Publications

 
 

2021 Publications

  • Borah P., Bhattacharyya D. K. & Kalita J. K. Cost Effective Method for Ransomware Detection: An Ensemble Approach. Proceeding of the International Conference on Distributed Computing and Internet Technology. Springer. Cham. 2021


2020 Publications

  • Baishya R. C. & Bhattacharyya D. K. Singleton Flow Traceback (SFT) Mechanism. Proceeding of third ISEA International Conference on Security and Privacy. IIT Guwahati, 2020.

  • Chowdhury H. A, Ahmed H. A, Bhattacharyya D. K. & Kalita J. K. NCBI: A Novel Correlation Based Imputing Technique Using Bi-clustering. Proceeding of 2nd International Conference on Computational Intelligence in Pattern Recognition. Kolkata, 2020.

  • Deka R. K., Kalita K. P., Bhattacharyya D. K. & Boro D. A Smart Feature Reduction Approach to Detect Botnet Attack in IoT. Proceeding of International Conference EGTET-2020 , Guwahati, 2020.

  • Devi M., Sarma N. & Deka S.K. Multi-Winner Heterogeneous Spectrum Auction Mechanism for Channel Allocation in Cognitive Radio Networks. Proceeding of 16th International Conference on Distributed Computing and Internet Technology (ICDCIT-2020). Odisha, 2020.

  • Devi M., Sarma N. & Deka S. K. DAMW: Double Auction Multi-Winner Framework for Spectrum Allocation in Cognitive Radio Networks. Proceeding of 20th International Conference on Innovations for Community Services (I4CS 2020). Odisha, 2020.

  • Hoque N, Ahmed H. A. & Bhattacharyya D. K, Empirical Analysis of Proximity Measures in Machine Learning. Proceeding of 2nd International Conference on Computational Intelligence in Pattern Recognition. Kolkata, 2020.

  • Kalita K. P, Boro D. & Bhattacharyya D. K. Implementation of Minimally Shared Block-chains using Big Data Applications. Proceeding of 3rd ISEA International Conference on Security and Privacy. IIT Guwahati, 2020.

  • Kalita S. & Bhattacharyya D. K. Secure: An Effective Smartphone Safety Solution. Proceeding of 2nd International Conference on Computational Intelligence in Pattern Recognition. Kolkata, 2020.

  • Sarmah U., Bhattacharyya D. K. & Kalita J. K. XSSD: A Cross-site Scripting Attack Dataset and its Evaluation. Proceeding of 3rd ISEA International Conference on Security and Privacy. IIT Guwahati, 2020.

  • Borah P., Bhattacharyya D. K. & Kalita J. K. Malware Dataset Generation and Evaluation. Proceeding of the 2020 IEEE 4th Conference on Information & Communication Technology (CICT). Chennai. 2020

  • Deka S. K., Goswami S. & Anand A. A Blockchain Based Technique for Storing Vaccination Records. IEEE Bombay Section Signature Conference (IBSSC). Mumbai. 2020

  • Pathak D. K., Kalita S. K. & Bhattacharya D. K. Classification of Hyperspectral Image using Ensemble Learning methods: A comparative study. Proceeding of the IEEE 17th India Council International Conference (INDICON). New Delhi. 2020

  • Patowary P. & Bhattacharyya D. K. Crucial Gene Identification for Esophageal Squamous Cell Carcinoma Using Differential Expression Analysis. Proceeding of the International Conference on Machine Learning, Image Processing, Network Security and Data Sciences. Silchar, India. 2020



2019 Publications

  • Ahmed S. A. & Nath B. A Survey on FP-Tree Based Incremental Frequent Pattern Mining, International Conference on Biologically Inspired Techniques in Many-Criteria Decision Making . Odisha, 2019.

  • Baishya R. C., Sarmah R. & Bhattacharyya D. K. Improving Co-expressed Gene Pattern Finding Using Gene Ontology. Proceeding of International Conference on Biologically Inspired Techniques in Many-Criteria Decision Making. Odisha, 2019.

  • Bardalai P., Medhi N. & Chakraborty S. K. DoubleTrApp: A Weak Vertex Cover based DDoS Detection and Mitigation scheme using SDN approach. Proceeding of IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). BITS Pilani, 2019.

