format for details about the institution seeking support ... · pdf fileformat for details...

41
Format for Details about the Institution seeking support for PhD candidates Institution Details: Name of the University/ Institution : University of Calcutta Postal Address with phone/ Fax/email : Senate House, 87 /1 College Street, Kolkata-700073, West Bengal, India. Phone : +91-33-22410071 Status: Central Univ. /State University/ Deemed Univ./Private Univ. / Institute, etc . Contact details of Nodal Person with phone/Fax/email appointed by Institution for the PhD Scheme of DeitY : Prof. Nabendu Chaki Department of Computer Science & Engineering Room No. 216, Block JD, Salt Lake, PIN 700098 Phone: +91-9433068073 Availability of Hostel accommodation : Yes Whether the institute is recognized by UGC for award of PhD degree: Yes Department Details: Name of Department : Computer Science and Engineering Current Areas of Research of the department : Software Engineering, Image Processing, Bio-Medical Engineering, Cloud Computing, Algorithms, VLSI, Smart Power Grid, Networking, Information and Network Security, Pervasive Computing, Big Data Number of faculties/ guides in the department with name and other details : Please see Annexure I Current number of PhDs in the department (average of last three year intake) : 28 A total of 84 PhD students have enrolled in last 3 years (34 in 2012, 27 in 2013 and 23 in 2014) Distribution of current PhD candidates among the Faculty/ Guides: Please see Annexure II for details Availability of Infrastructural Facilities in the department /Institute/ Univ.: Please see Annexure III for details Capacity to take additional PhD candidates : 16 (15.8) Please see Annexure II for details

Upload: phamthu

Post on 06-Mar-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

Format for Details about the Institution seeking support for PhD candidates Institution Details:

Name of the University/ Institution : University of Calcutta

Postal Address with phone/ Fax/email : Senate House, 87 /1 College Street, Kolkata-700073, West Bengal, India. Phone : +91-33-22410071 Status: Central Univ. /State University/ Deemed Univ./Private Univ. / Institute, etc. Contact details of Nodal Person with phone/Fax/email appointed by Institution for the PhD Scheme of DeitY : Prof. Nabendu Chaki Department of Computer Science & Engineering Room No. 216, Block JD, Salt Lake, PIN 700098 Phone: +91-9433068073

Availability of Hostel accommodation : Yes

Whether the institute is recognized by UGC for award of PhD degree: Yes

Department Details:

Name of Department : Computer Science and Engineering

Current Areas of Research of the department :

Software Engineering, Image Processing, Bio-Medical Engineering, Cloud Computing, Algorithms, VLSI, Smart Power Grid, Networking, Information and Network Security, Pervasive Computing, Big Data

Number of faculties/ guides in the department with name and other details :

Please see Annexure I

Current number of PhDs in the department (average of last three year intake) : 28

A total of 84 PhD students have enrolled in last 3 years (34 in 2012, 27 in 2013 and 23 in 2014)

Distribution of current PhD candidates among the Faculty/ Guides:

Please see Annexure II for details

Availability of Infrastructural Facilities in the department /Institute/ Univ.:

Please see Annexure III for details

Capacity to take additional PhD candidates : 16 (15.8)

Please see Annexure II for details

 

Serial Number

Name of the Faculty Member Designation Qualification No. of publications as per Scopus

Listing

Imternational Patents

1 Sankhayan Choudhury Professor and Head Ph.D., M. Tech. 38 1 (patent pending)

2 Nabendu Chaki Professor Ph.D., M. Tech. 113 4 (plus 2 pending)

3 Rajat Kumar Pal Professor Ph.D., M. Tech. 72 2 (patent pending)

4 Samir Kumar Bandyopadhyay Professor (Re-employed) Ph.D., M. Tech. 61 0

5 Samar Sen Sarma Professor (Re-employed) Ph.D., M. Tech. 19 0

6 Devadutta Sinha Professor (Re-employed) Ph.D., M. Tech. 2 0

7 Shefali Bose Associate Professor Ph.D., M. Tech. 4 0

8 Rajib Kumar Das Associate Professor Ph.D., M. Tech. 14 0

9 Kashinath Dey Associate Professor M. Tech. 10 0

10 Banani Saha Associate Professor Ph.D., M. Tech. 8 0

11 Sanjit Kumar Setua Associate Professor M. Tech. 13 0

12 Pritha Banerjee Assistant Professor Ph.D., M. Tech. 12 0

13 Sunirmal Khatua Assistant Professor M. Tech. 11 0

Serial Number

Name of the Faculty Member

14 Amlan Chakraborty

15 B. B. Chaudhuri

16 C A Murty

17 Debaprasad Mondal

18 Debasis Giri

19 Gautam Roy

20 Kumar Shankar Roy

21 Kuntal Ghosh

22 Malay Kumar Kundu

23 Monalisa Banerjee

24 Nabanita Das

25 Pabitra Pal Choudhury

26 Paramartha Dutta

27 Pradipta Maji

28 Rajat Kumar De

29 Rajat Kumar Dey

30 Ranjan Das Gupta

31 Ranjan Ghosh

32 Rituparna Chaki

33 Sabnam Sengupta

34 Samir Roy

35 Samiran Chattopadhyay

36 Sanghamitra Bandyopadhyay

37 Sankar Kumar Pal

38 Sarbani Palit

39 Sasthicharan Ghosh

40 Sriyankar Acharya, WBUT

A K Choudhury School of IT, University of Calcutta

Indian Statistical Institute (ISI), Kolkata

Indian Statistical Institute (ISI), Kolkata

Indian Statistical Institute (ISI), Kolkata

B P Poddar Institute of Technology, Kolkata

Indian Statistical Institute (ISI), Kolkata

Indian Statistical Institute (ISI), Kolkata

NITTTR, Kolkata

Radio Physics & Electronics, University of Calcutta

A K Choudhury School of IT, University of Calcutta

NITTTR, Kolkata

Jadavpur University

Indian Statistical Institute (ISI), Kolkata

Indian Statistical Institute (ISI), Kolkata

Indian Statistical Institute (ISI), Kolkata

Indian Statistical Institute (ISI), Kolkata

West Bengal University of Technology, Salt Lake

Supervisors from other Departments, Sister Institutes and other External Supervisors

Annexure I

List of Faculty Members and other Supervisors

Departmental Faculty Members

Techno India, Salt Lake

Indian Statistical Institute (ISI), Kolkata

Indian Statistical Institute (ISI), Kolkata

Bishwabharati University, Shantiniketan

Indian Statistical Institute (ISI), Kolkata

Indian Statistical Institute (ISI), Kolkata

NIRJAFT, Kolkata

Indian Statistical Institute (ISI), Kolkata

Indian Statistical Institute (ISI), Kolkata

Indian Statistical Institute (ISI), Kolkata

Name of University / Institute

Annexure ISerial

NumberName of the Faculty Member

41 Subhamoy Mitra

42 Subhra Sankar Ray

43 Sushmita Mitra

44 Susmita Sur Koley

45 Umapada Pal

46 Utpal Garai

47 Utpal Roy

Serial Number

Name of the Faculty Member

48 Aditya Ghosh

49 Agostino Cortesi

50 Khalid Saeed

Indian Statistical Institute (ISI), Kolkata

Indian Statistical Institute (ISI), Kolkata

Name of University / Institute

Supervisors from International Collaboration Programs

Poland

Italy

Australia

CountryName of University / Institute

Wollongong University, New South Wales

Ca Foscari University, Venice

AGH University of Science & Technology, Cracow

Indian Statistical Institute (ISI), Kolkata

Indian Statistical Institute (ISI), Kolkata

Indian Statistical Institute (ISI), Kolkata

Bishwabharati University, Shantiniketan

Indian Statistical Institute (ISI), Kolkata

2012 2013 2014

1 Sankhayan Choudhury University of Calcutta, Kolkata, India 2 2 0 5 3

2 Nabendu Chaki University of Calcutta, Kolkata, India 2 1 0 4 4

3 Rajat Kumar Pal University of Calcutta, Kolkata, India 3 2 1 7 1

4 Samir Kumar Bandyopadhyay University of Calcutta, Kolkata, India 2 1 2 7 1

5 Samar Sen Sarma University of Calcutta, Kolkata, India 3 2 0 7 1

6 Devadutta Sinha University of Calcutta, Kolkata, India 3 2 1 6 2

7 Shefali Bose University of Calcutta, Kolkata, India 0 1 0 1 7

8 Rajib Kumar Das University of Calcutta, Kolkata, India 3 2 0 5 3

9 Kashinath Dey University of Calcutta, Kolkata, India 1 3 0 4 4

10 Banani Saha University of Calcutta, Kolkata, India 1 0 1 3 5

11 Sanjit Kumar Setua University of Calcutta, Kolkata, India 5 0 1 6 2

12 Pritha Banerjee University of Calcutta, Kolkata, India 0 1 1 2 6

13 Sunirmal Khatua University of Calcutta, Kolkata, India 0 0 1 1 7

25 17 8 58 46

Annexure IIDistribution of current PhD candidates among Supervisors

Departmental Faculty Members

Scholars enrolled in last 3 year*

Serial Number

**Total number of enrolled PhD scholars includes the 8 scholars who has enrolled prior to 2012 and currently with theProgram

Total number of scholars**

Provision of new Scholars as per

University PhD rule

Name of University / InstituteName of the Faculty Member

* Full Time: 8 and Part Time: 42

Annexure II

Serial Number

Name of the Faculty Member Name of University / Institute Provision of new Scholars as per

University PhD rule14 Amlan Chakraborty A K Choudhury School of IT, University of Calcutta 7

15 B. B. Chaudhuri Indian Statistical Institute (ISI), Kolkata 7

16 C A Murty Indian Statistical Institute (ISI), Kolkata 7

17 Debaprasad Mondal Indian Statistical Institute (ISI), Kolkata 6

18 Debasis Giri Haldia Institute of Technology, Haldia 7

19 Gautam Roy NIRJAFT, Kolkata 7

20 Kumar Shankar Roy Indian Statistical Institute (ISI), Kolkata 7

21 Kuntal Ghosh Indian Statistical Institute (ISI), Kolkata 7

22 Malay Kumar Kundu Indian Statistical Institute (ISI), Kolkata 4

23 Monalisa Banerjee Techno India, Salt Lake 7

24 Nabanita Das Indian Statistical Institute (ISI), Kolkata 7

25 Pabitra Pal Choudhury Indian Statistical Institute (ISI), Kolkata 6

26 Paramartha Dutta Bishwabharati University 6

27 Pradipta Maji Indian Statistical Institute (ISI), Kolkata 7

28 Rajat Kumar De Indian Statistical Institute (ISI), Kolkata 7

29 Rajat Kumar Dey Indian Statistical Institute (ISI), Kolkata 7

30 Ranjan Das Gupta NITTTR, Kolkata 7

31 Ranjan Ghosh Radio Physics & Electronics, University of Calcutta 7

32 Rituparna Chaki A K Choudhury School of IT, University of Calcutta 3

33 Sabnam Sengupta B P Poddar Institute of Technology, Kolkata 7

34 Samir Roy NITTTR, Kolkata 7

35 Samiran Chattopadhyay Jadavpur University 7

36 Sanghamitra Bandyopadhyay Indian Statistical Institute (ISI), Kolkata 6

37 Sankar Kumar Pal Indian Statistical Institute (ISI), Kolkata 6

38 Sarbani Palit Indian Statistical Institute (ISI), Kolkata 7

39 Sasthicharan Ghosh Indian Statistical Institute (ISI), Kolkata 7

40 Sriyankar Acharya, WBUT West Bengal University of Technology 7

41 Subhamoy Mitra Indian Statistical Institute (ISI), Kolkata 7

42 Subhra Sankar Ray Indian Statistical Institute (ISI), Kolkata 6

43 Sushmita Mitra Indian Statistical Institute (ISI), Kolkata 7

44 Susmita Sur Koley Indian Statistical Institute (ISI), Kolkata 6

45 Umapada Pal Indian Statistical Institute (ISI), Kolkata 7

46 Utpal Garai Indian Statistical Institute (ISI), Kolkata 7

47 Utpal Roy Bishwabharati University 5

Serial Number

Name of the Faculty Member Name of University / Institute Provision of new Scholars as per

University PhD rule

48 Aditya Ghosh Wollongong University, New South Wales, Australia 7

49 Agostino Cortesi Ca Foscari University, Venice, Italy 7

50 Khalid Saeed AGH University of Science & Technology, Poland 7

Supervisors from other Departments, Sister Institutes and other External Supervisors

Supervisors from International Collaboration Programs

2

1

1

Current number of Scholars

Current number of Scholars

1

2

1

2

1

1

1

1

2

1

1

1

3

1

1

5

1

1

1

1

1

2

2

1

1

4

1

1

1

1

2

1

1

1

M S F S/F T A Capacity

13 8 1 8 17 8 15.8

Computation for Capacity

Annexure IIA

This calculation is done considering only the scholars enrolled under the

supervision of Departmental faculty members.

Annexure III

INFRASTRUCTURE IN THE DEPARTMENT / UNIVERSITY The Department of Computer Science and Engineering, was established in 1980 at Rashbihari campus at 92 APC Road, Rajabazar and probably the first department in country who had offered Bachelor course in Computer Science. Being one of the departments of the Engineering and Technology faculty since then, the department began to contribute in creation of intellectual foundations of Indian Technologies. These activities were started under the able leadership of Late Professor Arun Kumar Choudhury. Prof. Arun Kr. Choudhury is normally remembered as a father figure of switching theory and his contribution in Computer Science is like Von Neumann in our country. The computing community of the world today bears his legacy and legend. Obviously, the entire computing arena of the University of Calcutta including this Department and the School of Information Technology named after him is built on the foundation laid by Professor Arun Kumar Choudhury in the late eighties. The first batch passed out in 1983. The department has grown up steadily keeping pace with the development in the industries and need for qualified graduates, post-graduates to meet the challenging scenarios of the day. Now shifted to the newly constructed campus at Salt Lake, the Department has a new and excellent infrastructure with three full-time courses being conducted for B. Tech., M. Tech. and M. Sc. programs. Besides, it offers one of the largest PhD programs in the entire country with more than 100 enrolled PhD scholars.

