http://newcialisonline.net/

Dr. Pranam Paul

Dr. Paul had completed MCA in 2005. Then my carrier had been started as an academician from MCKV Institute of Technology, Liluah. Parallely, At the same time, he continued my research work. At October, 2006, National Institute of Technology (NIT), Drgapur had agreed to enroll my name as a registered Ph.D. scholar. Then he had joined Bengal College of Engineering and Technology, Durgapur. After that Dr. B. C. Roy Engineering College hired him in the MCA department at 2007. At the age of 30, he had got Ph.D. from National Institute of Technology, Durgapur, West Bengal. he had submitted his Ph.D. thesis only within 2 Years and 5 Months. After completing the Ph.D., he had joined Narula Institute of Technology in Computer Application Department and also acted as Head of the Department from 2011 to till his last day at Narula Institute of Technology. 

Department of Computer Applications, Narula Institute of Technology, Agarpara had got autonomy during his headship while Narula Institute of Technology had also got NAAC. From the 2017 January, Dr Pranam Paul has associated with The Neotia University. During his engagement in academic and non academic, he is continuing his research work in different areas. For that, he has 75 International Journal Publications among 90 accepted papers in different areas. He is also reviewer of International Journal of Network Security (IJNS), Taiwan and International Journal of Computer Science Issue (IJCSI); Republic of Mauritius.

 

Email: This email address is being protected from spambots. You need JavaScript enabled to view it.

Achievement:


⦁ Accepted my name for publication in “Who’s Who Science and Engineering, 2011 – 2012” published by “Marquis Who’s Who”, USA on 31st Dec 2010
⦁ Selected his name as “Top 100 Engineers’ 2011”, by “International Biographical Center”, Chambridge, England
⦁ Selected his name as “Outstanding 2000 Intellectuals of the 21st Century, 2012”, by “International Biographical Center”, Cambridge, England


Research expertise


⦁ Information Security
⦁ Data Security
⦁ Network Security
⦁ Application Security
⦁ Steganography
⦁ Cloud Security
⦁ Image Processing
⦁ General Communication Protocol for differently able people (Handicap)
⦁ Data Structure
⦁ Computer Graphics


⦁Research publications (if any)