  • Bhowmick A., Saharia S. & Hazarika S. M. Encoding High-Order Statistics in VLAD for Scalable Image Retrieval. Proceeding of International Conference on Pattern Recognition and Machine Intelligence. Tezpur University, 2019.

  • Borah P., Teja A., Jha S. A. & Bhattacharyya D. K. TUKNN: a parallel knn algorithm to handle large data. Proceeding of International Conference On Big Data, Machine Learning and Applications (BigDML 2019). NIT Silchar, 2019.

  • Das A., Bhardwaj K. & Patra S. Automatic Attribute Profiles for Spectral-Spatial Classification of Hyperspectral Images. Proceeding of International Conference on Pattern Recognition and Machine Intelligence. Tezpur University, 2019.

  • Hijam D. & Saharia S. Comparative Study of Different Classification Models on Benchmark Dataset of Handwritten Meitei Mayek. Proceeding of International Conference on Intelligent Computing and Smart Communication. Tehri, 2019.

  • Kakati T., Bhattacharyya D. K. & Kalita J.K. DEGnet: Identifying Differentially Expressed Genes Using Deep Neural Network from RNA-Seq Datasets. Proceeding of International Conference on Pattern Recognition and Machine Intelligence. Tezpur University, 2019.

  • Kalita S., Karmakar A. & Hazarika S. M. Proceedings of 2nd International Conference on Advanced Computational and Communication Paradigm. SMIT Sikkim, 2019.

  • Kharkongor C. & Nath B. A Survey of the Different Item set Representation for Candidate Generation. Proceeding of International Conference on Biologically Inspired Techniques in Many-Criteria Decision Making. Odisha, 2019.

  • Nirmal Y. & Sharma U. A Grammar-Driven Approach for Parsing Manipuri Language. Proceeding of International Conference on Pattern Recognition and Machine Intelligence. Tezpur University, 2019.

  • Patowary P., Bhattacharyya D. K. & Barah P. Biomarker identification for escc using integrative idea. Proceeding of International Conference on Pattern Recognition and Machine Intelligence. Tezpur University, 2019.

  • Prasad R. K., Sarmah R. & Chakraborty S. Enhanced Partition-Based Method using Correlation Coefficient. Proceeding of International Conference on Computing, Power and Communication Technologies. New Delhi, 2019.

  • Sharma P., Bhattacharyya D. K. & Kalita J.K. Detecting Gene Modules Using a Subspace Extraction Technique. Proceeding of International Conference on Intelligent Computing and Smart Communication. Tehri, 2019.



2017 Publications

  • Pooja Sharma, D K Bhattacharyya and J K Kalita, Protein Complex Finding and Ranking- An Application to Alzheimer Disease, Journal of Bioscience, vol:42, Page:3, 2017

  • D Das, U Sharma and D K Bhattacharyya, Defeating SQL Injection Attack in Authentication Security: An Experimental Study , Int'nl Journal of Information Security, 2017

  • N Hoque, H Kashyap and D K Bhattacharyya, A Real-time DDoS Attack Detection Using FPGA, Journal of Computer Communications, vol 110, pp 48-58, 2017

  • Rajib Goswami, D K Bhattacharyya and M Dutta, Materialized view selection using evolutionary algorithm for speeding up big data query processing, Intelligent Information Systems, pp 1-27 [DoI:10.1007/s10844-017-0455-6], 2017

  • A Nath and N Sarma, A distributed solution for cooperative spectrum sensing scheduling for multiband cognitive radio networks, Journal of Network and Computer Applications, vol. 94, pp.69-77, 2017

  • S.Patra, K.Bhardwaj, L. Bruzzone, A spectral-spatial multi-criteria active learning technique for hyperspectral image classification, IEEE Journal of Selected Topics in Applied Earth Observation and Remote Sensing, DOI: 10.1109/JSTARS.2017.2747600, pp. 1-15, 2017

  • A. Singla, S. Patra, A fast partition-based batch-mode active learning technique using SVM classifier, Soft Computing, DOI:10.1007/s00500 -017-2645-0, pp. 1-11, 2017

