kolkata-7000126, March 24-25, 2018 | 2018 to 2018 |
11. Reviewer of “CSI2017 (International Conference on Social Transformation - Digital Way)” – 19-21 January, 2018, Kolkata. | 2017 to 2017 |
Reviewer of The Visual Computer, International Journal of Computer Graphics, Springer (IF-1.036) | 2018 to 2019 |
Reviewer of Future Generation Computer Systems, The International Journal, Elsevier, (IF-4.639) | 2018 to 2019 |
Technical Program Committee Member of the “Online Conference on Green Communication, Network and Systems (OGCNS-2018)”, July 7, 2018, India. | 2017 to 2017 |
Technical Program Committee Member of the “International Conference on Information Technology and Applied Mathematics (ICITAM 2017)” October 30-Nvember 01, 2017 at Haldia Institute of Technology, India. | 2017 to 2017 |
Reviewer of “International Conference on Computer, Electrical & Communication Engineering (ICCECE-2017)” 16-17, December-2106, Techno India University, Kolkata, West Bengal India. | 2016 to 2017 |
|
|
|
Title of the Seminar/Conference/Workshop | Year | Role | Held at and Organiser |
International Conference on Politics, Trade and Business in Asia-The 21st Century | 2019 | Paper Presenter | Dubai, United Arab Emirates |
International Conference On Computational Intelligence In Pattern Recognition (CIPR 2019) | 2019 | Paper Presenter | Indian Institute Of Engineering Science And Technology, Shibpur, 19th-20th January 2019. |
Young Scientists’ Conference,
A part of India International Science Festival -2019. | 2019 | Paper Presenter | Biswa Bangla Convention
Centre, Kolkata, West Bengal, India. |
International Conference on Innovations in Computer Science, (ICICS-2018) | 2018 | Author | The Department of Computer Science, The University of Burdwan, West Bengal, India |
International Conference on Communication, Devices, and Computing (ICCDC 2017) | 2017 | Author | Haldia, India during November 2-3, 2017. |
First International Conference on “Intelligent Computing and Communication (ICIC2-2016)”, February 18-19, 2016 | 2016 | Paper Presenter | University of Kalyani, West Bengal, India |
Third International Conference on Computing and Systems (ICCS - 2016), January 21-22, 2016 | 2016 | Paper Presenter | Department of Computer Science, The University of Burdwan, Burdwan, West Bengal, India |
International Conference on Computer and Management (ICCM - 2015), December 16-17, 2015 | 2015 | Paper Presenter | Organized by the Center for Global Management, California State University, USA and International Association of Academicians (IAASSE), Jaipur, Rajasthan, India |
International Conference on Mathematics and Computing (ICMC – 2015) | 2015 | Paper Presenter | Haldia Institute of Technology ICARE Complex, HIT Campus, Hatiberia, Haldia Purba Medinipur, West Bengal – 721657, India, January 05-10, 2015 |
National Seminar on Information Technology-2015 | 2015 | Resource Person | Department of Computer Science and Application, Hijli College, Midnapore-721306 on 7/10/2015 |
Use of ICT in Teaching –Learning process | 2014 | Participated | National Institute of Technical Teacher’s Training and Research (NITTTR) Kolkata-700106 from 04th August 2014 to 08th August 2014 |
International Conference on Mathematical Sciences – 2014 | 2014 | Paper Presenter | School of Mathematics, Madurai Kamaraj University, Madurai, Tamil Nadu, India |
International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT-2014) | 2014 | Paper Presenter | Krishna Institute of Engineering & Technology, Ghaziabad, India |
IMRF Overseas Conference | 2014 | Paper Presenter | IMRF at Thailand, Hotel DVaree, Jomtien Beach Road, Pattya City, Chonburi,Thailand-20260 |
Workshop on Algorithms | 2014 | Participated | Department of Information Technology, National Institute of Technology Durgapur, during 22nd -26th January, 2014. |
International Conference on Mathematics and Computing(ICMC – 2013) | 2013 | Participated | Haldia Institute of Technology ICARE Complex, HIT Campus, Hatiberia, Haldia Purba Medinipur, West Bengal – 721657, India |