⦁ “A Private-Key Storage-Efficient Ciphering Protocol for Information Communication Technology”; Accepted and Published in Proceedings “National Seminar on Research Issue in Technical Education -2006 (RITE – 2006)”, 8th and 9th March, 2006, pp 149 – 160
⦁ “An Enhancement of Information Security Using Substitution of Bits Through Prime Detection in Blocks”, ; Accepted and Published in Proceedings “National Conference on Recent Trends in Information System -2006 (ReTIS – 2006)”, CSE Dept. Jadavpur University, 14th and 15th July 2006, pp 61 – 64
⦁ “Development of a Space-Efficient Cryptographic Protocol”; Accepted and Published in Proceedings “National Conference on Recent Trend in Intelligent Computing (RTIC – 06)”, 17th to 19th November 2006, pp 205 – 211
⦁ “Development of a Cryptographic Protocol to Enhance Information Security”, ; Accepted and Published in Proceedings “National Conference on Resent Trends in Information Systems & Management (RTISM-06)”, 16th & 17th December 2006, pp 176 – 187
⦁ “An Enhancement of Network Security using High Performance Computing”; Accepted and Published in National Journal, “The Bulletin of Engineering and Science”, Vol. 1 No. 2, 2006, pp 48 – 53
⦁ “Ensuring Information Security through a 491-Bit Storage-Efficient Substitution-Based Block Cipher of Bit-Level Implementation”; Accepted and Published in Proceedings “International Conference on Information Technology (INTL-INFOTECH 2007)”, ISSN – 0973 – 6824, 19th to 21st March 2007, pp 95 – 99
⦁ “An Attempt to ascertain Security of Information through a Non Boolean-based Storage-Efficient Private-Key Block Cipher”; Accepted and Published in Proceedings “International Conference on Information Technology (INTL-INFOTECH 2007)”, ISSN – 0973 – 6824, 19th to 21st March 2007, pp 72 – 75
⦁ “An Evolutionary approach in Developing Efficient Ciphering System”; Accepted and Published in Proceedings “International Conference on Information Technology (INTL-INFOTECH 2007)”, ISSN – 0973 – 6824, 19th to 21st March 2007, pp 111 – 116
⦁ “A Comparative Analysis for Evaluation of Two Block-Ciphers of Bit-Level Implementation”; Accepted and Published in Proceedings “National Conferences on Emerging Trends in Information Technology (ITCON’07)”, 16th & 17th August 2007, pp 8 – 13
⦁ “Ensuring Information Security through a 512-Bit Storage-Efficient Substitution-Based Block Cipher of Bit-Level Implementation”; Accepted and Published in National Journal, “The Vision”, April – June, 2007, Volume – III; No. – 2, Bengal University and Science University (Formerly known as BE College), Shibpur, pp 69 – 73
⦁ “An Approach to ensure Security through Bit-level Encryption with Possible Lossless Compression”; Accepted and Published in “International Journal of Computer Science and Network Security”, Vol. 08 No. 2, ISSN 1738 – 7906, IJCSNS, South Korea, pp 291 – 299
⦁ “Enhancement of Security through an Efficient Substitution-based Block Cipher of Bit-level Implementation with Possible Lossless Compression”; Accepted and Published in “International Journal of Computer Science and Network Security”, Vol. 08 No. 4, ISSN 1738 – 7906, IJCSNS, South Korea, pp 318 – 326
⦁ “Develop a 64-bit Private Key Ciphering Protocols to Enhance Data Security through Cryptography”; Accepted and Published in Proceedings “4th National Conference on Machine Intelligence (NCMI-2008)”, 22nd and 23rd August 2008, pp 191 – 196
⦁ “Development of Cryptographic Protocol, reduced Transmission-Overhead”; Accepted and Published in National Journal, “The Bulletin of Engineering and Science”, ISSN 0974-7176
⦁ “Encryption through Block Substitution through Sequential Position in Set of Distinct Blocks” ; Accepted and Published in International Journal “Advance Modeling; A General Mathematic”; Published by “Association for Advancement of Modeling & Simulation Technique in Enterprises”, AMSE, France; Year of Publication: 2009; Vol. 46, No 1 – 2
⦁ “Incorporating a Realistic View of Existing Binary Tree in Computer Memory”; Accepted and Published in “International Journal of Emerging Technologies and Applications in Engineering, Technology and Science (IJ-ETA-ETS)”; Issue: Jan, 2010; ISSN : 0974 – 3588, pp 181 – 185
