{"id":598,"date":"2015-06-04T13:28:16","date_gmt":"2015-06-04T07:58:16","guid":{"rendered":"http:\/\/demo.renderbit.com\/iem-group\/college-of-engineering\/?page_id=598"},"modified":"2019-02-24T21:05:12","modified_gmt":"2019-02-24T15:35:12","slug":"paper-publications","status":"publish","type":"page","link":"https:\/\/staging.uem.edu.in\/uem-kolkata\/department-of-cse\/paper-publications\/","title":{"rendered":"Paper Publications"},"content":{"rendered":"<h3>Journal<\/h3>\n<p><strong>2012<\/strong><br \/>\n1. Moutushi Singh, Rupayan Das &#8220;Survey of Different techniques to Detect wormhole attack in wireless sensor Network&#8221; International Journal of Scientific &amp; Engineering Research (IJSER), ISSN 2229-5518,pp:200-205, Volume 3, Issue 10,October-2012<\/p>\n<p><strong>2013<\/strong><br \/>\n2. T. Chatterjee and M. K Sarkar, &#8220;Sixth Sense Technology Has Potential to Become the Ultimate &#8220;Transparent&#8221; User Interface for Accessing Information about Everything Around Us&#8221;, International Journal of Report and Opinion, ISSN: 1553-9865, Vol. 5, Issue 4, pp:1-7, ISSN: April 2013.<br \/>\n3. Mr. Kaushik Banerjee, Mr. Subhas Das, Mr. Rahul Sourav Singh,Mr. Souren Jana &#8220;Automated Mineral Detection using Sonar Waves&#8221;, International of Scientific &amp; Engineering Research(IJSER),ISSN: 22295518, Volume 4,Issue 5, pp.112-115, May,2013<br \/>\n4. M. K Sarkar and T. Chatterjee, &#8220;Reverse Engineering: An Analysis of Dynamic Behavior of Object Oriented Programs by Extracting UML Interaction Diagram&#8221;, International Journal of Computer Technology &amp; Applications, ISSN: 2229-6093, Vol. 4, Issue 3, pp. 378 -383, May-June 2013.<br \/>\n5. M. K Sarkar, T. Chatterjee and D. Mukherjee, &#8220;Reverse Engineering: An Analysis of Static Behavior of Object Oriented Programs by Extracting UML Class Diagram&#8221;, International Journal of Advanced Computer Research, ISSN: 2249-7277, Vol. 3, Issue 12, Sept. 2013.<\/p>\n<p><strong>2014<\/strong><br \/>\n6. M. K Sarkar and T. Chatterjee, &#8220;Enhancing Data Storage Security in Cloud Computing Through Steganography&#8221;, ACEEE International Journal on Network Security, ISSN: 2152-5064, Vol. 5, Issue. 1, pp: 13-19, Jan 2014.<br \/>\n7. Rahul Sourav Singh,Rupayan Das, Dipta Mukherjee,Prannay Bothra , &#8220;RDR cube cipher an extension to Vignere Cipher&#8221;,IOSR Journal of Computer Engineering(IOSR-JCE) e-ISSN:2278-0661,p-ISSN:22788727 Volume 16, Issue 2, Ver. III(Mar-Apr.2014),PP 64-71.<br \/>\n8. Kaustab Pal,Rupayan Das,Rahul Sourav Singh, Dipta Mukherjee,&#8221;A Steganographic Approach to Data Obfuscation using Random Keyboard Mapping Technique&#8221;International Journal of Computer Applications 105(11):35-37,DOI: 10.5120\/18424-9742,November 2014.<br \/>\n9. Praveen Kumar Sharma, Sourav Saha, Saraswati Kumari -&#8220;Study and Design of a Shannon-Energy-Envelope based Phonocardiogram Peak Spacing Analysis for Estimating Arrhythmic Heart-Beat&#8221;,International Journal of Scientific and Research Publications- Volume 4, Issue 9, September 2014 Edition.<\/p>\n<p>10. Wrishin Sarkar, Himadri Nath Saha, Arpita Ghosh, Praveen Kr. Sharma-&#8221; Modified Greedy Methodology to Solve Travelling Salesperson Problem Using Ant Colony Optimization and Comfort Factor&#8221;- International Journal of Scientific and Research Publications- Volume 4, Issue 10, October 2014 Edition.<br \/>\n11. Wrishin Sarkar, Himadri Nath Saha,Sourav Kumar Dhar, Sandipan Roy &#8220;Advanced Heuristic Technique For Solving Travelling Salesperson Problem Using Ant Colony Optimization&#8221;, IJCSN International Journal of Computer Science and Network, Volume 3, Issue 3,ISSN: 2277-5420,pp.11 June 2014.<\/p>\n<p><strong>2015<\/strong><br \/>\n12. M. K Sarkar, R. Das and Dr. V S Dhaka &#8220;A Symmetric Key Based Framework for Data Security in Cloud Computing&#8221;, International Journal of Advanced Networking and Applications, ISSN: 0975-0282 Special Issue, Feb-2015.<br \/>\n13. T Chatterjee, M. K Sarkar and Dr. V S Dhaka &#8220;Steganographic Approach to Ensure Data Storage Security in Cloud Computing Using Huffman Coding (SAHC)&#8221;, IJCSN International Journal of Computer Science and Network, ISSN : 2277-5420, Volume 4, Issue 2, pp:198-207, April 2015.