  • A. Singla, S. Patra, A fast automatic optimal threshold selection technique for image segmentation, Signal Image and Video Processing, Vol.-11, No.2, pp 243-250, 2017

  • N. Medhi, D. K. Saikia, OpenFlow based Scalable Routing with Hybrid Addressing in Data Center Networks, IEEE Communication Letters, Vol.-21, No.5, pp 1047-1050, 2017

  • P. Roychoudhury, B. Roychoudhury, D. K. Saikia, Hierarchical Group-based Mutual Authentication and Key Agreement for Machine Type Communication in LTE and future 5G Networks, Security and Communication Networks, Vol-4, No-1, pp 1-21, 2017

  • SS Satapathy, AK Sahoo, SK Ray and TC Ghosh, Codon degeneracy and amino acid abundance influence the measures of codon usage bias: improved Nc and ENCprime measures, Genes to cells, Vol:22, Page:277-283, 2017

  • H K Yarnagula, S K Deka, N Sarma, A Cross-Layer based Location-Aware Forwarding using Distributed TDMA MAC for Ad-Hoc Cognitive Radio Networks, Wireless Personal Communications (Springer), Pages:1-18, 2017

  • S Deka, N Sarma, Opportunity Prdeiction at MAC-Layer Sensing for Ad-hoc Cognitive Radio Networks, Journal of Network and Computer Applications (Elsevier), Vol-82, Page:140-151, 2017

  • RK Deka, DK Bhattacharyya, Self-similarity based DDoS attack detection using Hurst parameter, Security and Communication Networks, 9 (17), pp.4468-4481, 2017

  • R Goswami, DK Bhattacharyya, M Dutta, Materialized view selection using evolutionary algorithm for speeding up big data query processing, Journal of Intelligent Information Systems, DOI: 10.1007/s10844-017-0455-6, pp. 1-27, 2017

  • D Chutia, DK Bhattacharyya, J Sarma, PNL Raju, An effective ensemble classification framework using random forests and a correlation based feature selection technique, Transactions in GIS, DOI:10.1111/tgis.12268, Wiley., 2017

  • P Sharma, DK Bhattacharyya, J Kalita,Disease biomarker identification from gene network modules for metastasized breast cancer, Scientific Reports, Vol. 7, no. 1, pp. 1072, 2017

  • S Nagi, DK Bhattacharyya, JK Kalita, Complex detection from PPI data using ensemble method, Network Modeling Analysis in Health Informatics and Bioinformatics, Vol. 6, no. 1, pp. 3, 2017

  • Kalita S, Karmakar A, Hazarika SM, Efficient extraction of spatial rela-tions for extended objects vis--vis human activity recognition in video, Applied Intelligence, DOI 10.1007/s10489-017-0970-8, 2017


2016 Publications

  • Monowar H Bhuyan , DK Bhattacharyya, JK Kalita, 2016, A multi-step outlier-based anomaly detection approach to network-wide traffic, Information Sciences Journal, Publisher: Elsevier, vol: 348, Pages:243-271.

  • Bhaskar Bhuyan , Nityananda Sarma, 2016, Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks, Journal of Emerging Technology Trends in Electronics, Communication and Networking, Scientific Research Publishing, Volume:8, Issue:01, Pages:45, 2016/2/18.

  • Nazrul Hoque , Dhruba K Bhattacharyya , Jugal K Kalita, FFSc: a novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis, Journal: Security and Communication Networks, Published online, 2016/1/1.

  • Rajib Goswami, Dhruba Kr Bhattacharyya, Malayananda Dutta, Jugal K Kalita, 2016, Approaches and issues in view selection for materialising in data warehouse, International Journal of Business information Systems, Inderscience Publishers (IEL), Volume: 21 , Issue: 1, Pages: 17-47.