⦁ “Conversion of a Checked and Valid Mathematical Expression between their Different Modes with Minimum Overhead”; Accepted and Published “International Journal of Emerging Technologies and Applications in Engineering, Technology and Science (IJ-ETA-ETS)”; Issue: Jan, 2010; ISSN : 0974 – 3588; pp 176 – 180
⦁ “Postfix to any Equivalent Conversion with Minimum Overhead” Accepted for Publication in “International Journal of Emerging Technologies and Applications in Engineering, Technology and Science (IJ-ETA-ETS)”; Issue: Jan, 2010; ISSN : 0974 – 3588; pp 186 – 189
⦁ “GOOGLY - A Cryptographic Algorithm based on Mathematical Representation of Transfer Function of a Discrete Time System”; Accepted and Published in “International Journal of Computer Science and Network Security (IJCSNS)”; ISSN 1738 – 7906; Vol. 9  No. 10; pp. 216-219
⦁ “An Application to ensure Security through Bit-level Encryption”; Accepted and Published in “International Journal of Computer Science and Network Security (IJCSNS)”; ISSN 1738 – 7906; Vol. 9  No. 11; pp. 228-233
⦁ “Implementation of Creation of Binary Tree from the Inorder and Preorder Traversal & Display of Existing Binary Tree in Computer Memory”; Accepted and Published in “International Journal of Emerging Technologies and Applications in Engineering, Technology and Science (IJ-ETA-ETS)”; Issue: Jan, 2010; ISSN : 0974 – 3588; Manuscript Number: 1172; pp 346 – 350
⦁ “Prime Number Algorithm: A Cryptographic Algorithm Using Representation of Prime Numbers”; Accepted and Published in “International Journal of Emerging Technologies and Applications in Engineering, Technology and Science (IJ-ETA-ETS)”; Issue: Jan, 2010; ISSN : 0974 – 3588; Manuscript Number: 2-1-2009-1162; pp 301 – 304
⦁ “Cryptographic Algorithm based on Mathematical Substitution by Number Property”; Accepted and Published in “International Journal of Emerging Technologies and Applications in Engineering, Technology and Science (IJ-ETA-ETS)”; Issue: Jan, 2010; ISSN : 0974 – 3588; Manuscript Number: 2-1-2009-1163; pp 305 – 308
⦁ “Prefix to any Equivalent Conversion with minimum Overhead”; Accepted and Published in “MID Journal of Computer Application and Business Administration”; ISSN No.: 0974-3332
⦁ “Derivation of Postorder form Directly from Preorder and Inorder form without using Binary Tree” Accepted and Published in “International Journal of Computer Applications in Engineering, Technology and Sciences (IJ-CA-ETS)”; April ’10 – Sept ’10; Volume 2, Issue 2; ISSN No. : 0974-3596; pp 009-012
⦁ “Incorporating a Newly developed library function to clear the screen partly in C compiler”; Accepted and Published in “International Journal of Computer Applications in Engineering, Technology and Sciences (IJ-CA-ETS)”; April ’10 – Sept ’10; Volume 2, Issue 2; ISSN No. : 0974-3596; pp 359-361
⦁ “Direct Detection of Uniquely Identified Key Attribute from Set of Functional Dependencies for a Relation”; Accepted and Published in “International Journal of Computer Applications in Engineering, Technology and Sciences (IJ-CA-ETS)”; April ’10 – Sept ’10; Volume 2, Issue 2; ISSN No. : 0974-3596; pp 362-365
⦁ “Implementation of Network Security through a newly Developed Private Key Cryptographic Protocol”; Accepted and Published in “International Journal of Computer Applications in Engineering, Technology and Sciences (IJ-CA-ETS)”; April ’10 – Sept ’10; Volume 2, Issue 2; ISSN No. : 0974-3596; pp 319-321
⦁ “Development of a Private Key Cryptographic Protocol to incorporate Network Security”; Accepted and Published in “International Journal of Computer Applications in Engineering, Technology and Sciences (IJ-CA-ETS)”; April ’10 – Sept ’10; Volume 2, Issue 2; ISSN No. : 0974-3596; pp 372-374
⦁ “Development of Private Key Technique to Implement Network Security with minimum Overhead during the Transmission”; Accepted and Published in “International Journal of Computer Applications in Engineering, Technology and Sciences (IJ-CA-ETS)”; April ’10 – Sept ’10; Volume 2, Issue 2; ISSN No. : 0974-3596; pp 322-324
⦁ “Implementation of conversion from one database to another database”; Accepted and Published in “International Journal of Emerging Technologies and Applications in Engineering Technology and Sciences (IJ – ETA – ETS)”; July ’10 – Dec ’10, Volume 3 : Issue 2; ISSN No.: 0974-3588 pp 355-357