FACILITIES Department have plenty of infrastructural facilities with almost 30000 square feet area in the second floor of Technology campus at Salt lake. Six Software laboratories are well equipped with machines and the software for smooth running of the course. Specialized laboratories are there that offers the scope of cutting edge technology researches including cloud computing, sensor network laboratories. Classrooms are prepared with equipment for supporting ideal deliberation environment. Hardware laboratory is one of our strength for offering the courses like Digital logic, Microprocessor etc. The satisfactory performance of the department during last thirty five years is due to the strength of our faculty members. We have 18 sanctioned faculty positions, all the faculty members with their huge experience are actively participating for disseminating knowledge among the students in a very cordial environment.

COURSES The Department of Computer Science and Engineering offers three courses: B. Tech. in Computer Science & Engineering (Intake 40), M.Sc. in Computer & Information Science (Intake: 30) and the M. Tech. in Computer Science & Engineering (Intake: 41). Beside this, the Department runs two PhD programs one in Technology and one for Science students.

RESEARCH AREAS Distinctly the faculty members are involved in identified thrust areas. These are broadly Distributed Computing, Software Engineering, VLSI design, Information Security and

Image Analysis. At present four externally funded research projects are going on with the value of 2.50 crores. Research students, post graduate students are contributing in a regular basis under the able leadership of the supervisors (faculty members) in the national and international journals and conferences. The laboratories are also equipped for providing the necessary assistance to the research students. Publications and the patents in the last few years stand out as icons of research activities of the department. [Research Papers - 2010: 59, 2011: 94, 2012: 54, 2013: 71, Number of International Patents in last 3 years: 04, (3 more patent documents are published in USPTO, patents are pending).

COLLABORATIVE INITIATIVE(S) The department has strong collaboration, especially for research work, with other National and International institutes. Some collaborative efforts are also going with Industry houses. Jadavpur University, NIT, Durgapur, IISET (Former BESU), ISI are the collaborators at National level. Some of the International collaborators are Ca Foscari University (Italy), Wollongong University (Australia), AGH University of Science & Technology (Poland). In Research program, collaborative efforts are going on with prominent industry houses like Tata Consultancy Service, Ixia etc. Nature of International Collaborations: Ca Foscari University, Venice, Italy Name of collaborators: Agostino Cortesi (Ca Foscari), Nabendu Chaki, Rituparna Chaki,

Sankhayan Choudhury Activities:

o Joint publications: 1 co-authored book (in press), 3 co-edited Springer proceedings, 4 research papers

o Joint PhD supervision: 1 scholar registered in the University of Calcutta o Joint organization of international conferences in Europe and in India: 4 o Teaching by overseas collaborator in the University of Calcutta, India o Teaching by Indian collaborator in Ca Foscari University, Venice, Italy o MoU signed between the two Universities

AGH University of Science & Technology, Cracow, Poland Name of overseas collaborator: Khalid Saeed (AGH), Nabendu Chaki, Rituparna Chaki,

Sankhayan Choudhury Activities:

o Joint publications: 2 co-authored books, 4 co-edited Springer proceedings, 6 research papers

o Joint PhD supervision: 1 scholar completed PhD from the University of Calcutta o Joint organization of international conferences in Europe and in India: 7 o Teaching by overseas collaborator in the University of Calcutta, India o Teaching by Indian collaborators in AGH University of Science & Tech., Poland o MoU signed between the two Universities

Wollongong University, Australia Name of overseas collaborator: Aditya Ghosh (WU), Nabendu Chaki, Sankhayan Choudhury Activities:

o Joint publications: 2 research papers o Joint PhD supervision: 1 scholar registered in the University of Calcutta

o Joint organization of international conferences: 2 o Teaching by overseas collaborator in the University of Calcutta, India o Visit by Indian collaborator in Wollongong University, Australia o MoU signed between the two Universities

PLACEMENT Most of the students are placed in reputed industry houses through campus interview. We have a alumni base in Tata Consultancy Service, Cognizant Training Solutions, Wipro, Texas Instruments, Infosys, Amazon, SAS, Yahoo R&D, Ixia, Mahindra British Telecom etc. In academic world our alumni are participating successfully in the academic and research institutes like Jadavpur University, Indian Institute of Technology (IITs), IISC (Bangalore), IISET, Indian Statistical Institute, NITTTR, National Institute of Technology (NITs), University of Texas at Arlington, Colorado University, University of Wisconsin, etc.

MISCELLANEOUS The faculty members of the Department are quite active in promoting academic activities like organizing conferences, publishing books, taking part in standard bodies, etc. in India and abroad. In last few years, the Department has jointly several organized conferences, symposiums and workshops in different parts of India and Europe including Italy, Poland, Czech Republic and Vietnam. Besides, the faculty members regularly serve as Program Chairs, Invited Speakers as well as Program Committee members for different conferences organized all over the world. Some of them serve in the Editorial Board of SCI indexed journals.

Annexure IV

BRIEF ON RESEARCH AREAS PROPOSED  I. Software Engineering: The focus of this area is on three diverse aspects of software engineering.

These sub-areas are Requirements Engineering, Data Analytics, and Business Process design.

Arguably, Requirements Specification and Analysis phase seems to be the most ambiguous phase of the System Development Life Cycle (SDLC). We propose to formalize the task using modeling. Formal models will also help in checking for inconsistencies and non-conformance to company policies.

Analytical processing on multi-dimensional data is often performed over data warehouse. This, in general, is presented in the form of cuboids. All possible combination of the cuboids could be generated from base cuboid using successive roll-up operations and this corresponds to a lattice structure. The emphasis of the research group is towards developing appropriate semantic data models for analysis of semi-structured data in large volume. This includes transformation and loading of data into these data models and making them ready for analysis. Besides lattice and hyper-lattice, we propose to work with graph data models and the so-called schema-less frameworks for handling Big Data.

An efficient and flexible business process helps an organization to meet the requirements of the evolving surroundings. Besides, this would facilitate a competitive advantage over other companies towards delivering services in a way that provides competitive edges over rivals. It is important that the possible process designs can be validated against the service goals and constraint satisfaction. In case more than one valid process designs are derived, the proposed mechanism should eventually be able to identify an optimal solution based on one or multiple criteria pertinent to specific clients.

 II. Medical Image processing to aid Diagnosis of Diseases: Biomedical imaging is the application of

engineering methods to detect and visualize the biological processes in our body. Medical imaging is very helpful for the physician to measure, diagnose, treat and even simulate about the medical illness, conditions and treatment. This technique helps the doctor to see inside the body without making an incision. Basically it is a standard modern medical care for cancer, stroke, heart disease, trauma, neurological disorders and many more. Nowadays, it is used by a wide range of medical specialist from oncologists to robotic surgery. The research aims to build new, safe and low cost early prediction systems based on optical image processing.

However, once the primary target is achieved, the research outcome on medical image processing can be extended for other purposes. This includes detection of patches that may lead to cancer, aid in cosmetic Surgery, etc.

III. Smart Grid Computing: A smart power grid is an intelligent network that integrates activities like

power generation, transmission, distribution and optimizes services like autonomic recovery management, smart billing, etc. Smart power grid makes use of advanced information, control, and communication technologies to save energy, lower cost and increase reliability and transparency in the entire system.

The backbone of the Smart Grid will be its network that connects different components of the Smart Grid together, and allow two-way communication between them. Networking the components together will introduce security risks into the system. The primary focus of research in this area is to secure smart grids. Besides security, several novel computing issues are associated

with smart power grid. Dynamic distribution of power based on changing demands of users is another interesting and goal-oriented research aspect.

IV. Pervasive Computing and Remote Healthcare: We aim to deliver an integrated framework for

taking healthcare services to the doorsteps of those, who cannot come to the hospital for different reasons. This is especially for elderly, women, children, and people living in distant villages. The solution is also applicable to distressed people who cannot be brought to a hospital immediately. While the proposed research aims to devise innovative core technologies using clouds, sensors and mobile/pervasive computing with efficient utilization of resources, the findings of the project will be carried to the end users through active collaborations with healthcare-related Government agencies and NGOs.

V. Biometrics and Networks Security: Biometrics is increasingly gaining importance in authenticating a user in the age of rapid spread of autonomic and ubiquitous computing. Biometric traits include fingerprint, hand shape, finger shape, palm-print, finger vein pattern, iris, retina, face, ear shape, teeth, voice, gait, keystroke, signature, body odor, brain wave, ECG, nail surface etc. User authentication based on biometric features is often considered more reliable than the traditional means of password authentication as biometric traits cannot be lost or forgotten and unlike conventional passwords or authentication keys, biometric signatures are very difficult to copy and share.

However, in the current state of maturity, one of the major challenges of biometric authentication is its rather lower level of accuracy. Besides, session of valid users can be hijacked by impostor if the authentication is only one-time at the beginning of each session. We aim to devise a practical approach towards continuous or semi-continuous authentication, where user is verified repeatedly throughout the lifetime of session.

Besides user authentication, securing data over heterogeneous networking platform is another major challenge that we plan to mitigate. These days networking for most of the applications involve heterogeneity and often it’s a mix between conventional wired network and wireless, ad-hoc networks. Keeping in pace with the varied standards and protocols that are in use today securing a hybrid network is indeed a challenge. The broad objective of the scholars working in this area is to secure the next-generation networks.

Annexure V

PUBLICATION LISTS FOR SUPERVISORS (FROM SCOPUS)

PUBLICATION LIST FOR NABENDU CHAKI (FROM SCOPUS) OTHER THAN BOOKS Edited Volumes:

1. Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki; Applied Computation and Security Systems; Springer Advances in Intelligent Systems and Computing (AISC) Series, vol. 304, 2014. ISBN: 978-81-322-1984-2

2. Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki; Applied Computation and Security Systems; Springer Advances in Intelligent Systems and Computing (AISC) Series, vol. 305, 2014. ISBN: 978-81-322-1987-3

3. Meghanathan, Natarajan; Chaki, Nabendu; Nagamalai, Dhinaharan (Eds.); Proceedings of the Fourth International Conference on Networks & Communications (NetCom); Springer Lecture Notes in Electrical Engineering (LNEE), Vol. 131, 2013. ISBN: 978-14614-6153-1.

4. Cortesi, A.; Chaki, N.; Saeed, K.; Wierzchoń, S. (Eds.); Proceedings of the 11th IFIP TC 8 International Conference, CISIM 2012, Venice, Italy, September 26-28, 2012, Springer Lecture Notes in Computer Science (LNCS), Vol. 7564, 2012. ISBN: 978-3-642-40925-7.

5. Meghanathan, Natarajan; Chaki, Nabendu; Nagamalai, Dhinaharan (Eds.); Advances in Computer Science and Information Technology; Proceedings of 2nd International Conference (CCSIT), Bangalore, India, Part I, Springer Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Vol. 84, 2012. ISBN 978-3-642-27298-1.

6. Meghanathan, Natarajan; Chaki, Nabendu; Nagamalai, Dhinaharan (Eds.); Advances in Computer Science and Information Technology; Proceedings of 2nd International Conference (CCSIT), Bangalore, India, Part II, Springer Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Vol. 85, 2012. ISBN 978-3-642-27307-0.

7. Meghanathan, Natarajan; Chaki, Nabendu; Nagamalai, Dhinaharan (Eds.); Advances in Computer Science and Information Technology; Proceedings of 2nd International Conference (CCSIT), Bangalore, India, Part III, Springer Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Vol. 86, 2012. ISBN: 978-3-642-27316-2.

8. Meghanathan, Natarajan; Nagamalai, Dhinaharan; Chaki, Nabendu (Eds.); Advances in Computing and Information Technology; Proceedings of the 2nd International Conference on Advances in Computing and Information Technology (ACITY), 2012, Chennai, India. Springer Advances in Intelligent Systems and Computing (AISC) Series, Vol. 176, 2012. ISBN: 978-3-642-31512-1.

9. Meghanathan, Natarajan; Nagamalai, Dhinaharan; Chaki, Nabendu (Eds.); Advances in Computing and Information Technology; Proceedings of the 2nd International Conference on Advances in Computing and Information Technology (ACITY), 2012, Chennai, India. Springer Advances in Intelligent Systems and Computing (AISC) Series, Vol. 177, 2012. ISBN: 978-3-642-31551-0.

10. Meghanathan, Natarajan; Nagamalai, Dhinaharan; Chaki, Nabendu (Eds.); Advances in Computing and Information Technology; Proceedings of the 2nd International Conference on Advances in Computing and Information Technology (ACITY), 2012, Chennai, India. Springer Advances in Intelligent Systems and Computing (AISC) Series, Vol. 178, 2012. ISBN: 978-3-642-31599-2.

11. Chaki, Nabendu; Cortesi, Agostino (Eds.); Computer Information Systems - Analysis and Technologies; Proceedings of the 10th International Conference, CISIM 2011, Kolkata, India, December 14-16, 2011, Springer CCIS Series, Vol. 245, 2011. ISBN 978-3-642-27244-8.

12. Wyld, D.C.; Wozniak, M.; Chaki, N.; Meghanathan, N.; Nagamalai, D.; Proceedings of the 4th International Conference on Network Security and Applications, CNSA 2011, Chennai, India, July 15-17, 2011. Springer CCIS Series, Vol. 196, 2011, ISBN: 978-3-642-22539-0.