2015 Publications


  • Hasin A Ahmed, Dhruba K Bhattacharyya, Jugal K Kalita, 2015. Core and peripheral connectivity based cluster analysis over PPI network. Journal of Computational biology and chemistry, Publisher: Elsevier, Volume:59, Pages:32-41, 2015/12/31

  • Iftekhar Hussain, Zaved Iqubal Ahmed, Dilip Kumar Saikia, Nityananda Sarma, 2015, A QoS-aware dynamic bandwidth allocation scheme for multi-hop WiFi-based long distance networks, EURASIP Journal on Wireless Communications and Networking. Springer International Publishing, Volume:2015, Issue:1, Pages:1-18, 2015/12/1

  • Hasin A Ahmed, Dhruba K Bhattacharyya, Jugal K Kalita, 2015, Strew index: An effective feature: class correlation measure , Journal of Network Modeling Analysis in Health Informatics and Bioinformatics, Publisher: Springer Vienna, Volume:4, Issue: 1, Pages: 1-15, 2015/12/1

  • Pooja Sharma, Hasin A Ahmed, Swarup Roy, Dhruba K Bhattacharyya, 2015, Unsupervised methods for finding protein complexes from PPI networks, Journal of Network Modeling Analysis in Health Informatics and Bioinformatics, Publisher: Springer Vienna, Volume:4, Issue:1, Pages:1-15, 2015/12/1

  • A Borah, B Borah, 2015, A Spatial Domain Reversible Visible Watermarking Technique for Textured Images, International Journal of Computer Applications, Publisher Academic Press, Volume: 129, Issue: 14, Pages: 28-35, 2015/11.

  • Rup Kumar Deka, Kausthav Pratim Kalita, DK Bhattacharya, Jugal K Kalita, 2015, Network defense: Approaches, methods and techniques, Journal of Network and Computer Applications. Publisher Academic Press, Volume:57, Pages:71-84, 2015/11/30

  • NM Kakoty, A Saikia, SM Hazarika, 2015, Exploring a family of wavelet transforms for EMG based grasp recognition, Signal, Image and Video Processing, Vol:9 (Issue:3), P:553-559

  • AK Sarmah, SM Hazarika, SK Sinha, 2015, Formal concept analysis: current trends and directions, Artificial Intelligence Review , 44 (1), 47-86.

  • Priyakshi Mahanta, Dhruba Kr Bhattacharyya, Ashish Ghosh, 2015, MIPCE: An MI-based protein complex extraction technique, Journal of biosciences, Publisher Springer India, Volume:40, Issue:4, Pages:701-708, 2015/10/1.

  • Swarup Roy, Dhruba K Bhattacharyya, Jugal K Kalita, Analysis of Gene Expression Patterns Using Biclustering, Journal of Methods in molecular biology (Clifton, NJ), Volume 1375 of the series Methods in Molecular Biology pp 91-103, 10/09/2015.

  • D Chutia, DK Bhattacharyya, KK Sarma, R Kalita, S Sudhakar, 2015, Hyper spectral Remote Sensing Classifications: A Perspective Survey, Journal Transactions in GIS, Online published: 7/08/2015

  • SK Chettri, B Borah, 2015, On analysis of time-series data with preserved privacy, Innovations in Systems and Software Engineering, Volume: 11 Issue: 3 Pages: 155-165.

  • U Baruah, SM Hazarika, 2015, A Dataset of Online Handwritten Assamese Characters, Journal of Information Processing Systems, 11 (3), 325-341.

  • S Patra, P Modi, L Bruzzone, Hyperspectral Band Selection Based on Rough Set, IEEE Transactions on Geoscience and Remote Sensing, Publisher IEEE, Volume: 53, Issue: 10, Pages: 5495-5503.

  • A Singla, S Patra, 2015, A Context Sensitive Thresholding Technique for Automatic Image Segmentation, Computational Intelligence in Data Mining, Publisher Springer India, Pages : 19-25.

  • M Devi, S Saharia, DK Bhattacharyya, 2015, Dance Gesture Recognition: A Survey, International Journal of Computer Applications, (0975-8887) Volume 122, No.5, July 2015.

  • S.S. Satapathy, S.K. Ray, A.K. Sahoo, T. Begum, T.C. Ghosh, 2015, Codon Usage Bias is not Significantly Different between the High and the Low Expression Genes in Human, Int J Mol Genet Gene Ther doi http://dx.doi.org/10.16966/ijmggt.103

  • V.K. Prajapati, S.S. Satapathy, MV Satish Kumar, A.K. Buragohain and S.K. Ray, 2015, Evidences indicating the involvement of selection mechanisms for the occurrence of C34 anticodon in bacteria, J Cell Sci Molecul Biol

  • B.Swain and S.S.Satapathy, 2015, Nature inspired moving sink energy efficient data gathering protocol for wireless sensor network, Springer AISC.