⦁ “Enhancement of Security through a Cryptographic Algorithm based on Mathematical Representation of Natural Numbers”; Accepted and Published in “International Journal of Computer and Electrical Engineering (IJCEE)”; Vol. 2, No. 5; October 2010; ISSN Print: 1793-8163. ISSN Online: 1793-8198; pp 856 – 859
⦁ “Implementation of Block based Data Encryption at Bit – Level”; Accepted for Publication in “International Journal of Computer Science and Network Security (IJCSNS)” ISSN 1738 – 7906; Vol. 11 No. 2; pp 18 – 23
⦁ “Implementation of Information Security based on Common Division”; Accepted and Publication in “International Journal of Computer Science and Network Security (IJCSNS)”; ISSN 1738 – 7906; Vol. 11 No. 2; pp 51 – 53
⦁ “Development of Private Key Technique for Secured Data Transmission based on Modular Arithmetic”; Accepted and Published in “International Journal of Computer Applications in Engineering, Technology and Sciences (IJ-CA-ETS)”; April ’11 – Sept ’11; ISSN : 0974-3596; pp 174 – 176
⦁ “Development of Private Key Technique to Ensure Information Security based on Square Calculation”; Accepted and Published in “International Journal of Computer Applications in Engineering, Technology and Sciences (IJ-CA-ETS)”; April ’11 – Sept ’11; ISSN : 0974-3596; pp 177 – 178
⦁ “Design a Human Computer Interface using Laser Track Pad (LTP) for the Physically Challenged People” published in the proceedings of “IEEE International Conference on Communication and Industrial Application (ICCIA-2011)” organized by Narula Institue of Technology, Kolkata along with IEEExplore; 26th to 28th December 2011
⦁ “Inclusion of Scroll Bars and Shortcut Icons: Improvement of the Laser Track Pad (LTP) for the Physically Challenged People”, Accepted for Publication in the “International Journal of Research and Reviews in Computer Science (IJRRCS)”; Vol. 3, No. 3, March 2012; ISSN No. : 2079 – 2557, pp 1606
⦁ “Coordination between Various Aircrafts through Swarm Technology and the Concept of Distributed OS to reduce the Collision and Hijacking without Disconnecting with ATC”; Accepted and Published in “International Journal of Frontier Computing”; Vol.: 1, No.: 1; March, 2012, pp 79 – 84
⦁ “Block Based Cryptographic Protocol Depending on G.C.D. for Secured Transmission”; Accepted and Published in “International Journal of Computational Intelligence and Information Security (IJCIIS)”; Vol-3, No-3; March 2012, ISSN No: 1837-7823 ; pp 32-37
⦁ “A Cryptographic Protocol Developed by Cyclic Manner for information Security”; Accepted and Published in “International Journal of Computational Intelligence and Information Security (IJCIIS)”; Vol-3, No-3 ; ISSN No: 1837-7823 ; pp 15-20
⦁ “Development of Transmission Overhead Reducing Protocol”; Accepted and Published in “International Journal on Computer Science and Technology (IJCST)”; Vol. 3 No.2; ISSN  No: 0976 – 8491 (Online) ; ISSN No : 2229 – 4333 (Print); pp 422 - 425
⦁ “Implementing Information Security depending on Plain Text” ; Accepted and Published in “International Journal on Computer Science and Technology (IJCST)”; Vol. 3 Issue.2; ISSN  No: 0976 – 8491 (Online) ; ISSN No : 2229 – 4333 (Print); pp 406
⦁ “Cryptographic protocol Depending on Biometric Authentication”; accepted and published in “International Journal of Engineering Science and Technology (IJEST)”; ISSN No. 0975-5462; Vol. 5 No.02; February 2013; pp-354-358.
⦁ “Fingerprint Geometry matching by Divide and Conquer Strategy” accepted and published in “International Journal of Advanced research in Computer Science (IJARCS)”; ISSN No. 0976-5697; Volume 4, No. 4; March-April 2013; pp 179 – 183
⦁ “Matching of Fingerprint Geometry by Advanced Divide and Conquer Technique”; accepted and published in “International Journal of Advanced research in Computer Science (IJARCS)”; ISSN No. 0976-5697;, Volume 4, No. 4; March-April 2013, pp 337 – 343
⦁ “Cryptographic Technique Using Biometric Authentication”; accepted for publication in “International Journal of Computer Information System (IJCIS)”; ISSN No.2229-5208; Vol 6 No. 5; May 2013
⦁ “Bit Level Cryptographic Technique Using Biometric Authentication”; accepted for publication in “International Journal of Computer Information System (IJCIS)”; ISSN No.2229-5208; Vol 6 No. 5; May 2013