13. Wyld, D.C.; Wozniak, M.; Chaki, N.; Meghanathan, N.; Nagamalai, D.; Proceedings of the 4th International Conference on Trends in Network and Communications, NeCOM 2011, WeST 2011, WiMON 2011, Chennai, India. Springer CCIS Series, Vol. 197, 2011, ISBN: 978-3-642-22542-0.

14. Wyld, D.C.; Wozniak, M.; Chaki, N.; Meghanathan, N.; Nagamalai, D.; Proceedings of the International Conference on Advances in Computing and Info. Tech., ACITY 2011, Chennai, India, July 15-17, 2011. Springer CCIS Series, Vol. 198, 2011, ISBN: 978-3-642-22554-3.

15. Özcan, Abdulkadir; Chaki, Nabendu; Nagamalai, Dhinaharan; Proceedings of the 2nd International Conference on Wireless & Mobile Networks, WiMo 2010, Ankara, Turkey, June 26-28, 2010, Springer CCIS Series, Vol. 84, 2010, ISBN: 978-3-642-14170-6.

16. Meghanathan, N.; Boumerdassi, S.; Chaki, N.; Nagamalai, D.; Proceedings of the 3rd International Conference on Network Security and Applications, CNSA 2010, Chennai, India, July 23-25, 2010, Springer CCIS Series, Vol. 89, 2010, ISBN: 978-3-642-14477-6.

17. Meghanathan, N.; Boumerdassi, S.; Chaki, N.; Nagamalai, D.; Proceedings of the International Conferences, NeCoM 2010, WiMoN 2010, WeST 2010,Chennai, India, July 23-25, 2010. Springer CCIS Series, Vol. 90, 2010, ISBN: 978-3-642-14492-9.

Journals:

18. Deb N, Chakraborty M, Chaki N. CORIDS: A cluster-oriented reward-based intrusion detection system for wireless mesh networks. Security and Communication Networks. 2014; 7(3):532-43.

19. Sen S, Roy S, Sarkar A, Chaki N, Debnath N. C. Dynamic discovery of query path on the lattice of cuboids using hierarchical data granularity and storage hierarchy. Journal of Computational Science. 2014; 5(4):675-83.

20. Chakraborty S, Chaki N. Generic organization of semi-structured data. Computer Systems Science and Engineering. 2014; 29(1):65-74.

21. Kanrar S, Chattopadhyay S, Chaki N. A new link failure resilient priority based fair mutual exclusion algorithm for distributed systems. Journal of Network and Systems Management 2013; 21(1):1-24.

22. Shaikh S H, Maiti A K, Chaki N. A new image binarization method using iterative partitioning. Mach Vision Appl 2013; 24(2):337-50.

23. Dey A, Chaki N, Sanyal S. Modeling smart grid using generalized stochastic petri net. Journal of Convergence Information Technology. 2011; 6(11):104-14.

24. Sarkar A, Choudhury S, Chaki N, Bhattacharya S. Quality evaluation of conceptual level object-oriented multidimensional data model. International Journal of Computers and Applications. 2010; 32(3):362-71.

25. Chaki N, Sarkar B B. Virtual data warehouse modeling using petri nets for distributed decision making. Journal of Convergence Information Technology. 2010; 5(5)

26. Roy D B, Chaki R, Chaki N. BHIDS: A new, cluster based algorithm for black hole IDS. Security and Communication Networks. 2010; 3(2-3):278-88.

27. Kanrar S, Chaki N. FAPP: A new fairness algorithm for priority process mutual exclusion in distributed systems. Journal of Networks. 2010; 5(1):11-8.

28. Choudhury S, Chaki N, Bhattacharya S. GDM: A new graph based data model using functional abstractionx. Journal of Computer Science and Technology. 2006; 21(3):430-8.

29. Chaki N, Bhattacharya S. Performance analysis of multistage interconnection networks with a new high-level net model. J Syst Archit. 2006; 52(1):56-70. 

Peer-reviewed Conference Proceedings: 30. Ghosh A, Chaki N. Design of a new OFTM algorithm towards abort-free execution; 2013.

255 p.

31. Sen S, Dutta A, Cortesi A, Chaki N. A new scale for attribute dependency in large database systems; 2012. 266 p.

32. Dasgupta M, Chaudhury S, Chaki N. A hierarchical CPN model for mobility analysis in zone based MANET; 2012. 627 p.

33. Chakraborty S, Chaki N. A survey on the semi-structured data models; 2011. 257 p. 34. Mishra R K, Saha S, Choudhury S, Chaki N. Agent based approach for radio resource

optimization for cellular networks; 2011. 95 p. 35. Shaikh S H, Maiti AK, Chaki N. On creation of reference image for quantitative evaluation of

image thresholding method; 2011. 161 p. 36. Shaikh SH, Chaki N. A low cost moving object detection method using boundary tracking;

2011. 127 p. 37. Chakraborty S, Chaki N. Trusted third party synchronized billing framework using multiple

authorizations by multiple owners (MAMO); 2011. 21 p. 38. Mishra RK, Choudhury S, Chaki N. E2IRP: A New Energy Efficient Integrated Routing

Protocol for MANET; 2010. 23 p. 39. Nath I, Chaki R, Chaki N. WACA: A new weighted adaptive clustering algorithm for

MANET; 2010. 270 p. 40. Saha A, Chatterjee A, Pal N, Ghosh A, Chaki N. A Lightweight Implementation of

Obstruction-Free Software Transactional Memory; 2015. 67 p. 41. Mandal A K, Sarkar A, Chaki N. Flexible cloud architecture for healthcare applications;

2015. 103 p. 42. Mishra R K, Chaki N, Choudhury S. Study on handover mechanism in cellular network: An

experimental approach; 2015. 203 p. 43. Pandit D, Chaki N, Chattopadhyay S. Hyper object data model: A simple data model for

handling semi-structured data; 2014. 315 p. 44. Bhattasali T, Saeed K, Chaki N, Chaki R. A survey of security and privacy issues for

biometrics based remote authentication in cloud; 2014. 112 p. 45. Roy S, Saha S, Dey A, Shaikh SH, Chaki N. Performance Evaluation of Multiple Image

Binarization Algorithms Using Multiple Metrics on Standard Image Databases; 2014. 349 p. 46. Dey A, Shaikh SH, Saeed K, Chaki N. Modified majority voting algorithm towards creating

reference image for binarization; 2014. 221 p. 47. Bhattacharya A, Das A, Choudhury S, Chaki N. Agent-Based context management for

service-oriented environments; 2014. 363 p. 48. Shaikh S H, Tabedzki M, Chaki N, Saeed K. Bengali printed character recognition - A new

approach; 2013. 129 p. 49. Shaikh S H, Bhunia S K, Chaki N. On generation of silhouette of moving objects from video;

2013. 213 p. 50. Bhattasali T, Chaki R, Chaki N. Study of security issues in pervasive environment of next

generation Internet of Things; 2013. 206 p. 51. Ghosh D, Chaki N. A hierarchical Color-net model for smart grid security monitoring; 2013.

393 p. 52. Shaikh S H, Saeed K, Chaki N. Performance benchmarking of different binarization

techniques for fingerprint-based biometric authentication; 2013. 237 p. 53. Shaikh SH, Roy S, Chaki N. Recognition of object orientation from images. In: IEEE

Proceedings of the International Conference On Emerging Trends in Science Engineering and Technology: Recent Advancements on Science and Engineering Innovation, INCOSET 2012. p. 260-3.

54. Deb N, Chaki N. Verification of i* models for existential compliance rules in remote healthcare systems. In: Proceedings - International Conference on 2014 Applications and Innovations in Mobile Computing, AIMoC 2014. p. 60-6.

55. Chakraborty M, Chaki N, Cortesi A. A new intrusion prevention system for protecting Smart Grids from ICMPv6 vulnerabilities. In: 2014 Federated Conference on Computer Science and Information Systems, FedCSIS 2014. p. 1539-47.

56. Shaikh SH, Saeed K, Chaki N. Gait recognition using partial silhouette-based approach. In: 2014 International Conference on Signal Processing and Integrated Networks, SPIN 2014. p. 101-6.

57. Pandit D, Chattopadhyay S, Chattopadhyay M, Chaki N. Resource allocation in cloud using simulated annealing. In: Proceedings - International Conference on 2014 Applications and Innovations in Mobile Computing, AIMoC 2014. p. 21-7.

58. Bhattasali T, Chaki R, Chaki N. Secure and trusted cloud of things. In: 2013 Annual IEEE India Conference, INDICON 2013

59. Halder K, Chaki N, Dasgupta R. Analysis and design of Learner Quanta Graph properties for efficient query processing in an adaptive dynamic courseware. In: Proceedings of 2013 IEEE International Conference on Teaching, Assessment and Learning for Engineering, TALE 2013. p. 91-4.

60. Sarkar B B, Cortesi A, Chaki N. Modeling the Bullwhip effect in a multi-stage multi-tier retail network by Generalized Stochastic Petri nets. In: 2013 Federated Conference on Computer Science and Information Systems, FedCSIS 2013. p. 1157-64.

61. Roy S, Sen S, Sarkar A, Chaki N, Debnath NC. Dynamic query path selection from lattice of cuboids using memory hierarchy. In: Proceedings - International Symposium on Computers and Communications. p. 49-54.

62. Kanrar S, Chattopadhyay S, Chaki N. A new voting-based mutual exclusion algorithm for distributed systems. In: 2013 Nirma University International Conference on Engineering, NUiCONE 2013

63. Deb N, Chaki N. TIDS: Trust-based intrusion detection system for wireless ad-hoc networks; 2012. 80 p.

64. Ghosh P, Sen S, Chaki N. Materialized view construction using linear regression on attributes. In: Proceedings - 2012 3rd International Conference on Emerging Applications of Information Technology, EAIT 2012. p. 214-9.

65. Deb D, Chaki N, Ghose A. UNNOTI: Toolkit for rural service modeling. In: Proceedings - 2012 3rd International Conference on Services in Emerging Markets, ICSEM 2012. p. 115-23.

66. Sen S, Datta D, Chaki N. An architecture to maintain materialized view in cloud computing environment for OLAP processing. In: Proceedings: Turing 100 - International Conference on Computing Sciences, ICCS 2012. p. 360-5.

67. Chakraborty M, Chaki N. ETSeM: A energy-aware, trust-based, selective multi-path routing protocol; 2012. 351 p.

68. Chakraborty S, Chaki N. DFRS: A domain-based framework for representing semi-structured data. In: ACM International Conference Proceeding Series. p. 447-52.

69. Khatua A, Chaki N. Sustainable peer-based structure for content delivery networks. In: ACM International Conference Proceeding Series. p. 403-8.

70. Mishra RK, Choudhury S, Chaki N. A light-weight, dynamic call admission control for sudden user influx management. In: 2011 2nd International Conference on Computer and Communication Technology, ICCCT-2011. p. 124-8.

71. Shaikh SH, Maiti A, Chaki N. Image binarization using iterative partitioning: A global thresholding approach. In: 2011 International Conference on Recent Trends in Information Systems, ReTIS 2011 - Proceedings. p. 281-6.

72. Mishra RK, Choudhury S, Chaki N. Optimizing mobile terminal equipment for video-medic services. In: ACWR 2011 - Proceedings of the International Conference on Wireless Technologies for Humanitarian Relief. p. 373-8.

73. Khatua S, Mukherjee N, Chaki N. A new agent based security framework for collaborative cloud environment. In: ACM International Conference Proceeding Series

74. Sarkar BB, Sanyal S, Chaki N. Distributed framework for tele health monitoring system. In: ACWR 2011 - Proceedings of the International Conference on Wireless Technologies for Humanitarian Relief. p. 385-90.

75. Deb N, Chakraborty M, Chaki N. A state-of-the-art survey on IDS for mobile ad-hoc networks and wireless mesh networks; 2011. 169 p.

76. Sen S, Chaki N. Efficient traversal in data warehouse based on concept hierarchy using Galois connections. In: Proceedings - 2nd International Conference on Emerging Applications of Information Technology, EAIT 2011. p. 335-9.

77. Dasgupta S, Sen S, Chaki N. A framework to convert XML schema to ROLAP. In: Proceedings - 2nd International Conference on Emerging Applications of Information Technology, EAIT 2011. p. 11-6.

78. Sarkar A, Bhattacharya S, Choudhury S, Chaki N. Object relational implementation of graph based conceptual level multidimensional data model. In: 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010. p. 154-9.

79. Maulik R, Chaki N. A comprehensive review on wormhole attacks in MANET. In: 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010. p. 233-8.

80. Roy B, Banik S, Chaki N, Saha B. An improved route maintenance strategy for QoS based AODV Routing Protocol. In: Proceedings - 2nd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2010. p. 51-5.

81. Ghanty SK, Shaikh SH, Chaki N. On recognition of spoken bengali numerals. In: 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010. p. 54-9.

82. Banik S, Roy B, Saha B, Chaki N. Design of QoS routing framework based on OLSR protocol. In: Proceedings - 2nd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2010. p. 171-3.

83. Sarkar A, Choudhury S, Chaki N, Bhattacharya S. Business-object oriented requirements analysis framework for Data Warehouses. In: SEKE 2010 - Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering. p. 34-7.

84. Chaki N. LAR2P: A location aided reactive routing protocol for near-optimal route discovery in MANET. In: 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010. p. 259-64.

85. Shaikh SH, Chaki N, Tabedzki M, Saeed K. A view-based approach for recognition of Bengali printed characters. In: 2009 World Congress on Nature and Biologically Inspired Computing, NABIC 2009 - Proceedings. p. 1005-9.