  • I Hussain, N Ahmed, DK Saikia, N Sarma, 2015, A QoS-aware multipath routing protocol for WiFi-based long distance mesh network, Emerging Technology Trends in Electronics, Communication and Networking.

  • Chatterjee, Bijoy Chand; Sarma, Nityananda; Oki, Eiji, 2015, Routing and Spectrum Allocation in Elastic Optical Networks: A Tutorial, Ieee Communications Surveys And Tutorials , Volume: 17 Issue: 3 Pages: 1776-1800.

  • P Sharma, HA Ahmed, S Roy, DK Bhattacharyya, 2015, Detecting protein complexes using connectivity among nodes in a PPI Network, Network Modeling Analysis in Health Informatics and Bioinformatics
  • .
  • D Boro, DK Bhattacharyya, 2015, Particle swarm optimisation-based KNN for improving KNN and ensemble classification performance, International Journal of Innovative Computing and Applications, Inderscience Publishers (IEL), Volume:6, Issue:3-4, Pages:145-162, 2015

  • C Buragohain, MJ Kalita, S Singh, DK Bhattacharyya, 2015, Anomaly based DDoS Attack Detection, International Journal of Computer Applications.

  • A Goyal, HA Ahmed, DK Bhattacharyya, 2015, An effective measure corresponding to biological significance, Network Modeling Analysis in Health Informatics and Bioinformatics.

  • Sarmah, Sauravjyoti; Bhattacharyya, Dhruba K., 2015, A grid-density based technique for finding clusters in satellite image, Pattern Recognition Letters, Volume: 33 Issue: 5 Pages: 589-604.

  • Mahanta, Priyakshi; Ahmed, Hasin A.; Bhattacharyya, Dhruba K., 2015, An effective method for network module extraction from microarray data, Bmc Bioinformatics.

  • Bhuyan, Monowar H.; Bhattacharyya, D. K.; Kalita, J. K., 2015, Surveying Port Scans and Their Detection Methodologies, Computer Journal Volume

  • Bhattacharyya, D; Nandi, S, Efficient design of ENCA based cipher system, Iete Journal of Research

  • Bhattacharyya, DK; Nandi, S, A new class of t-error correcting l d-error detecting (d > t) and all unidirectional error detecting codes, Iete Journal of Research.

  • Bhuyan, M.H, kalwar,A.; Goswami,A; Bhattacharyya, D.K., 2015, Low-Rate and high-rate Distributed DoS Attack Detection using partial rank correlation, Communication system and Network Technologies,

  • D Chutia, DK Bhattacharyya, R Kalita, J Goswami, PS Singh, S Sudhakar, 2015, A model on achieving higher performance in the classification of hyperspectral satellite data: a case study on Hyperion data, Applied Geomatics, Volume 6, Issue 3, pp 181-195.