⦁ “Partitioned Based Cryptography Using Fingerprint Geometry” accepted for publication in “International Journal of Computer Information System (IJCIS)”, ISSN No.2229-5208; Vol 6 No. 5; May 2013
⦁ “Imparting semantic web based E-Learning in Education System: A Survey” Accepted and Publication “International Journal of Engineering Research and Technology (IJERT)”; ISSN: 2278- 0181; Vol 2, Issue 1, January 2013; pp 1 – 4
⦁ “Game Based e-Learning Methodology in Imparting Software Engineering Education”; Accepted and Published in proceedings of “7th National Conference; Computing for National Development, INDIACom-2013”;7th and 8th March’ 2013; ISBN 978-93-80544-06-9 and ISSN 0973-7529;
⦁ “Block Based Data Encryption and Description using a Cyclic Operation”; Accepted and Published in “International Journal of Advance in Computer Science and Technology (IJACST)”; Vol. 3, No. 4; ISSN NO. 2320 – 2603; April 2014; pp 283 - 287
⦁ “Encryption a Block uses Parvalay Algorithm”; Accepted and Published in “International Journal of Advance in Computer Science and Technology (IJACST)”; Vol. 3, No. 4; ISSN NO. 2320 – 2603; April 2014; pp 288 – 292
⦁ “A Cryptography Algorithm Using the Operations of Genetic Algorithm & Pseudo Random Sequence Generating Functions”; Accepted and Published in “International Journal of Advance in Computer Science and Technology (IJACST)”; Vol. 3, No. 5; ISSN NO. 2320 – 2603; May 2014; pp 325 – 330
⦁ “Cryptographic Technique Using Biometric Authentication”; Accepted and Published in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; Impact Factor: 4.447; Vol.: 2; Issue: 9; September 2014; ISSN No. (Print): 2320 – 9798; ISSN No (Online): 2320 – 9801
⦁ “Block based Data Encryption and Decryption using Algorithmic Operations”; Manuscript No CIIT-IJ-5667; Accepted and Published in “CiiT International Journal of Networking and Communication Engineering”; Impact Factor 1.953; ISSN (Print): 0974 – 9713 & ISSN (Online): 0974 – 9616; February’ 2015; pp 69 – 73
⦁ “Block based Data Encryption and Decryption using Algorithmic Operations”; Manuscript No CIIT-IJ-5668; Accepted and Published in “CiiT International Journal of Networking and Communication Engineering”; Impact Factor 1.953; ISSN (Print): 0974 – 9713 & ISSN (Online): 0974 – 9616; February’ 2015; pp 74 – 78
⦁ “Block based Cryptographic Protocol using Sequence of Rearrangement of Points”; Manuscript No CIIT-IJ-5712; Accepted and Published in “CiiT International Journal of Networking and Communication Engineering”; Impact Factor 1.953; ISSN (Print): 0974 – 9713 & ISSN (Online): 0974 – 9616; March’ 2015l; pp 95 – 98
⦁ “Implementing the Information Security using Factors of Number”; Manuscript No CIIT-IJ-5713; Accepted and Published in “CiiT International Journal of Networking and Communication Engineering”; Impact Factor 1.953; ISSN (Print): 0974 – 9713 & ISSN (Online): 0974 – 9616; March’ 2015; pp 99 – 102
⦁ “Block based Data Encryption and Decryption using Number System Logic”; Manuscript No CIIT-IJ-5876; Accepted and Published in “CiiT International Journal of Networking and Communication Engineering”; Impact Factor 1.953; ISSN (Print): 0974 – 9713 & ISSN (Online): 0974 – 9616; May 2015; pp 175 - 180
⦁ “Block based Cryptographic Protocol with Arithmetic Operations”; Manuscript No CIIT-IJ-5887; Accepted and Published in “CiiT International Journal of Networking and Communication Engineering”; Impact Factor 1.953; ISSN (Print): 0974 – 9713 & ISSN (Online): 0974 – 9616; May 2015; pp 212 – 215
⦁ “Cryptographic Algorithm Based on Triangular Form”; Manuscript No CIIT-IJ-5878; Accepted and Published in “CiiT International Journal of Networking and Communication Engineering”; Impact Factor 1.953; ISSN (Print): 0974 – 9713 & ISSN (Online): 0974 – 9616; May 2015; pp181 – 185
⦁ “An Approach to Block Ciphering Using Root of Perfect Square Number”; Manuscript No CIIT-IJ-5879; Accepted and Published in “CiiT International Journal of Networking and Communication Engineering”; Impact Factor 1.953; ISSN (Print): 0974 – 9713 & ISSN (Online): 0974 – 9616; May 2015; pp 186 – 192
⦁ “Block Based Data Encryption And Decryption Using the Distance Between Prime Numbers”; Manuscript No CIIT-IJ-5880; Accepted and Published in “CiiT International Journal of Networking and Communication Engineering”; Impact Factor 1.953; ISSN (Print): 0974 – 9713 & ISSN (Online): 0974 – 9616; May 2015; pp 193 – 199