86. Sarkar A, Choudhury S, Chaki N, Bhattacharya S. Object specification language for graph based conceptual level multidimensional data model. In: Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering, SEKE 2009. p. 694-7.

87. Maulik R, Chaki N. PhishNet: Enhancing the security aspect of IMS users. In: 1st International Conference on Networks and Communications, NetCoM 2009. p. 235-9.

88. Sen S, Chaki N, Cortesi A. Optimal space and time complexity analysis on the lattice of cuboids using galois connections for data warehousing. In: ICCIT 2009 - 4th International Conference on Computer Sciences and Convergence Information Technology. p. 1271-5.

89. Sarkar BB, Chaki N. Modeling & analysis of transaction management for distributed database environment using petri nets. In: 2009 World Congress on Nature and Biologically Inspired Computing, NABIC 2009 - Proceedings. p. 918-23.

90. Deb D, Roy SB, Chaki N. Design of a low-cost positioning framework for location aided energy efficient routing. In: 5th International Conference on Wireless Communication and Sensor Networks, WCSN-2009. p. 129-34.

91. Sil A, Bandyopadhyay O, Chaki N. Data diverse fault tolerant architecture for component based systems. In: 2009 World Congress on Nature and Biologically Inspired Computing, NABIC 2009 - Proceedings. p. 942-6.

92. Lakshmi Priya R, Chaki N. A study on QoS issues for mobile Ad-hoc networks. In: ACM International Conference Proceeding Series. p. 637-42.

93. Sarkar BB, Chaki N. High level net model for analyzing agent base distributed decision support system. In: 2009 International Association of Computer Science and Information Technology - Spring Conference, IACSIT-SC 2009. p. 351-8.

94. Dasgupta M, Choudhury S, Chaki N. A secure hyper cube based team multicast routing protocols (S-HTMRP). In: 2009 IEEE International Advance Computing Conference, IACC 2009. p. 1265-9.

95. Kanrar S, Choudhury S, Chaki N. A link-failure resilient token based mutual exclusion algorithm for directed graph topology. In: Proceedings of the 7th International Symposium on Parallel and Distributed Computing, ISPDC 2008. p. 65-72.

96. Sarkar A, Choudhury S, Chaki N, Bhattacharya S. Measuring quality metrics for object oriented multidimensional conceptual data model. In: Proceedings of the 9th IASTED International Conference on Software Engineering and Applications, SEA 2008. p. 94-9.

97. Sen P, Chaki N, Chaki R. HIDS: Honesty-rate based collaborative intrusion detection system for mobile ad-hoc networks. In: Proceedings - 7th Computer Information Systems and Industrial Management Applications, CISIM 2008. p. 121-6.

98. Saha S, Chaki R, Chaki N. A new reactive secure routing protocol for mobile ad-hoc networks. In: Proceedings - 7th Computer Information Systems and Industrial Management Applications, CISIM 2008. p. 103-8.

99. Chaki N, Chaki R. ORRP: Optimal reactive routing protocol for mobile ad-hoc networks. In: Proceedings - 6th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2007. p. 185-90.

100. Mukherjee S, Choudhury S, Chaki N, Mukhopadhyay D. A novel algorithm towards designing the protocol for generation of secret-key with authentication in collaboration (PGSAC). In: Proceedings - 2007 International Symposium on Information Technology Convergence, ISITC 2007. p. 353-7.

101. Chaki R, Chaki N. IDSX: A cluster based collaborative intrusion detection algorithm for mobile ad-hoc network. In: Proceedings - 6th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2007. p. 179-84.

102. Chaki R, Chaki N, Bhattacharya U. Performance evaluation of the Scale-net: An optimal, irregular logical topology for all-optical networks. In: Proceedings of the 4th IASTED Asian Conference on Communication Systems and Networks, AsiaCSN 2007. p. 310-5.

103. Chaki N, Chaki R. A scalable barrel shifter topology for all optical networks. In: Proceedings of the 4th IASTED Asian Conference on Communication Systems and Networks, AsiaCSN 2007. p. 304-9.

104. Basu N, Chatterjee S, Chaki N. Design pattern mining from source code for reverse engineering. In: IEEE Region 10 Annual International Conference, Proceedings/TENCON

105. Dutta S, Chaki R, Chaki N. Optimal reactive routing protocol (ORRP): A new reactive routing protocol for the shortest path in ad hoc networks. In: 2006 Annual India Conference, INDICON

106. Ray S, Chaki N, Dasgupta R. Design of an adaptive web-based courseware. In: Proceedings of the IASTED International Conference on Intelligent Systems and Control. p. 266-71.

107. Neogy S, Choudhury S, Chaki N. An adaptive constant time hashing scheme for dynamic key set. In: IEEE Region 10 Annual International Conference, Proceedings/TENCON. p. B364-6.

108. Bhattacharya U, Chaki R, Sikdar BK, Chaki N. Design of a scalable logical topology for reliable optical communication. In: IEEE Region 10 Annual International Conference, Proceedings/TENCON. p. 1209-12.

109. Chaki N, Bhattacharya S. High level net models: A tool for permutation mapping and fault detection in multistage interconnection network. In: IEEE Region 10 Annual International Conference, Proceedings/TENCON. p. 248-252.

110. Chaki N, Bhattacharya S. Permutation mapping for MIN using high level net models. In: Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS. p. 548-55

PUBLICATION LIST FOR SANKHAYAN CHOUDHURY (FROM SCOPUS) OTHER THAN BOOKS Edited Volumes:

1. Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki; Applied Computation and Security Systems; Springer Advances in Intelligent Systems and Computing (AISC) Series, vol. 304, 2014. ISBN: 978-81-322-1984-2

2. Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki; Applied Computation and Security Systems; Springer Advances in Intelligent Systems and Computing (AISC) Series, vol. 305, 2014. ISBN: 978-81-322-1987-3

Journals:

1. Choudhury, S., Chaki, N., & Bhattacharya, S. (2006). GDM: A new graph based data model using functional abstractions. Journal of Computer Science and Technology, 21(3), 430-438.

2. Sarkar, A., Choudhury, S., Chaki, N., & Bhattacharya, S. (2010). Quality evaluation of conceptual level object-oriented multidimensional data model. International Journal of Computers and Applications, 32(3), 362-371.

Conference Publications:

5. Bhattacharya, A., & Choudhury, S. (2015). Non-functional property aware brokerage approach for cloud service discovery

6. Bhattacharya, A., & Choudhury, S. (2015). Service insurance: A new approach in cloud brokerage

7. Bhattacharya, A., Das, A., Choudhury, S., & Chaki, N. (2014). Agent-based context management for service-oriented environments

8. Chakraborty, U. K., Konar, D., Roy, S., & Choudhury, S. (2014). Intelligent fuzzy spelling evaluator for e-learning systems. Education and Information Technologies, 1-14.

9. Dasgupta, S., Chaki, R., & Choudhury, S. (2013). TruVAL: Trusted vehicle authentication logic for VANET

10. Mishra, R. K., Chaki, N., & Choudhury, S. (2015). Study on handover mechanism in cellular network: An experimental approach

11. Mishra, R. K., Choudhury, S., & Chaki, N. (2010). E2IRP: A new energy efficient integrated routing protocol for MANET

12. Mishra, R. K., Saha, S., Choudhury, S., & Chaki, N. (2011). Agent based approach for radio resource optimization for cellular networks

13. Sanyal, A., & Choudhury, S. (2011). Operational algebra for a graph based semantic web data model

14. Udit, U. K., Roy, S., & Choudhury, S. (2014). A novel semantic similarity based technique for computer assisted automatic evaluation of textual answers

15. Banerjee, S., Bera, P., Choudhury, S., & Dasgupta, M. (2010). A power aware multicast on-demand routing with load balancing. Paper presented at the ICCTD 2010 - 2010 2nd International Conference on Computer Technology and Development, Proceedings, 677-681.

16. Bhattacharya, A., & Choudhury, S. (2014). A graph based meta-model for speed-up service composition on web. Paper presented at the Proceedings of the IEEE International Conference on Industrial Technology, 776-781.

17. Choudhury, S., Dasgupta, R., & Bhattacharya, S. (2002). A graph object oriented database model in distributed environment. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON, , 1 85-88.

18. Dasgupta, M., Choudhury, S., & Chaki, N. (2009). A secure hyper cube based team multicast routing protocols (S-HTMRP). Paper presented at the 2009 IEEE International Advance Computing Conference, IACC 2009, 1265-1269.

19. Dasgupta, M., Santra, D., Bhattacharya, A., & Choudhury, S. (2014). A colored petri net model for NFP driven web service composition. Paper presented at the Proceedings of the IEEE International Conference on Industrial Technology, 782-787.

20. Dasgupta, M., Santra, D., & Choudhury, S. (2012). Network modelling of a blackhole prevention mechanism in mobile ad-hoc network. Paper presented at the Proceedings - 4th International Conference on Computational Intelligence and Communication Networks, CICN 2012, 734-738.

21. Kanrar, S., Choudhury, S., & Chaki, N. (2008). A link-failure resilient token based mutual exclusion algorithm for directed graph topology. Paper presented at the Proceedings of the 7th International Symposium on Parallel and Distributed Computing, ISPDC 2008, 65-72.

22. Mishra, R. K., Choudhury, S., & Chaki, N. (2011). A light-weight, dynamic call admission control for sudden user influx management. Paper presented at the 2011 2nd International Conference on Computer and Communication Technology, ICCCT-2011, 124-128.

23. Mishra, R. K., Choudhury, S., & Chaki, N. (2011). Optimizing mobile terminal equipment for video-medic services. Paper presented at the ACWR 2011 - Proceedings of the International Conference on Wireless Technologies for Humanitarian Relief, 373-378.

24. Mukherjee, S., Choudhury, S., Chaki, N., & Mukhopadhyay, D. (2007). A novel algorithm towards designing the protocol for generation of secret-key with authentication in collaboration (PGSAC). Paper presented at the Proceedings - 2007 International Symposium on Information Technology Convergence, ISITC 2007, 353-357.

25. Neogy, S., Choudhury, S., & Chaki, N. (2004). An adaptive constant time hashing scheme for dynamic key set. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON, , B B364-B366.

26. Sanyal, A., Basu, S. S., & Choudhury, S. (2010). A requirement framework for enablement of automatic generation of domain model. Paper presented at the 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010, 359-364.

27. Sanyal, A., & Choudhury, S. (2011). An aspect-oriented conceptual level design for semantic web based application. Paper presented at the 2011 2nd International Conference on Computer and Communication Technology, ICCCT-2011, 352-357.

28. Sanyal, A., & Choudhury, S. (2009). An object-oriented conceptual level design for web data model. Paper presented at the Proceedings of International Conference on Methods and Models in Computer Science, ICM2CS09,

29. Sanyal, A., Sanyal, S., & Choudhury, S. (2011). Physical level implementation of a web data model. Paper presented at the ACM International Conference Proceeding Series, 483-488.

30. Sanyal, A., Sarkar, A., Choudhury, S., & Debnath, N. C. (2010). Automating web data model: Conceptual design to logical representation. Paper presented at the 19th International Conference on Software Engineering and Data Engineering 2010, SEDE 2010, 94-99.

31. Sarkar, A., Bhattacharya, S., Choudhury, S., & Chaki, N. (2010). Object relational implementation of graph based conceptual level multidimensional data model. Paper presented at the 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010, 154-159.

32. Sarkar, A., Choudhury, S., Chaki, N., & Bhattacharya, S. (2010). Business-object oriented requirements analysis framework for data warehouses. Paper presented at the SEKE 2010 - Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering, 34-37.

33. Sarkar, A., Choudhury, S., Chaki, N., & Bhattacharya, S. (2008). Measuring quality metrics for object oriented multidimensional conceptual data model. Paper presented at the Proceedings of the 9th IASTED International Conference on Software Engineering and Applications, SEA 2008, 94-99.

34. Sarkar, A., Choudhury, S., Chaki, N., & Bhattacharya, S. (2009). Object specification language for graph based conceptual level multidimensional data model. Paper presented at the Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering, SEKE 2009, 694-697.

35. Sarkar, A., Choudhury, S., & Debnath, N. C. (2012). Graph semantic based design of XML data warehouse: A conceptual perspective. Paper presented at the IEEE International Conference on Industrial Informatics (INDIN), 992-997.

36. Zaidi, A. Z., DeMonsabert, S. M., El-Farhan, R., & Choudhury, S. (2004). A framework for pollutant trading during the TMDL allocation phase. Paper presented at the Proceedings of the 2004 Self-Sustaining Solutions for Streams, Wetlands, and Watersheds Conference, 335-341.

PUBLICATION LIST FOR RAJAT KUMAR PAL (FROM SCOPUS) OTHER THAN BOOKS Journals:

1. Changdar, C., Mahapatra, G. S., & Pal, R. K. (2015). An improved genetic algorithm based approach to solve constrained knapsack problem in fuzzy environment. Expert Systems with Applications, 42(4), 2276-2286.

2. Gayen, D. K., Chattopadhyay, T., Das, M. K., Roy, J. N., & Pal, R. K. (2011). All-optical binary to gray code and gray to binary code conversion scheme with the help of semiconductor optical amplifier-assisted sagnac switch. IET Circuits, Devices and Systems, 5(2), 123-131.

3. Gayen, D. K., Chattopadhyay, T., Pal, R. K., & Roy, J. N. (2010). All-optical multiplication with the help of semiconductor optical amplifier-assisted sagnac switch. Journal of Computational Electronics, 9(2), 57-67.

4. Gayen, D. K., Chattopadhyay, T., Pal, R. K., & Roy, J. N. (2011). All-optical prefix tree adder with the help of terahertz optical asymmetric demultiplexer. Chinese Optics Letters, 9(6)

5. Gayen, D. K., Pal, R. K., & Roy, J. N. (2009). All-optical adder/subtractor based on terahertz optical asymmetric demultiplexer. Chinese Optics Letters, 7(6), 530-533.

