| While Visiting Durgapur in Last November |
December 01, 2011
Arrival of my Sweet Little Niece
November 14, 2011
Invitation for Active Participation
It is my pleasure to share with you all that I am a Member of Programme Committee, 3rd International Conference on Computer Science and Information Technology (CSIT) to be held on January 15, 2012, in the North-Eastern Indian city of Guwahati (http://www.interscience.ac.in/Guwahati/CSIT/csit.html).
This is for your information that I am a Member of Technical Committee in International Conference on Computer Application, 2012 (ICCA 2012) to be held in Pondicherry, INDIA during 27-31 January, 2012 (http://www.icca.org.in/techcom.html).
This is for your further information that I am a Member of Advisory Committee in International Conference on Advanced Computing & Communication Technologies, 2012 (ACCT12) to be held in Rohtak on JAN 7-8, 2012 (http://rgsociety.org/acct12/comm/advcomm.html).
On behalf of each of these events, I strongly invite for active participation to researchers reading my Blog.
September 28, 2011
Invitation for Research Papers
I strongly invite researchers to share their innovative work through research papers to be communicated to IJIST, IJACSA, IJISMRD, IJMCAR, IJERA and IJMER, based on my association as Member of respective Editorial Boards of these popular Journals. Also, based on my involvement in different honorary positions with associations like ASDF, IACSIT, CRSI and IAENG, I like to invite for papers to Conferences organized by these reputed associations.
August 17, 2011
Regional Director - WB, ASDF
August 10, 2011
Recent Engagements with Some Associations
June 22, 2011
Research Plan in Supervisory Level
TO DEVELOP AND IMPLEMENT NEW PUBLIC-KEY CIPHERS: Because of its wider acceptability, public-key cryptography has been a striking area for research and innovation for last several years. Based on a study on all public-key ciphers developed so far, it is targetted to design, develop and implement a set of new such ciphers.
TO DEVELOP AND IMPLEMENT NEW SECURITY TOOLKITS USING STEGANOGRAPHY COMBINING WITH CRYPTOGRAPHY: Cryptography and steganography being two independent strong areas in the process of incorporating security to transmitted data, a merged process combining these two aspects will have a definite impact. Although a lot of work already has taken place in this regard, still there is scope to have a further research in this combined aspect.
TO DEVELOP AND IMPLEMENT NEW APPROACHES ON COST/EFFORT ESTIMATION IN SYSTEM DEVELOPMENT: This is a striking area for research in the field of software engineering. It can include observing and analyzing all the existing approaches to develop some efficient approaches. This can be accomplished in consultation with a professional system analyst engaged in software industry.
TO CONCEPTUALIZE AND IMPLEMENT NEW MODELS FOR SYSTEM DEVELOPMENT: This can be accomplished in collaboration with people professionally engaged in software development. Such a work will include detailed analysis of all existing models that are directly or indirectly used in software industries, and considering all merits and pitfalls, developing a complete solution.
A Few Words More
Already, though only in informal level, a few willing and energetic persons are in touch with me with their efforts to pursue their work in any of my chosen fields. Furthermore, potential candidates of any age with requisite qualification to pursue higher studies with reasonably good innovative qualities in any of these fields and sound writing skill in correct English may directly mail a self-written Research Proposal to me. On assessing the same, further action from my side can be taken. Ultimately, at the most, one or two will be accepted as my upcoming scholar(s). Kindly avoid calling me over phone for this issue. My Mail-ID is furnished in this site. Use that ID only for your communication with me.
May 21, 2011
News of Registration of My Second Scholar
Under the joint guidance of Prof. (Dr.) Goutam Sanyal (Internal Guide) of National Institute of Technology, Durgapur and myself (External Guide), Sabyasachi Samanta has very recently been registered as a Part-time Research Scholar for Ph. D. in NIT-Durgapur. After my first scholar, Pranam Paul was awarded in 2010, Sabyasachi Samanta is only my second scholar. On behalf of both of his guides, I wish him a very successful completion of his research in the area related to Digital Watermarking and Steganography leading to the degree of Ph. D.
May 11, 2011
ICCA 2012
May 03, 2011
Pre-Registration Seminar of 2nd Scholar
Sabyasachi Samanta, my 2nd scholar for Ph. D. is going to present a Seminar on 04-05-2011 in presence of a Panel of Examiners of NIT-Durgapur. A successful seminar will result in his Registration as a Part-time Research Scholar in NIT-Durgapur. His Seminar is entitled, A NOVEL APPROACH TO ENHANCE SECURITY OF DATA USING INVISIBLE DIGITAL WATERMARKING TAGGED WITH ENCRYPTION.
March 26, 2011
On my New Book
March 16, 2011
Probable Registration of My Second Scholar
Having considered a satisfactory level of progress in the research work of Sabyasachi Samanta, my second Ph.D. scholar, an initiative has been taken by me of late to register him in NIT-Durgapur under my external supervision.
The name of his Internal Supervisor will be disclosed in time.