<\/p>\n<p><strong>2016<\/strong><br \/>\n16. Ratul Dey and Himadri Nath Saha &#8220;Secure Routing Protocols for Mobile Ad-Hoc Network (MANETs) \u00e2\u20ac\u201cA Review&#8221;, International Journal of Emerging Trends &amp; Technology in Computer Science (IJETTCS), Vol. 5, Issue 1 ISSN 2278 \u00e2\u20ac\u201c 6856 February 2016<\/p>\n<h3>CONFERENCE<\/h3>\n<p><strong>2013<\/strong><br \/>\n1. Dipta Mukherjee, Anandarup Mukherjee, Somen Nayak &#8220;A Hybrid Stegano- Cryptographic Approach to Data Obfuscation Using LSB Technique&#8221;, IEMCON, ISSN: 978-81-923777-9-7, 165-169, August 2013.<\/p>\n<p><strong>2014<\/strong><br \/>\n2. Anindya Shankar Shukla,Rupayan Das,Rahul Sourav Singh, Dipta Mukherjee &#8220;Bar Cipher: A Robust technique for data hiding using the concept of Barcode&#8221;, Proceedings of 1st International Science &amp; Technology Congress 2014,Elsevier publication,ISBN: 9789351072485.<br \/>\n3. Ratul Dey, Sanjay Chakraborty, Lopamudra Dey, &#8220;Weather Forecasting using Convex Hull &amp; K-mean Technique an Approach&#8221; in proc. of ELSEVIER, IEM CONGRESS &#8211; 2014, pp. 288-295<\/p>\n<p><strong>2015<\/strong><br \/>\n4. M. K Sarkar and R. Das, Dr. V S Dhaka &#8220;A Symmetric Key Based Framework for Data Security in Cloud Computing &#8220;, in National Conference on Current Research Trends in Cloud Computing &amp; Big Data &#8211; CRTCCBD on Feb 6-7, 2015.<\/p>\n<p>5. M. Singh, R. Das, M. K Sarkar, K. Majumder, S. K Sarkar&#8221; KT3F: A Key based Two Tier Trust Management Filtering Scheme for Intrusion Detection in Wireless Sensor Network&#8221; in International Conference on Computer and Communication Technologies &#8211; IC3T on July 24-26, 2015, AISC series of Springer 11156.<\/p>\n<p>6. Angshuman Khan,Souvik Saha,Asmita Chakraborty,Rupayan Das,&#8221;Digital Multiplier to Multiply Special Integers using ancient Vedic Mathematics&#8221;,International Conference on Inter Disciplinary Research in Engineering and Technology 2015 (ICIDRET 2015).<\/p>\n<p>7. Angshuman Khan,Rupayan Das,&#8221;Novel Approach of Multiplier Design using ancient Vedic Mathematics&#8221;,Second International Conference on Information systems Design and Intelligent Applications(INDIA-2015),Springer series of Advances in Intelligent Systems and Computing(AISC) Volume-340,pp.265-272,DOI:10.1007\/978-81-322,247-7_28,January,2015.<\/p>\n<p>8. Ratul Dey, Sanjay Chakraborty, &#8220;Convex-hull &amp; DBSCAN clustering to predict future weather&#8221; in proc. of 6th International Conference and Workshop on Computing and Communication (IEMCON -2015), IEEE Xplore Digital Library, October 2015 , pp. 1-8.<\/p>\n<p>9. Saptarshi Banerjee, Arnab Majumdar, Himadri Nath Saha and Ratul Dey &#8220;Modified Ant Colony Optimization (ACO) based routing protocol for MANET,&#8221; in proc. of 6th International Conference and Workshop on Computing and Communication (IEMCON -2015), IEEE Xplore Digital Library, October 2015 , pp. 1-7.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journal 2012 1. Moutushi Singh, Rupayan Das &#8220;Survey of Different techniques to Detect wormhole attack in wireless sensor Network&#8221; International Journal of Scientific &amp; Engineering Research (IJSER), ISSN 2229-5518,pp:200-205, Volume 3, Issue 10,October-2012 2013 2. T. Chatterjee and M. K Sarkar, &#8220;Sixth Sense Technology Has Potential to Become the Ultimate &#8220;Transparent&#8221; User Interface for Accessing &hellip; <a href=\"https:\/\/staging.uem.edu.in\/uem-kolkata\/department-of-cse\/paper-publications\/\">Continued<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":451,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-598","page","type-page","status-publish","hentry","wpautop"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Paper Publications - UEM Kolkata<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Paper Publications - UEM Kolkata\" \/>\n<meta property=\"og:description\" content=\"Journal 2012 1. Moutushi Singh, Rupayan Das &#8220;Survey of Different techniques to Detect wormhole attack in wireless sensor Network&#8221; International Journal of Scientific &amp; Engineering Research (IJSER), ISSN 2229-5518,pp:200-205, Volume 3, Issue 10,October-2012 2013 2. T. Chatterjee and M. K Sarkar, &#8220;Sixth Sense Technology Has Potential to Become the Ultimate &#8220;Transparent&#8221; User Interface for Accessing &hellip; Continued\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.uem.edu.in\/uem-kolkata\/department-of-cse\/paper-publications\/\" \/>\n<meta property=\"og:site_name\" content=\"UEM Kolkata\" \/>\n<meta property=\"article:modified_time\" content=\"2019-02-24T15:35:12+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/staging.uem.edu.in\\\/uem-kolkata\\\/department-of-cse\\\/paper-publications\\\/\",\"url\":\"https:\\\/\\\/staging.uem.edu.in\\\/uem-kolkata\\\/department-of-cse\\\/paper-publications\\\/\",\"name\":\"Paper