6. Gayen, D. K., Roy, J. N., & Pal, R. K. (2012). All-optical carry lookahead adder with the help of terahertz optical asymmetric demultiplexer. Optik, 123(1), 40-45.

7. Gayen, D. K., Roy, J. N., Taraphdar, C., & Pal, R. K. (2011). All-optical reconfigurable logic operations with the help of terahertz optical asymmetric demultiplexer. Optik, 122(8), 711-718.

8. Gayen, D. K., Taraphdar, C., Bhattacharyya, A., Pal, R. K., & Roy, J. N. (2011). All-optical binary-coded decimal adder with a terahertz optical asymmetric demultiplexer. Computing in Science and Engineering, 13(1), 50-57.

9. Gayen, D. K., Taraphdar, C., Roy, J. N., & Pal, R. K. (2010). Terahertz optical asymmetric demultiplexer based all optical data comparator. Journal of Circuits, Systems and Computers, 19(3), 671-682.

10. Pal, R. K., Pal, S. P., & Pal, A. (1998). An algorithm for finding a non-trivial lower bound for channel routing. Integration, the VLSI Journal, 25(1), 71-84.

Peer-reviewed Conference Proceedings:

11. Changdar, C., Mahapatra, G. S., & Pal, R. K. (2013). An ant colony optimization approach for binary knapsack problem under fuzziness. Applied Mathematics and Computation, 223, 243-253.

12. Dhal, D., Chakrabarty, A., Datta, P., & Pal, R. K. (2015). A new move toward parallel assay operations in a restricted sized chip in digital microfluidics

13. Dhal, D., Datta, P., Chakraborty, A., & Pal, R. K. (2015). Design of a mixer for performing efficient mixing to reduce overall assay response time

14. Maji, A. K., & Pal, R. K. (2015). A novel biometric template encryption scheme using sudoku puzzle

15. Mehera, R., Chakrabarty, A., Datta, P., & Pal, R. K. (2015). A 2D guard zone computation algorithm for reassignment of subcircuits to minimize the overall chip area

16. Mehera, R., Chakraborty, A., Datta, P., & Pal, R. K. (2015). Advancement in guard zone computation through detection and exclusion of the overlapped regions

17. Mehera, R., & Pal, R. K. (2009). A cost-optimal algorithm for guard zone problem 18. Saha, D., Pal, R. K., & Sarma, S. S. (2006). A mimetic algorithm for refinement of lower

bound of number of tracks in channel routing problem 19. Sau, S. S., & Pal, R. K. (2015). An efficient algorithm for reducing wire length in three-layer

channel routing Bandyopadhyay, S., Dhal, D., & Pal, R. K. (2008). A method to select programme slots for giving advertisements in different television channels. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON,

20. Bandyopadhyay, S., & Pal, R. K. (2011). An algorithm for selecting programme slots to broadcast advertisements in parallel in different television channels. Paper presented at the Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011, , 2 399-403.

21. Bandyopadhyay, S., & Pal, R. K. (2014). Computation of all possible maximal cliques of a weakly triangulated graph in polynomial time. Paper presented at the Proceedings of 2014 Science and Information Conference, SAI 2014, 159-168.

22. Bandyopadhyay, S., & Pal, R. K. (2014). The problem of computing k-disjoint maximal cliques covering a maximum number of vertices for weakly triangulated graph. Paper presented at the Proceedings of 2014 Science and Information Conference, SAI 2014, 234-241.

23. Bhattacharjya, A., & Pal, R. K. (2011). Distributed design of universal lightweight RFID system for large-scale RFID operation. Paper presented at the APBITM 2011 - Proceedings2011 IEEE International Summer Conference of Asia Pacific Business Innovation and Technology Management, 40-44.

24. Bhowal, S., & Pal, R. K. (2004). High performance multi-layer routing for VLSI circuit synthesis. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON, , D D328-D331.

25. Das, S., Banerjee, S., & Pal, R. K. (2007). Novelty of TAH framework in computing reduced wire length two- and three-layer routing solutions. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON,

26. Datta, P., Dutta, A., Majumder, R., Chakraborty, A., Dhal, D., & Pal, R. K. (2015). A technology shift towards triangular electrodes from square electrodes in design of digital microfluidic biochip. Paper presented at the 8th International Conference on Electrical and Computer Engineering: Advancing Technology for a Better Tomorrow, ICECE 2014, 1-4.

27. Debbarma, J., Debbarma, M. K., Roy, S., Debbarma, N., & Pal, R. K. (2013). An efficient energy protocol for power conservation in mobile ad-hoc networks. Paper presented at the Proceedings - 2013 International Symposium on Computational and Business Intelligence, ISCBI 2013, 239-242.

28. Dhal, D., Chakrabarty, A., Datta, P., Roy, S., & Pal, R. K. (2013). A connect-5 structure based parallel assay operations in a restricted sized chip in digital microfluidics. Paper presented at the Proceedings of 2013 2nd International Conference on Advances in Electrical Engineering, ICAEE 2013, 75-80.

29. Dhal, D., Datta, P., Chakrabarty, A., & Pal, R. K. (2014). Enhancement of multiple parallel assay operations with cross contamination avoidance in a given biochip. Paper presented at the 2014 International Conference on Electronics and Communication Systems, ICECS 2014,

30. Dhal, D., Datta, P., Chakrabarty, A., Saha, G., & Pal, R. K. (2014). An algorithm for parallel assay operations in a restricted sized chip in digital microfluidics. Proceedings of IEEE Computer Society Annual Symposium on VLSI, ISVLSI, , 142-147.

31. Gayen, D. K., Bhattacharyya, A., Pal, R. K., & Roy, J. N. (2009). All-optical binary coded decimal (BCD) adder. Paper presented at the Codec - 2009 - 4th International Conference on Computers and Devices for Communication,

32. Ghosh, J., Chakraborty, A., Datta, P., Dey, L., Nandy, A., Pal, R. K., & Samanta, R. K. (2015). The first algorithm for solving two coins counterfeiting with ω(ΔH) = ω(ΔL). Paper presented at the 8th International Conference on Electrical and Computer Engineering: Advancing Technology for a Better Tomorrow, ICECE 2014, 337-340.

33. Ghosh, J., Datta, P., Chakraborty, A., Nandy, A., Dey, L., Pal, R. K., & Samanta, R. K. (2015). An endeavour to find two unequal false coins. Paper presented at the 8th International Conference on Electrical and Computer Engineering: Advancing Technology for a Better Tomorrow, ICECE 2014, 333-336.

34. Ghosh, J., Senmajumdar, P., Maitra, S., Dhal, D., & Pal, R. K. (2011). A generalized algorithm for solving n coins problem. Paper presented at the Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011, , 2 411-415.

35. Khan, A. K., Roy, S., Das, B., & Pal, R. K. (2013). A new efficient layer assignment algorithm for partitioning in 3D VLSI physical design. Paper presented at the Proceedings - 2013 1st International Conference on Emerging Trends and Applications in Computer Science, ICETACS 2013, 203-207.

36. Maji, A. K., & Pal, R. K. (2014). Sudoku solver using minigrid based backtracking. Paper presented at the Souvenir of the 2014 IEEE International Advance Computing Conference, IACC 2014, 36-44.

37. Maji, A. K., Pal, R. K., & Roy, S. (2013). A novel steganographic scheme using sudoku. Paper presented at the 2013 International Conference on Electrical Information and Communication Technology, EICT 2013,

38. Mehera, R., Chatterjee, S., & Pal, R. K. (2007). A time-optimal algorithm for guard zone problem. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON,

39. Mehera, R., Datta, P., Chakraborty, A., & Pal, R. K. (2015). A comprehensive approach towards guard zone computation detecting and excluding the overlapped regions. Paper presented at the 8th International Conference on Electrical and Computer Engineering: Advancing Technology for a Better Tomorrow, ICECE 2014, 353-356.

40. Mitra, P., Ghoshal, N., & Pal, R. K. (2003). A graph theoretic approach to minimize total wire length in channel routing. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON, , 1 414-418.

41. Pal, A., Kundu, D., Datta, A. K., Mandal, T. N., & Pal, R. K. (2007). Algorithms for high performance two-layer channel routing. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON,

42. Pal, A., Mandal, T. N., Datta, A. K., Kundu, D., & Pal, R. K. (2008). Generation of random channel specifications for channel routing problem. Paper presented at the Proceedings of 11th International Conference on Computer and Information Technology, ICCIT 2008, 19-24.

43. Pal, A., Saha Sau, S., Mandal, T. N., Pal, R. K., Datta, A. K., & Chaudhuri, A. (2011). Yet an efficient algorithm for computing reduced area VLSI channel routing solutions with floating terminals. Paper presented at the 14th International Conference on Computer and Information Technology, ICCIT 2011, 393-398.

44. Pal, A., Singha, A., Ghosh, S., & Pal, R. K. (2002). Crosstalk minimization in two-layer channel routing. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON, , 1 408-411.

45. Pal, R. K. (2003). ARKEPIanGraphSort: A graph based sorting algorithm. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON, , 4 1386-1390.

46. Pal, R. K. (2011). CompleteGraphSort: A complete graph structure based sorting algorithm. Paper presented at the Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011, , 4 193-197.

47. Pal, R. K. (2004). SieveSort: Yet another sorting algorithm. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON, , B B357-B360.

48. Pal, R. K., Pal, S. P., & Pal, A. (1997). Algorithm for finding a non-trivial lower bound for channel routing. Paper presented at the Proceedings of the IEEE International Conference on VLSI Design, 531-532.

49. Pal, R. K., Datta, A. K., Pal, S. P., & Pal, A. (1993). Resolving horizontal constraints and minimizing net wire length for multi-layer channel routing. Paper presented at the Proceedings of the 10th IEEE Region Conference on Computer, Communication, Control and Power Engineering, 569-573.

50. Pal, R. K., Pal, S. P., & Pal, A. (1993). New lower bound for channel routing. Paper presented at the Proceedings of the 10th IEEE Region Conference on Computer, Communication, Control and Power Engineering, 507-510.

51. Sau, S. S., Pal, A., Mandal, T. N., Datta, A. K., Pal, R. K., & Chaudhuri, A. (2011). A graph based algorithm to minimize total wire length in VLSI channel routing. Paper presented at the Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011, , 3 61-65.

52. Sau, S. S., & Pal, R. K. (2014). A re-router for optimizing wire length in two-and four-layer no-dogleg channel routing. Paper presented at the 18th International Symposium on VLSI Design and Test, VDAT 2014,

53. Sau, S. S., & Pal, R. K. (2012). An efficient high performance parallel algorithm to yield reduced wire length VLSI circuits. Paper presented at the CODEC 2012 - 5th International Conference on Computers and Devices for Communication,

PUBLICATION LIST FOR BANANI SAHA (FROM SCOPUS) Journals:

1. Mitra, S., & Saha, B. (1989). Implementation of fault simulation and testing of combinational circuits. International Journal of Electronics, 66(5), 665-678.

2. Saha, B., & Bandyopadhyay, S. (1988). Representation and analysis of patrinets via the matrix state equation approach. International Journal of Electronics, 65(1), 1-7.

3. Saha, B., & Bandyopadhyay, S. (1991). Computer-based reduction technique for petri nets. International Journal of Systems Science, 22(1), 49-59.

4. Saha, B., & Bandyopadhyay, S. (1988). Realization of petrinets: A system theoretic approach. International Journal of Systems Science, 19(11), 2407-2417.

Peer-reviewed Conference Proceedings:

5. Bhattacharya, B., & Saha, B. (2015). Signalling cost analysis of community model 6. Biswas, A., Saha, B., & Guha, S. (2012). Performance analysis of AODV and DSR routing

protocols for ad-hoc networks 7. Dolkar, D., & Saha, B. (2009). Optimal face recognition method using ant colony based back

propagation network. Paper presented at the Codec - 2009 - 4th International Conference on Computers and Devices for Communication,

8. Saha, B., & Mukhoapdhyay, S. S. (2006). Subscription fraud in telecommunication modeling and behavior analysis through statistical measure. Paper presented at the Proceedings - 2006 14th International Conference on Advanced Computing and Communications, ADCOM 2006, 179-182.

PUBLICATION LIST FOR RAJIB DAS (FROM SCOPUS) Journals:

1. Das, R. K., & Das, N. (1997). GSE: A full-access multistage interconnection network of arbitrary size. International Journal of Systems Science, 28(11), 1189-1194.

2. Das, R. K., & Sinha, B. P. (1996). A new topology with odd degree for multiprocessor systems. Journal of Parallel and Distributed Computing, 39(1), 87-94.

3. Das, R. K., & Sinha, B. P. (1995). Optimal communication algorithms in distributed loop networks. Journal of Parallel and Distributed Computing, 30(1), 85-90.

4. Das, R. K., Mukhopadhyaya, K., & Sinha, B. P. (1994). New family of bridged and twisted hypercubes. IEEE Transactions on Computers, 43(10), 1240-1247.

5. Sen Gupta, S., Das, R. K., Mukhopadhyaya, K., & Sinha, B. P. (1997). A family of network topologies with multiple loops and logarithmic diameter. Parallel Computing, 22(14), 2047-2064.