⦁ “Block Cipher Encryption based on Random Substitution”; Manuscript No. CIIT-IJ-5881; Accepted and Published in “CiiT International Journal of Networking and Communication Engineering”; Impact Factor 1.953; ISSN (Print): 0974 – 9713 & ISSN (Online): 0974 – 9616; May 2015; pp 200 – 205
⦁ “Implementation of Data Migration between Two Different Databases for discrete table”; Paper ID: V40202104; Accepted and Published in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; ISSN No: 2320-9801 (Online), 2320-9798 (Print); Vol 4, Issue: 1; Feb 2016; pp 2144 – 2147
⦁ “Implementation of Data Migration between Two Different Databases for inter connected tables”; Paper ID: V40202106; Accepted for Publication in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; ISSN No: 2320-9801 (Online), 2320-9798 (Print) ); Vol 4, Issue: 1; Feb 2016; pp 2148 – 2154
⦁ “Implementing Cryptography on the Concept of Returning Back Its Own Nest of a Bird”; Paper ID: V40202097; Accepted for Publication in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; ISSN No: 2320-9801 (Online), 2320-9798 (Print) ); Vol 4, Issue: 1; Feb 2016; pp 2235 – 2241
⦁ “Approach based on finding the difference between consecutive numbers”; Paper ID: V40202098; Accepted for Publication in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; ISSN No: 2320-9801 (Online), 2320-9798 (Print) ); Vol 4, Issue: 1; Feb 2016; pp 2250 – 2256
⦁ “An approach to block based ciphering using bit wise calculation for representation of a number using its corresponding perfect square number and position of prime number”; Paper ID: V40202099; Accepted for Publication in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; ISSN No: 2320-9801 (Online), 2320-9798 (Print) ); Vol 4, Issue: 1; Feb 2016; pp 2242 – 2249
⦁ “Implementation of Security through hiding the Data within an Image with the help of Least Significant Bit replacement”; Paper ID: V40202130; Accepted for Publication in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; ISSN No: 2320-9801 (Online), 2320-9798 (Print) ); Vol 4, Issue: 1; Feb 2016; pp 2264 – 2271
⦁ “Conversion of Entire Structure of Database from SQL SERVER to MS Access”; Paper ID: V40505138; Accepted and Published in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; ISSN No: 2320-9801 (Online), 2320-9798 (Print); Vol 4, Issue: 5; May 2016; pp 9179 – 9185
⦁ “Data Migrating with Foreign Key Concept from ORACLE to SQL SERVER”; Paper ID: V40505138A; Accepted and Published in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; ISSN No: 2320-9801 (Online), 2320-9798 (Print); Vol 4, Issue: 5; May 2016; pp 9186 – 1992
⦁ “Implementation of Data Migration between SQL Server to ORACLE”; Paper ID: V40505138B; Accepted and Published in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; ISSN No: 2320-9801 (Online), 2320-9798 (Print); Vol 4, Issue: 5; May 2016; pp 9179 – 918
⦁ Implementing Data Security with an Approach Based On the Transformation of a Matrix with Rows and Columns”; Accepted and Published in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; ISSN No: 2320-9801 (Online), 2320-9798 (Print); Vol 4, Issue: 5; May 2016; pp 9193 – 9200
⦁ “Implementing a Cryptographic Protocol based on movement of Coin in Carom”; Accepted and Published in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; ISSN No: 2320-9801 (Online), 2320-9798 (Print); Vol 4, Issue: 5; May 2016; pp 9355 - 9342
⦁ “Implementing Data Security by Representing the Line of a Figure in nth Dimension” Accepted and Published in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; ISSN No: 2320-9801 (Online), 2320-9798 (Print); Vol 4, Issue: 5; May 2016; pp 9295 – 9302
⦁ “Developing a Cryptography Protocol Depending on the Concept of Playing Football”; Accepted and Published in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; ISSN No: 2320-9801 (Online), 2320-9798 (Print); Vol 4, Issue: 5; May 2016; pp 9257 – 9265
⦁ “Developing all Possible Library Function on Linked List to Enhancement of C Compiler”; Accepted and Published in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; ISSN No: 2320-9801 (Online), 2320-9798 (Print); Vol 4, Issue: 5; May 2016; pp 9559 – 9566