2014 Publications

  • Baruah, U. and Hazarika, S. M. 2014. A dataset of online handwritten Assamese characters. Journal of Information Processing Systems, (accepted).
  • N Hoque, DK Bhattacharyya, JK Kalita, MIFS-ND: A mutual information-based feature selection method, Expert Systems with Applications 41 (14), 6371 - 6385. (Impact factor:2.254)
  • S Roy, DK Bhattacharyya, JK Kalita, Reconstruction of gene co-expression network from microarray data using local expression patterns, BMC Bioinformatics 15, 1 - 14 (Impact factor: 2.67)
  • P Mahanta, HA Ahmed, DK Bhattacharyya, A Ghosh, FUMET: A fuzzy network module extraction technique for gene expression data, Journal of biosciences 39 (3), 351 - 364 (IF: 1.939)
  • Kakoty, N. M. and Hazarika, S. M. 2014: Towards Electromyogram based Grasps Classification. International Journal of Biomechatronics and Biomedical Robotics. (Accepted).
  • I Hussain, N Sarma and D K Saikia, ;TDMA MAC Protocols for WiFi-based Long Distance Networks: A Survey , International Journal of Computer Applications, Vol. 94, No. 19, pp. 1- 8, May 2014.
  • Pritpal Singh and Bhogeswar Borah , Forecasting stock index price based on M-factors fuzzy time series and particle swarm optimization , International Journal of Approximate Reasoning, Volume 55, Issue 3, March 2014, Pages 812 – 833.
  • Deka, S. Kr., Sarma, N. and Yarnagula, Hema Kr. 2014. A power allocation strategy for Underlay cognitive Radio Networks. (NWCDMA), IJPAM Springer (accepted).
  • Nath, Sanghamitra, Sarma, Himangshu and Sharma, Utpal. 2014. A Preliminary Study on the VOT Patterns of the Assamese language and its Nalbaria variety. LNCS, 8404.
  • S. Patra and L. Bruzzone, A novel SOM-SVM based active learning technique for remote sensing image classification , IEEE Transactions on Geoscience and Remote Sensing, 2014, DOI: 0.1109/TGRS.2014.2305516, Impact factor 3.467.
  • Rustam Ali Ahmed and Bhogeswar Borah, Triangle wise Mapping Technique to Transform one Face Image into Another Face Image , International Journal of Computer Applications (0975 8887), Volume 87 - No. 6, February 2014, pp 1-8.
  • Bhuyan, M. H., Kashyap, H. J., Bhattacharyya, D. K. and Kalita, J. K. . Distributed denial of service attack detection: methods, tools and future directions, The Computer Journal, vol 57, no 4, pp 537 - 556, 2014
  • Bora, P., Ahmed, H., and Bhattacharyya, D. K. 2014. A statistical feature selection technique in the net. MAHIB, 3(1).
  • S. K. Chettri and B. Borah, Privacy Preservation of Time Series Data Using Discrete Wavelet Transforms , In Smart Innovation, Systems and Technologies, Springer-Verlag, Berlin Heidelberg, Volume 28, 2014, pp. 249 - 258, ISSN: 2190 - 3018.
  • Gogoi, P., Bhattacharyya, D. K., Borah, B., &Kalita, J. K. (2014), MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method , The Computer Journal, 57(4), 602 - 623.
  • Das, D. and Saharia, S. 2014. Implementation and Performance Evaluation of Background Subtraction Algorithms. International Journal of Computational Sciences and Applications (IJCSA), 4(2).
  • Dash, D., Bishnu, A., Gupta, A. and Nandy, Subhas C. 2014. Line coverage measures in wireless sensor networks, Journal of Parallel and Distributed Computing, 74(7)
  • Deka, S. Kr., Sarma, N. and Yarnagula, Hema Kr. 2014. A power allocation strategy for Underlay cognitive Radio Networks. (NWCDMA), IJPAM Springer (accepted)
  • Kakoty, N. M. and Hazarika, S. M. 2014. Development of an electromyographic controlled biomimetic prosthetic hand. International Journal of Computational Vision and Robotics, 4(1).
  • Kakoty, N. M., Saikia, A. and Hazarika, S. M. 2014. Exploring a family of wavelet transforms for EMG based grasp recognition. Signal, Image and Video Processing. Springer (accepted)
  • Mahanta, P., Ahmed, H. A., Bhattacharyya, D. K. and Kalita, J. K. 2014. FUMET: A fuzzy network module extraction technique for gene expression data. Journal of Bioscience, 39(2).
  • Nath, B., Bhattacharyya, D. K. and Ghosh, A. 2013. Incremental association rule mining: a survey. DMKD, Wiley Interdisciplinary Review, 3(3).
  • Nath, Sanghamitra, Sarma, Himangshu and Sharma, Utpal. 2014. Dialect translation system-a preliminary proposal. International Journal on natural Language Computing, AIRCC, (accepted)
  • A Singla, S. Patra and L. Bruzzone, A novel classification technique based on progressive transductive SVM learning , Pattern Recognition Letters, vol. 42, pp. 101 -106, March 2014, (Impact factor 1.266.)
  • Sarmah A.K., Sinha, S. K., Hazarika S.M.: A new pattern-based flexible approach for maintaining a constrained workflow. Accepted for publication in International Journal of Software Engineering and Knowledge Engineering (in press)