6. Sharma, U., Kalita, J. K., & Das, R. K. (2008). Acquisition of morphology of an indic language from text corpus. ACM Transactions on Asian Language Information Processing, 7(3)

Peer-reviewed Conference Proceedings:

7. Das, R. K. (2004). Adaptive fault tolerant routing in star graph 8. Das, R. K. (2005). Fault tolerant routing in star graphs using fault vector 9. Dutta, A., Thakkar, K., Khatua, S., & Das, R. K. (2013). Power efficient data gathering for

sensor network 10. Baksi, S., Sinha, A., Khatua, S., & Das, R. K. (2014). Finding the maximum lifetime data-

gathering tree in sensor networks. Paper presented at the IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings,

11. Das, R. K. (2007). Diameter and routing in enhanced OTIS cube. Paper presented at the Proceedings - International Conference on Computing: Theory and Applications, ICCTA 2007, 188-192.

12. Das, R. K. (2010). Fault tolerant routing using improved safety vectors. Paper presented at the 2010 1st International Conference on Parallel, Distributed and Grid Computing, PDGC - 2010, 129-134.

13. Das, R. K., & Das, N. (1996). GSE: A generalized full-access multistage interconnection network with minimum cost. Paper presented at the Proceedings of the 1996 3rd International Conference on High Performance Computing, HiPC, 176-181.

14. Reddy, P. S., Sarma, N., & Das, R. K. (2007). Enhancing fault-tolerance in a distributed mutual exclusion algorithm. Paper presented at the Proceedings - 9th International Conference on Information Technology, ICIT 2006, 56-59.

PUBLICATION LIST FOR PRITHA BANERJEE (FROM SCOPUS) Journals:

1. Banerjee, P., Saha, D., & Sur-Kolay, S. (2011). Cone-based placement for field programmable gate arrays. IET Computers and Digital Techniques, 5(1), 49-62.

2. Banerjee, P., Sangtani, M., & Sur-Kolay, S. (2011). Floorplanning for partially reconfigurable FPGAs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 30(1), 8-17.

3. Banerjee, P., Sur-Kolay, S., & Bishnu, A. (2009). Fast unified floorplan topology generation and sizing on heterogeneous FPGAs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 28(5), 651-661.

4. Banerjee, P., Sur-Kolay, S., Bishnu, A., Das, S., Nandy, S. C., & Bhattacharjee, S. (2009). FPGA placement using space-filling curves: Theory meets practice. Transactions on Embedded Computing Systems, 9(2), 12.

5. Banerjee, P., Susmita, S. Koley, & Bishnu, A. (2009). Fast unified floorplan topology generation and sizing on heterogeneous FPGAs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 28(1), 651-661.

Peer-reviewed Conference Proceedings:

6. Banerjee, P., Bhattacharjee, S., Sur-Kolay, S., Das, S., & Nandy, S. C. (2005). Fast FPGA placement using space-filling curve. Paper presented at the Proceedings - 2005 International Conference on Field Programmable Logic and Applications, (2005). 415-420.

7. Banerjee, P., Sangtani, M., & Sur-Kolay, S. (2009). Floorplanning for partial reconfiguration in FPGAs. Paper presented at the Proceedings: 22nd International Conference on VLSI Design - Held Jointly with 7th International Conference on Embedded Systems, 125-130.

8. Banerjee, P., & Sur-Kolay, S. (2007). Faster placer for island-style FPGAs. Paper presented at the Proceedings - International Conference on Computing: Theory and Applications, ICCTA 2007, 117-121.

9. Banerjee, P., Sur-Kolay, S., & Bishnu, A. (2007). Floorplanning in modern FPGAs. Paper presented at the Proceedings of the IEEE International Conference on VLSI Design, 893-898.

10. Banerjee, P. K., & Raahemifar, K. (2013). AC voltage regulation by switch mode PWM voltage controller. Paper presented at the Canadian Conference on Electrical and Computer Engineering,

11. Lin, T. -., Banerjee, P., & Chang, Y. -. (2013). An efficient and effective analytical placer for FPGAs. Paper presented at the Proceedings - Design Automation Conference,

12. Mukhopadhyay, S., Banerjee, P., & Sur-Kolay, S. (2011). Balanced bipartitioning of a multi-weighted hypergraph for heterogeneous FPGAS. Paper presented at the Proceedings of the 2011 7th Southern Conference on Programmable Logic, SPL 2011, 91-96.

PUBLICATION LIST FOR RITUPARNA CHAKI (FROM SCOPUS) OTHER THAN BOOKS

Edited Volumes: 1. Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki; Applied

Computation and Security Systems; Springer Advances in Intelligent Systems and Computing (AISC) Series, vol. 304, 2014. ISBN: 978-81-322-1984-2

2. Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki; Applied Computation and Security Systems; Springer Advances in Intelligent Systems and Computing (AISC) Series, vol. 305, 2014. ISBN: 978-81-322-1987-3

3. Saeed, K.; Chaki, R.; Cortesi, A.; Wierzchoń, S. (Eds.); Proceedings of the 12th IFIP TC 8 International Conference, CISIM 2013, Krakow, Poland, Sep. 25-27, 2013, Springer Lecture Notes in Computer Science (LNCS), vol. 8104, 2013. ISBN: 978-3-642-40925-7.

Journals:

4. Bhattacharya, U., & Chaki, R. (2005). A new scalable optimal topology for multi-hop optical networks. Computer Communications, 28(5), 557-570.

5. Roy, D. B., Chaki, R., & Chaki, N. (2010). BHIDS: A new, cluster based algorithm for black hole IDS. Security and Communication Networks, 3(2-3), 278-288.

6. Sharma, A., Sharma, P., Chaki, R., & Bhattacharya, U. (2014). Reducing call blocks in cellular network with non-uniform traffic conditions. Foundations of Computing and Decision Sciences, 39(4), 301-318.

7. Sinha, D., Bhattacharya, U., & Chaki, R. (2014). RSRP: A robust secure routing protocol in MANET. Foundations of Computing and Decision Sciences, 39(2), 129-154.

Peer-reviewed Conference Proceedings:

8. Bhattasali, T., & Chaki, R. (2011). A survey of recent intrusion detection systems for wireless sensor network

9. Bhattasali, T., Chaki, R., & Chaki, N. (2013). Study of security issues in pervasive environment of next generation internet of things

10. Bhattasali, T., Saeed, K., Chaki, N., & Chaki, R. (2014). A survey of security and privacy issues for biometrics based remote authentication in cloud

11. Das, A. K., & Chaki, R. (2011). A novel power-balanced routing scheme for WSN 12. Das, A. K., & Chaki, R. (2012). MERCC: Multiple events routing with congestion control for

WSN 13. Das, A. K., Chaki, R., & Biswas, A. (2013). Power aware cluster based routing (PACBR)

protocol for wireless sensor network 14. Dasgupta, S., & Chaki, R. (2011). SRPV: A speedy routing protocol for VANET 15. DasGupta, S., & Chaki, R. (2015). Trust-based routing for vehicular ad hoc network 16. Dasgupta, S., Chaki, R., & Choudhury, S. (2013). TruVAL: Trusted vehicle authentication

logic for VANET 17. Ghosh, A., Sahin, A., Silsarma, A., & Chaki, R. (2014). A new contention management

technique for obstruction free transactional memory 18. Mandal, S., & Chaki, R. (2012). A novel power balanced encryption scheme for secure

information exchange in wireless sensor networks 19. Nath, I., Chaki, R., & Chaki, N. (2010). WACA: A new weighted adaptive clustering

algorithm for MANET 20. Sinha, D., Bhattacharya, U., & Chaki, R. (2011). A novel distributed clustered approach

towards building an agent based routing topology for MANET 21. Sinha, D., Bhattacharya, U., & Chaki, R. (2013). Clar: A novel cluster oriented agent based

routing protocol for manet. Foundations of Computing and Decision Sciences, 38(1), 3-23. 22. Sinha, D., & Chaki, R. (2011). SRCHS - A stable reliable cluster head selection protocol 23. Roy, D. B., & Chaki, R. (2011). Detection of denial of service attack due to selfish node in

MANET by mobile agent

24. Roy, D. B., & Chaki, R. (2011). MABHIDS: A new mobile agent based black hole intrusion detection system

25. Saha, A., & Chaki, R. (2011). VAMI - A novel architecture for vehicular ambient intelligent system

26. Saha, S., & Chaki, R. (2013). A brief review of data mining application involving protein sequence classification

27. Saha, S., & Chaki, R. (2011). Cluster based mobility considered routing protocol for mobile ad hoc network

28. Saha, S., & Chaki, R. (2012). Hierarchical cluster based query-driven routing protocol for wireless sensor networks

29. Saha, S., & Chaki, R. (2012). Weighted energy efficient cluster based routing for wireless sensor networks

30. Sarkar, P., & Chaki, R. (2012). A cryptographic approach towards black hole attack detection 31. Sen, S., & Chaki, R. (2011). Handling write lock assignment in cloud computing environment 32. Bhattacharya, U., Chaki, R., Sikdar, B. K., & Chaki, N. (2002). Design of a scalable logical

topology for reliable optical communication. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON, , 2 1209-1212.

33. Bhattasali, T., & Chaki, R. (2012). BEAMS: Battery exhaustion anomaly monitoring system model in SENSORNET. Paper presented at the Proceedings of the International Conference on Sensing Technology, ICST, 709-713.

34. Bhattasali, T., Chaki, R., & Chaki, N. (2013). Secure and trusted cloud of things. Paper presented at the 2013 Annual IEEE India Conference, INDICON 2013,

35. Chaki, N., & Chaki, R. (2007). A scalable barrel shifter topology for all optical networks. Paper presented at the Proceedings of the 4th IASTED Asian Conference on Communication Systems and Networks, AsiaCSN 2007, 304-309.

36. Chaki, N., & Chaki, R. (2007). ORRP: Optimal reactive routing protocol for mobile ad-hoc networks. Paper presented at the Proceedings - 6th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2007, 185-190.

37. Chaki, R. (2010). Intrusion detection: Ad-hoc networks to ambient intelligence framework. Paper presented at the 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010, 7-12.

38. Chaki, R., & Chaki, N. (2007). IDSX: A cluster based collaborative intrusion detection algorithm for mobile ad-hoc network. Paper presented at the Proceedings - 6th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2007, 179-184.

39. Chaki, R., Chaki, N., & Bhattacharya, U. (2007). Performance evaluation of the scale-net: An optimal, irregular logical topology for all-optical networks. Paper presented at the Proceedings of the 4th IASTED Asian Conference on Communication Systems and Networks, AsiaCSN 2007, 310-315.

40. Chaki, R., & Niyogi, N. G. (2011). An improved scheme towards fast handover in a hierarchical mobile network. Paper presented at the 2011 30th URSI General Assembly and Scientific Symposium, URSIGASS 2011,

41. Chaki, R., & Sinha, D. (2008). LCRACO - A new load and congestion controlled routing based on ant colony optimization. Paper presented at the Proceedings of 11th International Conference on Computer and Information Technology, ICCIT 2008, 72-77.

42. Chaki, R., & Bhattacharya, U. (2000). Design of a new scalable topology for multihop optical networks. Paper presented at the IEEE Region 10 Annual International Conference, Proceedings/TENCON, , 2 II-482-II-486.

43. Chakrabarti, C., & Chaki, R. (2011). Improved cluster based route discovery algorithm for ad-hoc networks. Paper presented at the Proceedings of the 2011 International Conference on Communication and Industrial Application, ICCIA 2011,

44. DasGupta, S., & Chaki, R. (2009). AMOBIROUTE: An advanced mobility based ad hoc routing protocol for mobile ad hoc networks. Paper presented at the 1st International Conference on Networks and Communications, NetCoM 2009, 88-92.

45. Dutta, P., & Chaki, R. (2012). A survey of data mining applications in water quality management. Paper presented at the ACM International Conference Proceeding Series, 470-475.

46. Dutta, S., Chaki, R., & Chaki, N. (2006). Optimal reactive routing protocol (ORRP): A new reactive routing protocol for the shortest path in ad hoc networks. Paper presented at the 2006 Annual India Conference, INDICON,

47. Roy, D. B., & Chaki, R. (2013). MCBHIDS: Modified layered cluster based algorithm for black hole IDS. Paper presented at the 2013 Annual IEEE India Conference, INDICON 2013,

48. Roy, D. B., & Chaki, R. (2014). State of the art analysis of network traffic anomaly detection. Paper presented at the Proceedings - International Conference on 2014 Applications and Innovations in Mobile Computing, AIMoC 2014, 186-192.

49. Saha, S., Chaki, R., & Chaki, N. (2008). A new reactive secure routing protocol for mobile ad-hoc networks. Paper presented at the Proceedings - 7th Computer Information Systems and Industrial Management Applications, CISIM 2008, 103-108.

50. Saha, S. B., DasGupta, S., & Chaki, R. (2009). MOADRP: Mobile ad-hoc network routing protocol. Paper presented at the 5th International Conference on Wireless Communication and Sensor Networks, WCSN-2009, 124-128.

51. Sen, P., Chaki, N., & Chaki, R. (2008). HIDS: Honesty-rate based collaborative intrusion detection system for mobile ad-hoc networks. Paper presented at the Proceedings - 7th Computer Information Systems and Industrial Management Applications, CISIM 2008, 121-126.

52. Sharma, A., Chaki, R., & Bhattacharya, U. (2011). Applications of wireless sensor network in intelligent traffic system: A review. Paper presented at the ICECT 2011 - 2011 3rd International Conference on Electronics Computer Technology, , 5 53-57.

53. Sharma, A., Roy, A., Ghosal, S., Chaki, R., & Bhattacharya, U. (2012). Load balancing in cellular network: A review. Paper presented at the 2012 3rd International Conference on Computing, Communication and Networking Technologies, ICCCNT 2012,

54. Sinha, D., & Chaki, R. (2014). AESCRT: Agent enabled secure CRT based routing topology for MANET. Paper presented at the Proceedings - International Conference on 2014 Applications and Innovations in Mobile Computing, AIMoC 2014, 172-178.