Two days Zonal Seminar on “ ICT in Present Wireless Revolution: Challenges and Issues” | 2013 | Paper Presenter | The IETE, Kolkata Centre, Saltlake, Kolkata, west Bengal, India |
Three days State Level Work Shop on” C Language and its Applications” | 2012 | Invited Speaker | Department of Mathematics, Kharagpur College, Inda, Kharagpur, Paschim Medinipur, West Bengal, India |
National Conference on Recent Trends in Mathematical Sciences and Their Applications( NCRTMSA-2012) | 2012 | Paper Presenter | Faculty of Engineering & Technology, Mody Institute of Technology & Science, Lakshmangarh-332311, Sikar, Rajasthan, India |
National Seminar on Emerging Trends in Mathematics | 2012 | Participant | Vidyasagar University In collaboration with Calcutta Mathematical Society, Midnapore-721102, West Bengal |
National Conference on Advanced Communication Systems and Design Techniques (NCACD) , November 5-6, 2011. | 2011 | Participant | Department of Electronics and Communication Engineering HALDIA INSTITUTE OF TECHNOLOGY, Haldia, Purba Medinipur, West Bengal PIN: 721657, India |
The International Conference on Information Security and Assurance [ISA-2010] , June 23 - 25, 2010. | 2010 | Paper Presenter | Sheraton Grande Ocean Resort, Miyazaki, Japan |
State Level Seminar on “ Call Admission Control in Mobile Cellular Network” , 15th January, 2009. | 2009 | Invited Speaker. | Deaprtment of Computer Science, Vivekananda Mission Mahavidyalaya , Chaitanyapur, Purba Medinipur, Pin-721645 West Bengal. |
Workshop on “ Researching Distance and Online Learning “ October 03-05, 2007. | 2007 | Participant | IGNOU Regional Centre, Bhubaneswar & STRIDE, IGNOU, New Delhi. At IGNOU Regional Centre, Bhubaneswar. |
1st IEEE-International Conference on Signal and Image Processing (IEEE-ICSIP-06), | 2006 | Paper Presenter | B V Bhoomaraddi College of Engineering and Technology, Hubli, Karnataka, India |
Eastern Regional Students Convention , CSI-2002. | 2002 | Participant | Computer Society of India (CSI), Kolkata Chapter |
International Workshop on Distributed Computing | 2001 | Participant | Department of Computer Science & Engineering , Calcutta University |
Title of the Conference/Seminar/Workshop | Year | Role in the Event | Funding Agency |
3rd National Seminar on Advanced Computation, Algorithm and Security (ACAS-2K18), 29th March, 2018, Organized by the Department of Computer Science, Vidyasagar University | 2018 | Member of Organizing Committe | UGC |
2nd National Seminar on Advanced Computation, Algorithm and Security (ACAS-2K17), 30th March, 2017, Organized by the Department of Computer Science, Vidyasagar University | 2017 | Member of Organizing Committe | UGC |
National Seminar on Advanced Computation, Algorithm and Security (ACAS-2K16), 29th – 30th March, 2016, Organized by the Department of Computer Science, Vidyasagar University | 2016 | Joint Organizing Secretary | UGC |
UGC Sponsored National Seminar on Emerging Trends in Mathematics Organised by Vidyasagar University In collaboration with Calcutta Mathematical Society, Midnapore-721102, West Bengal | 2012 | Member of Organizing Committee | UGC |
National Seminar On Recent Trends in Advanced Computing Organized by Department of Computer Science, Vidyasagar University | 2012 | Organizing Secretary | UGC |
Workshop on .(DOT) Net Technology Organized by Department of Computer Science, Vidyasagar University, February 15-19, 2010. | 2010 | Joint Secretary | UGC |
National Seminar on Data Mining & Decision Support Organized by Computer Centre, Vidyasagar University, March 4-5, 2010. | 2010 | Member of Organizing Committee | UGC |
National Seminar On Next Generation Computing Organized by Department of Computer Science, Vidyasagar University, March 30-31st , 2010. | 2010 | Joint Secretary | UGC |
National Seminar on Image Classification & Pattern Recognition Organized by Department of Computer Science, Vidyasagar University, 26-27th March, 2009. | 2009 | Organizing Secretary | UGC |
|
|
|
Award Name | Awarded By | Year |
Best Paper Award, in The International Conference at Calcutta Business School, Kolkata on March 24-25, 2017 | Springer | 2017 |
|
|
|