⦁ “Appending Stack and Queue to Enhancement of C Compiler”; Accepted and Published in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; ISSN No: 2320-9801 (Online), 2320-9798 (Print); Vol 4, Issue: 5; May 2016; pp 9303 – 9310
⦁ “Implementing all Possible Matrix Operations as Library Function to Enhancement of C Compiler”; Accepted and Published in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; ISSN No: 2320-9801 (Online), 2320-9798 (Print); Vol 4, Issue: 5; May 2016; pp 9287 – 9294
⦁ “Conversion of Data along with Entire Structure of Referential Tables between ORACLE to MS Excel”; Paper ID: V40707212; Accepted and Published in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; ISSN No: 2320-9801 (Online), 2320-9798 (Print); Vol 4, Issue: 7; July 2016; pp 13681-13688;
⦁ “Implementation to convert Data along with Entire Structure of a Discrete Table between ORACLE to MS Excel”; Paper ID: V40707213; Accepted and Published in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; ISSN No: 2320-9801 (Online), 2320-9798 (Print); Vol 4, Issue: 7; July 2016; pp 13686-13691 ;
⦁ “Developing all Possible Library Function on Sorting and Searching to Enhancement of C Compiler”; Manuscript No.: CIIT-IJ-6779; Accepted for Publication in “CiiT International Journal of Networking and Communication Engineering”; Print: ISSN 0974 – 9713 & Online: ISSN 0974 – 9616
⦁ “Conversion of Data along with Entire Structure of Referential Tables between SQL SERVER to MS-EXCEL”; Paper ID: V40909012; Accepted and Published in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; Impact Factor: 6.577; ISSN No: 2320-9801 (Online), 2320-9798 (Print); Vol 4, Issue: 9; September 2016; PP:16201-16208.
⦁ “Implementation to convert Data along with Entire Structure of a Discrete Table between SQL Server to MS Excel”; Paper ID: V40909045; Accepted and Published in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; Impact Factor: 6.577; ISSN No: 2320-9801 (Online), 2320-9798 (Print); Vol 4, Issue: 9; September 2016; pp:16209 – 16214.
⦁ Implementation of Security through hiding the Data within an Image using bytes of padding”; Paper ID: V41010731; Accepted and Published in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; Impact Factor: 6.577; ISSN No: 2320-9801 (Online), 2320-9798 (Print); Vol. 4, Issue: 10, October 2016; pp 18039 – 18046
⦁ “Implementing the Information Security using Modified RSA Algorithm with the Help of N Prime Numbers”, Accepted and Published in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; Impact Factor: 6.577; ISSN No: 2320-9801 (Online), 2320-9798 (Print); Vol. 4, Issue: 10, October 2016; pp: 18055 – 18062
⦁ “Development of Application to Recognise Hand Written Digit at run time”; Accepted and Published in “International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)”; Impact Factor: 7.194; ISSN No: 2320-9801 (Online), 2320-9798 (Print); Vol. 6, Issue: 11, November 2018; pp: 9001 – 9008
⦁ “An Approach of Solutions for a Vulnerable Website through Penetration Testing”; Paper ID: JETIR1812704; Registration ID: JETIR193699; Accepted and Publication in UGC Recognized Journal, “International Journal of Emerging Technologies and Innovative Research (JETIR)”; Impact Factor: 5.87; ISSN No. :2349-5162; Volume 5 ; Issue 12 ; Published on Dec 2018; pp: 18 - 29
⦁ “Efficient Cryptographic Protocol with Continuous Chaining and XOR”; Communicated in “International Journal of Engineering Research and Applications (IJERA)” ; ISSN No: 2248-9622;
⦁ “Implementing Network Security through New Proposed Technique at Bit-Level” ; Communicated in “International Journal of Engineering Research and Applications (IJERA)” ; ISSN No: 2248-9622
⦁ “Creation of a Helping Tools for Syntactical Analysis for Infix Expression”; Communicated in Journal “The Bulletin of Engineering and Science”, ISSN 0974-7176
⦁ “Implementation of Creation of Binary Tree from the Inorder and Preorder Traversal”; Under the process of reviewing in Journal “The Bulletin of Engineering and Science”, ISSN 0974-7176
⦁ “An attempt to ENHANCE the SECURITY THROUGH GRAPHICAL IMPLEMENTATION OF LARGE VOLUMES OF DATA”; Communicating in “International Journal of Network Security (IJNS)”; ISSN 1816-353X (Print), ISSN 1816-3548 (Online); Manuscript No. : IJNS-2009-10-31-3.