2013 Publications

  • Bhattacharyya, D. K. and Kalita, J. K.. Towards an unsupervised method for network anomaly detection in large datasets. Journal of Computing and Informatics vol 33, no 1, (SCI), 2013
  • Kakoty, N. M. and Hazarika, S. M. 2013. A Two Layered Control Architecture for Prosthetic Grasping. Paladyn. Journal of Behavioural Robotics, 4(1).
  • Chatterjee, B.C., Sarma, N. and Sahu, P. P. 2013. A QoS-aware wavelength assignment scheme for Optical Networks, Optik - Int. J. Light Electron Opt, 124(20).
  • S. K. Das, B. Borah, A Density-Based Micro Aggregation Technique For Privacy-Preserving Data Mining, IJRET: International Journal of Research in Engineering and Technology, Volume: 02 Special Issue: 02, Dec - 2013, pp. 92 - 97.
  • Pritpal Singh and Bhogeswar Borah, An efficient time series forecasting model based on fuzzy time series, Engineering Applications of Artificial Intelligence, Volume 26, Issue 10, November 2013, Pages 2443 – 2457.
  • Pritpal Singh and Bhogeswar Borah, High-order fuzzy-neuro expert system for time series forecasting, Knowledge-Based Systems, volume 46, July 2013,pp. 12 – 21.
  • Prasanta Gogoi and Dhruba K. Bhattacharyya, A rough set-based effective rule generation method for classification with an application in intrusion detection, International Journal of Security and Networks, Vol. 8, No. 2, 2013, PP. 61 - 71.
  • Das, S. K. and Borah, B. A density-based micro aggregation technique for privacy-preserving data mining. IJRET: International Journal of Research in Engineering and Technology, 02 (02). Special Issue: 02, Dec-2013, pp. 92 - 97.
  • Hoque, N., Nath, B. and Dutta, M. 2013. A comparative study on rare association rule mining. Periodic Research, Social research foundation, 2(2).
  • Roy, S., Bhattacharyya, D. K. and Kalita, J. K. 2013. CoBi: pattern based co-regulated biclustering of gene xpression data pattern recognition letters: 34(14): pp 1669 - 1678 (2013)
  • Sarmah, Rosy. 2013. Gene expression data clustering using a fuzzy link based approach. International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM). ISSN 2150-7988 Volume 5 (2013) pp. 532 - 541
  • Sharma, A., Sinha, S. K. and Hazarika, S. M. 2013. Formal concept analysis: current trends and directions. Artificial Intelligence Review. Springer. (Accepted).
  • Muchahari M., Sinha S. K. :A New Trust Management Architecture in Cloud Computing, ISCOS-13, IEEE.
  • Rosy Sarmah, Gene Expression Data Clustering using a Fuzzy Link based Approach, IJCISIM, ISSN No. 2150 - 7988
  • M H Bhuyan, D K Bhattacharyya and J K Kalita, towards an unsupervised method for network anomaly detection in large datasets, Journal of Computing and Informatics (SCI).
  • P Gogoi, B Borah and D K Bhattacharyya, Classification of Network Anomalies using Clustering, Informatica.
  • B C Chatterjee, N Sarma and P P Sahu, Review and Performance Analysis on Routing and Wavelength Assignment Approaches for Optical Networks, IETE Technical Review, Vol. 30, No. 1, pp. 59 - 70
  • B C Chatterjee, N Sarma and P P Sahu, Priority based Dispersion-reduced Wavelength Assignment for Optical Networks, IEEE/OSA Journal of Lightwave Technology, vol. 31, no.2, pp.257 - 263