55. Sinha, D., & Chaki, R. (2009). MALBACO - A new multi-agent load balanced ant colony optimization algorithm for MANETs. Paper presented at the 2009 World Congress on Nature and Biologically Inspired Computing, NABIC 2009 - Proceedings, 861-865.

56. Sinha, D., Chaki, R., & Bhattacharya, U. (2012). A secure routing scheme in MANET with CRT based secret sharing. Paper presented at the Proceeding of the 15th International Conference on Computer and Information Technology, ICCIT 2012, 225-229.

PUBLICATION LIST FOR AMLAN CHAKRABARTI (FROM SCOPUS) Journals:

1. Lin, C., Chakrabarti, A., & Jha, N. K. (2014). FTQLS: Fault-tolerant quantum logic synthesis. IEEE Transactions on very Large Scale Integration (VLSI) Systems, 22(6), 1350-1363.

2. Lin, C., Chakrabarti, A., & Jha, N. K. (2013). Optimized quantum gate library for various physical machine descriptions. IEEE Transactions on very Large Scale Integration (VLSI) Systems, 21(11), 2055-2068.

3. Lin, C., Chakrabarti, A., & Jha, N. K. (2014). QLib: Quantum module library. ACM Journal on Emerging Technologies in Computing Systems, 11(1)

4. Mandal, S. B., Chakrabarti, A., & Sur-Kolay, S. (2014). Quantum ternary circuit synthesis using projection operations. Journal of Multiple-Valued Logic and Soft Computing, 24(1-4), 73-92.

5. Mukherjee, J., Kundu, R., & Chakrabarti, A. (2014). Variability of cobb angle measurement from digital X-ray image based on different de-noising techniques. International Journal of Biomedical Engineering and Technology, 16(2), 113-134.

6. Patra, B., Chandak, N., & Chakrabarti, A. (2011). An efficient methodology for full chip signal electromigration analysis for advanced technology node designs. Journal of Low Power Electronics, 7(3), 420-425.

7. Singh, J. P., Dutta, P., & Chakrabarti, A. (2014). Weighted delay prediction in mobile ad hoc network using fuzzy time series. Egyptian Informatics Journal, 15(2), 105-114.

Peer-reviewed Conference Proceedings:

8. Guha, K., Sahani, R. R., Chakraborty, M., Chakrabarti, A., & Saha, D. (2015). Analysis of secret key revealing trojan using path delay analysis for some cryptocores

9. Kundu, R., Chakrabarti, A., & Lenka, P. (2015). Automated vertebral segmentation from CT images for computation of lumbolumbar angle

10. Maity, S., Chakrabarti, A., & Bhattacharjee, D. (2011). An innovative technique for adaptive video summarization

11. Mandal, S. B., Chakrabarti, A., & Sur-Kolay, S. (2012). A synthesis method for quaternary quantum logic circuits

12. Patra, B., Chattopadhyay, S., & Chakrabarti, A. (2012). A novel approach to voltage-drop aware placement in large SoCs in advanced technology nodes

13. Ray, A., & Chakrabarti, A. (2012). Design and implementation of affective E-learning strategy based on facial emotion recognition

14. Samanta, S., Paik, S., Gangopadhyay, S., & Chakrabarti, A. (2011). Processing of image data using FPGA-based MicroBlaze core

15. Sen, A. K., Mukherjee, S., & Chakrabarti, A. (2014). Satellite image fusion using window based PCA

16. Bhattacharjee, S., Sil, S., Basak, B., & Chakrabarti, A. (2011). Evaluation of power efficient adder and multiplier circuits for FPGA based DSP applications. Paper presented at the Proceedings of the 2011 International Conference on Communication and Industrial Application, ICCIA 2011,

17. Bhattacharjee, S., Sil, S., Dey, S., & Chakrabarti, A. (2011). Simulation, design and analysis of a low power MIMO-OFDM system and its implementation on FPGA. Paper presented at the 2011 International Conference on Recent Trends in Information Systems, ReTIS 2011 - Proceedings, 88-93.

18. Bhattacharyya, D., Chakrabarti, A., & Misra, S. (2007). Design and simulation of parallel algorithms for motion estimation. Paper presented at the Proceedings - 10th International Conference on Information Technology, ICIT 2007, 29-34.

19. Biswas, T., Pal, C., Mandal, S. B., & Chakrabarti, A. (2014). Audio de-noising by spectral subtraction technique implemented on reconfigurable hardware. Paper presented at the 2014 7th International Conference on Contemporary Computing, IC3 2014, 236-241.

20. Chakrabarti, A., Das, S., Ghosh, B., Adak, S., Panda, P. B., & Chattopadhyay, A. K. (2011). Developent of high creep resistant 50% grade alumina brick for anode baking furnace application. Paper presented at the Proceedings UNITECR 2011 Congress: 12th Biennial Worldwide Conference on Refractories - Refractories-Technology to Sustain the Global Environment, 203-205.

21. Chakrabarti, A., Lin, C., & Jha, N. K. (2012). Design of quantum circuits for random walk algorithms. Paper presented at the Proceedings - 2012 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2012, 135-140.

22. Chakrabarti, A., Sharma, N., Singh, K., Banik, P., Patwari, R., Bhattacharjee, S., . . . Kasari, P. R. (2012). Observer based state feedback control of DC machine. Paper presented at the 2012 1st International Conference on Power and Energy in NERIST, ICPEN 2012 - Proceedings,

23. Chakrabarti, A., & Sur-Kolay, S. (2008). Designing quantum adder circuits and evaluating their error performance. Paper presented at the 2008 International Conference on Electronic Design, ICED 2008,

24. Chakrabarti, A., & Sur-Kolay, S. (2007). Rules for synthesizing quantum boolean circuits using minimized nearest-neighbor templates. Paper presented at the Proceedings of the 15th International Conference on Advanced Computing and Communications, ADCOM 2007, 183-188.

25. Cogan, D., Chakrabarti, A., & Harvey, R. W. (1995). TLM algorithms for laplace and poisson fields in semiconductor transport. Paper presented at the Proceedings of SPIE - the International Society for Optical Engineering, , 2373 198-206.

26. Das, B., Chakrabarti, A., Kasari, P. R., & Sharma, N. (2013). Sensorless speed control of DC machine. Paper presented at the Proceedings of 2013 International Conference on Power, Energy and Control, ICPEC 2013, 572-577.

27. Das, R. K., De, A., Pal, C., & Chakrabarti, A. (2014). DSP hardware design for fingerprint binarization and thinning on FPGA. Paper presented at the International Conference on Control, Instrumentation, Energy and Communication, CIEC 2014, 544-549.

28. Ganguly, P., Roy, S., Biswas, T., Pal, C., & Chakrabarti, A. (2014). DSP hardware software co-design of audio de-noising algorithm. Paper presented at the International Conference on Control, Instrumentation, Energy and Communication, CIEC 2014, 672-677.

29. Ghosh, S., Goswami, S., & Chakrabarti, A. (2011). Outlier detection from ETL execution trace. Paper presented at the ICECT 2011 - 2011 3rd International Conference on Electronics Computer Technology, , 6 343-347.

30. Ghoshal, S., Chatterjee, P., Biswas, B., Chakrabarti, A., & Dey, K. N. (2013). A novel method for automatic image registration based on wavelet and near fuzzy set. Paper presented at the 2013 Annual IEEE India Conference, INDICON 2013,

31. Khanna, N., Nath, J., James, J., Chakrabarti, A., Chakraborty, S., & Nath, A. (2011). New symmetric key cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm. Paper presented at the Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011, 125-130.

32. Maity, S., Mandal, S. B., Pal, A., Chakrabarti, A., & Roy, T. (2010). Design of an efficient quantum circuit simulator. Paper presented at the Proceedings - 2010 International Symposium on Electronic System Design, ISED 2010, 50-55.

33. Mandal, S. B., Chakrabarti, A., & Sur-Kolay, S. (2014). Synthesis of ternary grover's algorithm. Paper presented at the Proceedings of the International Symposium on Multiple-Valued Logic, 184-189.

34. Mandal, S. B., Chakrabarti, A., & Sur-Kolay, S. (2011). Synthesis techniques for ternary quantum logic. Paper presented at the Proceedings - 41st IEEE International Symposium on Multiple-Valued Logic, ISMVL 2011, 218-223.

35. Misra, S., & Chakrabarti, A. (2007). An efficient approach to estimate velocity fields using optical flow and wavelet transform. Paper presented at the Proceedings of the 2007 International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 2007, 249-255.

36. Nath, A., Das, S., & Chakrabarti, A. (2010). Data hiding and retrieval. Paper presented at the Proceedings - 2010 International Conference on Computational Intelligence and Communication Networks, CICN 2010, 392-397.

37. Pal, C., Chaudhury, K. N., Samanta, A., Chakrabarti, A., & Ghosh, R. (2013). Hardware software co-design of a fast bilateral filter in FPGA. Paper presented at the 2013 Annual IEEE India Conference, INDICON 2013,

38. Paul, R., Saha, S., Sau, S., & Chakrabarti, A. (2012). Real time communication between multiple FPGA systems in multitasking environment using RTOS. Paper presented at the 2012 International Conference on Devices, Circuits and Systems, ICDCS 2012, 130-134.

39. Saha, S., Chakrabarti, A., & Ghosh, R. (2013). Exploration of multi-thread processing on XILKERNEL for FPGA based embedded systems. Paper presented at the Proceedings - 19th International Conference on Control Systems and Computer Science, CSCS 2013, 58-65.

40. Sau, S., Pal, C., & Chakrabarti, A. (2011). Design and implementation of real time secured RS232 link for multiple FPGA communication. Paper presented at the ACM International Conference Proceeding Series, 391-396.

41. Sau, S., Paul, R., Biswas, T., & Chakrabarti, A. (2012). A novel AES-256 implementation on FPGA using co-processor based architecture. Paper presented at the ACM International Conference Proceeding Series, 632-638.

42. Singh, J. P., Dutta, P., & Chakrabarti, A. (2012). Temporal characteristics of clustering in mobile ad hoc network. Paper presented at the ACM International Conference Proceeding Series, 255-261.

43. Som, A., & Chakrabarti, A. (2011). A new BSQDD approach for synthesis of quantum circuit. Paper presented at the Proceedings - 2011 International Symposium on Electronic System Design, ISED 2011, 212-216.

Annexure VI

BRIEF EXTRACT OF RESEARCH PROPOSED FOR NEW PHDS I. Requirements Engineering: The focus of this research is in the horizontal direction of

Requirements Engineering with applications and use cases from the Remote Healthcare Enterprise. The Requirements Specification and Analysis phase seems to be the most ambiguous phase of the System Development Life Cycle (SDLC). Formal models will ease the purpose of automating the code generation process of the SDLC from the analysis and subsequent design phases so that consistency is maintained and risks are mitigated. Further, formal models also help in checking for inconsistencies and non-conformance to company policies. Last, but not the least, models help designers in giving a graphical overview of the system. Graphical representations provide a better understanding to developers which help them in communicating with the Quality Assurance team or Code Testers during the Testing phase. The i* models proposed by Yu [1] is being studied at present. An i* model captures the requirements of the customer in an abstract, strategic, sequence-agnostic schema.

Work in Progress: Novarun Deb, one of the applicants is working towards developing i* models from requirement specifications and specifying the necessary formalisms. We avoid Natural Language Processing and consider a more restricted environment where requirements are specified using First Order Logic or Predicates. Given such a requirement specification, we propose rules that define structural constructs of i* models. The work has been published in [2].

In another ongoing effort, the same scholar is working on extraction of state transition models from i* models. The motivation behind this particular work was that i* models have been in existence since 1995 yet without any major impact on the industry. The most important factor for this is probably the sequence agnostic nature of i* model. This work is a conscious effort to bridge the gap between a sequence agnostic model like i* and a sequence aware modeling language like UML. Any standard business process model, like BPMN or Petri-Nets, cannot be captured without knowing the flow of control and/or data within the system. In this research, our aim is to generate Labeled Kripke Structures from a given i* model. It is quite intuitive to realize that, since an i* model is sequence agnostic, there can be different permutations of the order in which model elements are processed during execution. All these permutations may not be valid; but we will always get a set of state transition models corresponding to a given i* model. The work has been communicated in [3].

Fidelity of Hierarchic i* model decompositions is another sub-area of research. The interesting thing here is to realize that there usually exists an employee hierarchy on the system developer side. The abstract view of the enterprise varies as we move through the hierarchy. As we move higher up the hierarchy, the abstraction increases and vice-versa. The higher levels of the employee hierarchy usually consist of the Managers, CEOs, CFOs, VPs, etc. These employees are agnostic to the design details of the enterprise architecture. Consider the i* representation of the enterprise obtained from the lower levels of the hierarchy consisting of system engineers, code developers, and architects. The question that arises is whether these different i* representations for users at different levels are consistent and if these maintain the fidelity of the enterprise architecture being designed. The same scholar plans to establish a mappings between i* models obtained from different levels of the hierarchy and defining hierarchic decomposition rules for checking the fidelity of such decompositions. Once i* representations obtained from successive levels of the hierarchy can be mapped as envisaged, then we can check the consistency of i* models throughout the hierarchy. The highest level i* model should derive the lowest level i* model by undergoing a series of such hierarchic decompositions. This work is currently in progress.

II. Medical Image Processing for Dental and other Diseases: Biomedical imaging is the application of engineering methods to detect and visualize the biological processes in our body. Medical imaging is very helpful for the physician to measure, diagnose, treat and even imagine about the medical illness, conditions and treatment. This technique helps the doctor to see inside the body without making an incision. Basically it is a standard modern medical care for cancer, stroke, heart disease, trauma, neurological disorders and many more. Nowadays, it is used by a wide range of medical specialist from oncologists to robotic surgery.