Publications - UEM Kolkata\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/staging.uem.edu.in\\\/uem-kolkata\\\/#website\"},\"datePublished\":\"2015-06-04T07:58:16+00:00\",\"dateModified\":\"2019-02-24T15:35:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/staging.uem.edu.in\\\/uem-kolkata\\\/department-of-cse\\\/paper-publications\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/staging.uem.edu.in\\\/uem-kolkata\\\/department-of-cse\\\/paper-publications\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/staging.uem.edu.in\\\/uem-kolkata\\\/department-of-cse\\\/paper-publications\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/staging.uem.edu.in\\\/uem-kolkata\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer Science and Engineering (CSE ) College in Kolkata\",\"item\":\"https:\\\/\\\/staging.uem.edu.in\\\/uem-kolkata\\\/department-of-cse\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Paper Publications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/staging.uem.edu.in\\\/uem-kolkata\\\/#website\",\"url\":\"https:\\\/\\\/staging.uem.edu.in\\\/uem-kolkata\\\/\",\"name\":\"UEM Kolkata\",\"description\":\"University of Engineering and Management Kolkata\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/staging.uem.edu.in\\\/uem-kolkata\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Paper Publications - UEM Kolkata","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Paper Publications - UEM Kolkata","og_description":"Journal 2012 1. Moutushi Singh, Rupayan Das &#8220;Survey of Different techniques to Detect wormhole attack in wireless sensor Network&#8221; International Journal of Scientific &amp; Engineering Research (IJSER), ISSN 2229-5518,pp:200-205, Volume 3, Issue 10,October-2012 2013 2. T. Chatterjee and M. K Sarkar, &#8220;Sixth Sense Technology Has Potential to Become the Ultimate &#8220;Transparent&#8221; User Interface for Accessing &hellip; Continued","og_url":"https:\/\/staging.uem.edu.in\/uem-kolkata\/department-of-cse\/paper-publications\/","og_site_name":"UEM Kolkata","article_modified_time":"2019-02-24T15:35:12+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/staging.uem.edu.in\/uem-kolkata\/department-of-cse\/paper-publications\/","url":"https:\/\/staging.uem.edu.in\/uem-kolkata\/department-of-cse\/paper-publications\/","name":"Paper Publications - UEM Kolkata","isPartOf":{"@id":"https:\/\/staging.uem.edu.in\/uem-kolkata\/#website"},"datePublished":"2015-06-04T07:58:16+00:00","dateModified":"2019-02-24T15:35:12+00:00","breadcrumb":{"@id":"https:\/\/staging.uem.edu.in\/uem-kolkata\/department-of-cse\/paper-publications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.uem.edu.in\/uem-kolkata\/department-of-cse\/paper-publications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/staging.uem.edu.in\/uem-kolkata\/department-of-cse\/paper-publications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/staging.uem.edu.in\/uem-kolkata\/"},{"@type":"ListItem","position":2,"name":"Computer Science and Engineering (CSE ) College in Kolkata","item":"https:\/\/staging.uem.edu.in\/uem-kolkata\/department-of-cse\/"},{"@type":"ListItem","position":3,"name":"Paper Publications"}]},{"@type":"WebSite","@id":"https:\/\/staging.uem.edu.in\/uem-kolkata\/#website","url":"https:\/\/staging.uem.edu.in\/uem-kolkata\/","name":"UEM Kolkata","description":"University of Engineering and Management Kolkata","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.uem.edu.in\/uem-kolkata\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/staging.uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/pages\/598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/staging.uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/staging.uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/comments?post=598"}],"version-history":[{"count":7,"href":"https:\/\/staging.uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/pages\/598\/revisions"}],"predecessor-version":[{"id":7336,"href":"https:\/\/staging.uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/pages\/598\/revisions\/7336"}],"up":[{"embeddable":true,"href":"https:\/\/staging.uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/pages\/451"}],"wp:attachment":[{"href":"https:\/\/staging.uem.edu.in\/uem-kolkata\/wp-json\/wp\/v2\/media?parent=598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}