Research Grants (if any):


Sanjukta Pal, Pranam Paul; “A Solution towards Big Data Storage and Data management for Efficient Data Handling in Secured File System Based Cloud Environment through Services”; under the process of review in WOS – B, Department of Science and Technology (DST), Govt. of India; Temporary Registration Number : TPN / 23547; Submitted on 8th November 2018; Amount of the Project: Rs 20, 73,500.00

Research Patent Filing:

Pal Sanjukta, Dubey Anshuk, Paul Pranam; “A SYSTEM AND METHOD FOR BIG DATA STORAGE AND DATA MANAGEMENT IN SECURED CLOUD ENVIRONMENT THROUGH SERVICES”; Apply for the Indian patent Indian; Patent Application Number 201731036305 dated October 12, 2017;

Summary of List of Publications and Patent Filing

Sl. No. Categories Communicating Papers Accepted Papers
1 International Journal 3 75
2 National Journal 2 4
3 International Conference 0 4
4 National Conference 0 7
5 Patent Filing 1 0
Total Research Papers 5 90
Total Patent Filing 1 0
Total Research Project 1 (Rs 20, 73,500.00, DST) 0

List of Books Publication:

Computer Programming”; ISBN No. : 978 – 81 – 923034 – 3 – 7; 1st Edition, 2011; Publishers: SPS Education India Pvt. Ltd., A – 17, Malancha Ppost Office; Kolkata 700081; www.spseducation.com

Get In Touch

  • City Office: Monday - Friday: 11:00 AM - 6:00 PM
  • Saturday (1st, 3rd, 5th) - 11:00 AM - 6:00 PM
  • Campus: Monday - Friday 10AM - 4PM
  • Phone: +91 9831730966 / +91 916 361 0909
  • Email: contact@tnu.in

Subscribe Our Newsletter

Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…