With regard to Medicare’s Sustainable Growth Rate (SGR) formula imaging services grew 4.9 percent per year faster than the other technique [4]. According to the National Electrical Manufacturer Association of USA, 2.6 percent people were shifted to the imaging services.

Work in Progress: Soma Datta, one of the applicants is working towards design and development of a bio-medical image processing system towards early detection and classification of patient data for Tooth decay Monitoring system including teeth caries, gum disease, mouth ulcer property detection system etc. Dental caries is a bacterial disease of teeth caused by acid, carbohydrates and it destroys the enamel and dentine. The effective dentistry suggests that to identify the disease at early stage so that they can prevent the caries lesion progression and reduce the risk factor associated with it. Periodic monitoring and treatment is essential to observing and preventing the growth of the caries. It is difficult for a busy dentist to keep track and progress of each dental caries, gum disease etc. Her objective is to assist dentists to monitor the teeth decay, follow-up the progress report after applying some new kind of treatment.

We are planning to design an alternate inexpensive system to monitor the teeth decay. Some work has been done on image segmentation [5, 6] by scholars from the same group working with the same supervisor, Prof. Nabendu Chaki. Soma plans to build on this on foundation and develop a system that will be portable and telemedicine compatible. It can keep track of the progress of the affected area of a tooth. Proposed system will store previous records of the patient. It will use special segmentation technique to reduce the storage requirement and hence this will also reduce the bandwidth in case of telemedicine. Optical image based caries monitoring system is advantageous for doctor to monitor the size of the caries. The proposed method is not injurious to health and it is completely safe for the children and pregnant ladies. Thus, the research aims to build a new, safe and low cost dental caries early prediction method that describes a technique based on optical images of teeth that are filtered and caries lesions are extracted followed by tooth region segmentation. The main goal of this research work is to find the exact caries lesion of affected teeth at early stage that assist dentist for better follow-up and diagnosis.

However, once the primary target is achieved, the research outcome on medical image processing can be extended for other purposes. This include detection of patches in mouth that may lead to cancer, aid in Dental Cosmetic Surgery, Gum Disease or Gingivitis detection system, and Dental biometry based on RGB images. The work is in progress.

III. Smart Grid Computing: A smart power grid [7] is an intelligent electricity network that integrates

the actions of all users connected to it and makes use of advanced information, control, and communication technologies to save energy, reduce cost and increase reliability and transparency.

The backbone of the Smart Grid will be its network. This network will connect the different components of the Smart Grid together, and allow two-way communication between them. Networking the components together will introduce security risks into the system.

Two-way communication has the potential to create a new avenue for cyber attacks to reach the bulk power system and cause serious damage to this critical infrastructure by way of a customer’s smart meters and other grid-connected smart technology. An attacker who gained access to the

communication channels could order metering devices to disconnect customers, order previously shed load to come back on line prematurely, or order dispersed generation sources to turn off during periods when load is approaching generation capacity, causing instability and outages on the bulk power system. Thus to prevent these kinds of attacks we need to secure the routing protocols in smart grid networks and also implement some robust intrusion detection system for a second line of defense.

Also the smart meters are one of the weakest links in smart grid security chain. Smart meters may be used by hackers as entry points into the broader power system. Hackers could hack into smart meters to take command and control of the AMI (Advanced Metering Infrastructure), allowing a mass manipulation of services to homes and businesses.

One of the main challenges of connecting IPv6 with Smart grid will be address configuration [8, 9]. Identifying a new IPv6 address configuration schema customized for smart grid is another area of study. The proposed schema needs to be consistent with the demands of large, dynamic, hierarchical smart grid network. The schema would improve accessibility and scalability in terms of configuring a huge number of devices in the smart grid, thereby, fully extracting the potential of 128-bit IPv6 addressing mode.

Work in Progress: Manali Chakrabarti, one of the applicants is working towards securing the future smart grid. With the huge number of devices including the smart electrical appliances, increasingly being used in homes, IPv6 become an obvious choice for smart grid for its bandwidth. An early work on this is published in FedCSIS 2014 held in Warsaw, Poland [7].

Besides security, several novel computing issues are associated with smart power grid. Dynamic distribution of power based on changing demands of users subscribed to smart grid is another interesting and much-awaited research aspect. The same scholar is also keeping this within her research scope.

IV. Pervasive Computing and Remote Healthcare: This is an emerging area of research involving

wireless networks, distributed computing and remote care for ailing patients as well as remote monitoring of patients. Remote pervasive care involves several challenges such as security of health data stored in cloud, proper scheduling to achieve the best possible remote allocation of nurse, communication between wearable sensor band to the remote health center, etc.

Nurse scheduling in remote healthcare has been considered under the situation wherein the external ambience impacts on the scheduling inside the hospital, the number of urgent patients increases too much. In any emergency condition it becomes Unconstraint situation when no hospital restriction is imposed on the scheduling.

This research work considers the situation when number of remote emergency patients (ce) become higher than the total number of the current critical patient (cc) and current normal patients (nc) inside the hospital. The demand of the hospital requires assigning available and part-time nurses to the increased number of patients. In this high demand place, we may consider an indirect coding based on the permutations of the nurses and a heuristic decoder (hybrid crossover operator) that builds schedule from these permutations. The term, “indirect coding” implies that the solutions are not directly obtained from the individual solution or chromosomes, rather its obtained from the heuristic decoder. The major challenge is to select the heuristic decoder, and the crossover operator on solution. The indirect algorithm is flexible as the GA can remain unchanged if the problem changes.

Work in Progress: Paramita Sarkar, one of the applicants has done some initial work in this area [10]. The problem of remote monitoring of pregnant women in rural areas has also been considered.

The research aims to develop a framework to provide continuous monitoring in a non-invasive manner to the rural women who have very low chance of visiting the health center located far away.

V. Biometrics and Networks Security: Privacy of data stored for ubiquitous applications is a major concern in any remote framework. There are three separate security aspects to it. These are information or data security in the data mart, securing data during transmission, i.e., network security and remote user authentication. User authentication based on biometric features is often considered more reliable than the traditional means of password authentication as biometric traits cannot be lost or forgotten and unlike conventional passwords or authentication keys, biometric signatures are very difficult to copy and share. Thus, biometric techniques provide a solution to ensure that the desired services are accessed only by a legitimate user and no one else.

A number of biometric characteristics have been used for different applications [11]. Biometric traits include fingerprint, hand shape, finger shape, palm-print, finger vein pattern, iris, retina, face, ear shape, teeth, voice, gait, keystroke, signature, body odor, brain wave, ECG, nail surface etc. Each biometric trait has its strengths and weaknesses, and the choice depends on the application. However, in current state of maturity, one of the major challenges of biometric authentication is its rather lower level of accuracy. The false positive and false negatives either block access to legitimate users or grant access to unauthorized users. Beside this, session of valid users can be hijacked by impostor if the authentication is only one-time at the beginning of each session. We consider continuous or semi-continuous authentication, where user is verified repeatedly throughout the lifetime of session.

Biometric authentication though typing pattern analysis is a valid method for identity verification. Typing pattern is a behavioral nature which can be used to identify users uniquely by utilizing the rhythm and manner in which an individual types characters on a keyboard [12]. Patterns show sufficiently distinct information that can be used for either identification or verification. Several studies show that a person’s typing pattern show sufficiently distinct information that can be used for identification and authentication [12]. Use of keystroke detects the typing pattern of an individual by using only standard keyboard and simple software.

Besides user authentication, securing data over heterogeneous networking platform is another major challenge. A group of M. Tech. students and PhD scholars are quite active over last few years and published significant results on intrusion detection and response systems for wireless, ad-hoc and sensor networks [14, 15, 16, 17].

The evolution of communication standards targeted at radio frequency (RF) applications has changed the perception of wireless technologies for sensor networks. IEEE 802.11 networks fulfill the requirements for data services in a local area. IEEE 802.15 standard family is developed for the wireless WPAN. These standards define the physical and MAC layers of WPAN. The IEEE 802.15.4 is a standard that details the physical layer and media access control (MAC). ZigBee (IEEE 802.15.4) compliant wireless devices are expected to transmit within 10–75 m. IEEE 802.16 aims to serve the broadband wireless access in metropolitan area networks. WiMAX is the commercialization of the maturing IEEE 802.16 standard. IEEE 802.11s defines a secure password-based authentication and key establishment protocol between the peers. There are many more in the list of standards. Keeping in pace with this varied standards and protocols that are in use today coupled with the fact that ad-hoc networks are built without any centralized control, securing a hybrid network is indeed a challenge. The broad objective of the scholars working in this area is to secure the next-generation networks.

Work in Progress: A couple of M. Tech. students and one PhD scholar funded from an ITRA project are working on key-stroke based remote user authentication [13]. We plan to apply our work in remote health framework as a case study to check whether patients’ health records could be accessed by only valid caregivers or not. Currently, the proposed techniques are being tried in a

health kiosk set-up at Barha, a remote village in Birbhum district in West Bengal. The real-life data from the kiosk where multiple care-givers are using the same hardware will help to study the performance of the proposed schema.

References

1. E.Yu, “Modelling Strategic Relationships for Process Reengineering”, Ph.D. Thesis, Dept. of Computer Science, University of Toronto, 1995.

2. Novarun Deb, Nabendu Chaki, “Verification of i* Models for Existential Compliance Rules in Remote Healthcare Systems”, Proceedings of the International Conference on Applications and Innovations in Mobile Computing (AIMoC 2014), February 27 – March 1, 2014, Kolkata, India.

3. Novarun Deb, Nabendu Chaki, Aditya Ghose, “Extracting State Transition Models from i* Models”, Communicated to the Journal of Systems and Software, SI: COMPSAC, Elsevier.

4. Smith, Cynthia, et al. "Health spending growth slows in 2003." Health Affairs, vol. 24(1), pp 185-194, 2005.

5. Soharab Hossain Shaikh, Nabendu Chaki; “A New Image Binarization Method using Iterative Partitioning”; Springer Journal on Machine Vision and Applications; vol. 24(2), pp. 337-350, Feb. 2013. ISSN: 0932-8092. DOI: 10.1007/978-3-642-36071-8_20.

6. Ayan Dey, Soharab Hossain Shaikh, Khalid Saeed, Nabendu Chaki; "Modified Majority Voting Algorithm towards Creating Reference Image for Binarization"; Proceedings of the Second International Conference on Advanced Computing, Networking and Informatics (ICACNI-2014) Springer Smart Innovation, Systems and Technologies Series; pp. 221-227, Vol. 27, 2014. ISBN: 978-3-319-07352-1. DOI: 10.1007/978-3-319-07353-8_26

The paper is short-listed for extended version publication in Special Issue (SI) of Springer Central European Journal of Computer Science.

7. Manali Chakraborty, Agostino Cortesi and Nabendu Chaki; "A New Intrusion Prevention System for Protecting Smart Grids from ICMPv6 Vulnerabilities"; IEEE proceedings of the 3rd International Workshop on Smart Energy Networks & Multi-Agent Systems, Warsaw, Poland, Sep. 2014.

8. NIST Special Publication 1108R2 - NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 2.0, National Institute of Standards and Technology (NIST) Std., February 2012.

9. X. N. Wang, H.Y. Qian, “An IPv6 address configuration scheme for wireless sensor networks”, Computer Standards & Interfaces, pp. 334–341, vol. 34 (3), 2012.

10. Paramita Sarkar, Ditipriya Sinha; “An Approach to Continuous Pervasive Care of Remote Patients Based on Priority Based Assignment of Nurse”; Proceedings of 13th IFIP TC8 International Conference, CISIM 2014, Ho Chi Minh City, Vietnam, November 5-7, 2014 CISIM 2014. pp. 327-338, ISBN: 978-3-662-45236-3.

11. X. Huang, Y. Xiang, A. Chonka, J. Zhou, and R. H. Deng, “A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems”, IEEE Transactions on Parallel and Distributed Systems, vol. 22(8), August 2011.

12. A. A. Ahmed and I. Traore, “Biometric Recognition Based on Free-Text Keystroke Dynamics”, IEEE Transactions on Cybernetics, vol. 44(4), April 2014.

13. Tapalina Bhattasali, Khalid Saeed, Nabendu Chaki, Rituparna Chaki; “Bio-Authentication for Layered Remote Health Monitor Framework” Journal of Medical Informatics and Technologies, Poland, pp. 131-140, vol. 23, November 2014. ISSN: 1642-6037.

14. Nabendu Chaki, Rituparna Chaki, “Intrusion Detection in Wireless Ad-Hoc Networks”; CRC Press,

Taylor & Francis Group, 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, Florida 33487, U.S.A, January 2014. ISBN: 978-14-665-1565-9.

15. Novarun Deb, Manali Chakraborty, Nabendu Chaki; “CORIDS: a cluster-oriented reward-based intrusion detection system for wireless mesh networks”; Wiley Journal of Security and Communication Networks, pp. 532–543, vol. 7(3), Mar. 2014. ISSN: 1939-0122.

16. Debdutta Barman Roy, Rituparna Chaki, Nabendu Chaki; “BHIDS: A New Cluster Based Algorithm for Black Hole IDS”; Wiley Journal of Security and Communication Networks; SI on Security in Mobile Wireless Networks, pp. 278-288, vol. 3(2-3), Mar. 2010. ISSN: 1939-0122. DOI=10.1002/sec.144

17. Sunirmal Khatua, Nandini Mukherjee, Nabendu Chaki; “A New Agent Based Security Framework for Collaborative Cloud Environment”; ACM ICPS Proceedings of Cyber Security and Information Intelligence Research Workshop (CSIIRW-7), Oak Ridge, USA, Oct 12-14, 2011. ISBN: 978-1-4503-0945-5.