2012 Publications

  • S.S.Satapathy, M. Dutta, A.K.Buragohain and S.K.Ray, Transfer RNA gene numbers may not be completely responsible for the codon usage bias in asparagine, isoleucine, phenylalanine and tyrosine in the high expression genes in bacteria, J Mol. Evol., 75:34-42.
  • Dutta, M., Nath, B. and Hoque N., A Brief Survey on Rare Association Rule Mining, International Journal of Information Analysis and Processing,
  • G Priyadarshini, R Das, D K Bhattacharyya and J K Kalita, An Effective Graph based Clustering Technique to Indentify Coherent Patterns from Gene Expression Data, Int. J. Bioinformatics Research and Applications, Vol. 8, Nos. 1-2, pages 18-37, Inderscience.
  • S Roy and D K Bhattacharyya, Mining Strongly Correlated Item pairs in Large Transaction Databases, International Journal of Data Mining, Modelling and Management ( IJDMMM ), vol 4, no 6
  • P Gogoi, R Das, B Borah, and D K Bhattacharyya, Efficient Rule Set Generation using Rough Set Theory for Classification of High Dimensional Data , International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) , vol 1, issue 2.
  • M H Bhuyan, D K Bhattacharyy and J K Kalita, AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach, International Journal of Network Security , Vol. 14, No. 6,
  • D Chutia, D K Bhattacharyya and S Sudhakar, Effective Feature Extraction Approach for Fused Images of Cartosat-I and Landsat ETM+ Satellite Sensors, Applied Geometics , Springer
  • Kakoty, N. M. and Hazarika, S. M, Electromyographic Grasp Recognition for a Five Fingered Robotic Hand, IAES |International Journal of Robotics and Automation (IJRA) Vol. 2, No. 1. IAES
  • Hazarika, S. M. and Bhowmick, A, Learning rules of a card game from video, Artificial Intelligence Review, Vol. 38, No. 1 Springer.
  • B Nath, D K Bhattacharyya and A Ghosh, Incremental Association Rule Mining: A Survey, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery.
  • B Borah and D K Bhattacharyya, EMDAV: A Variable-Size Microaggregation Technique for Privacy Preservation, Information Assurance and Security Letters, vol 2, pp 13 - 18.
  • H A Ahmed, P Mahanta, D K Bhattacharyya and J K Kalita, Module Extraction from Subspace Co-expression Network, Int'nl journal of Network Modeling Analysis in Health Informatics and Bioinformatics (NetMAHIB), Springer, Volume 1, Issue 4, pp 183-195.
  • H A Ahmed, P Mahanta, D K Bhattacharyya, J K Kalita and A Ghosh, Intersected Coexpressed Subcube Miner: An effective triclustering algorithm, Int'nl Journal of Computer Information Systems and Industrial Management (IJCISIM).
  • D Das, U Sharma and D K Bhattacharyya, Rule based Detection of SQL Injection Attack, International Journal of Computer Applications, Foundation of Computer Science, vol 43, no 19, pp 15-24.
  • A. Mira, D.K. Bhattacharyya and S. Saharia, RODHA: Robust Outlier Detection using Hybrid Approach, American Journal of Intelligent Systems, vol 2, no 5.
  • Priyakshi Mahanta, Hasin A Ahmed,Dhruba K Bhattacharyya,Jugal K Kalita, An effective method for network module extraction from microarray data, BMC Bioinformatics, 13(Suppl 13):S4.
  • H A Ahmed, P Mahanta, D K Bhattacharyya and J K Kalita, Autotuned Multilevel Clustering of Gene Expression Data, The American Journal of Bioinformatics Research, Vol 2, No 5.
  • N Hoque, B Nath and D K Bhattacharyya, A New Approach on Rare Association Rule Mining, Int'nl Journal of Computer Applications vol 53, no 3, pp 1-6.
  • B C Chatterjee, N Sarma and P P Sahu, Priority based Routing and Wavelength Assignment with Traffic Grooming for Optical Networks, Journal of Optical Communications and Networking Vol. 4, no. 6, pp. 480 – 489.
  • B C Chatterjee, N Sarma and P P Sahu, A heuristic priority based wavelength assignment scheme for optical networks, Optik - Int. J. Light Electron Opt. Vol. 123, No. 17, pp.1505-1510.

2011 Publications

  • Sarmah, A.K., Sinha S.K., Hazarika, S.M.: Constraint propagation in workflow - a pattern based approach. In: Proceedings of National Conference in Machine Intelligence, Narosa (2011) 134 – 143.
  • M H Bhuyan, D K Bhattacharyya and J K Kalita, Surveying Port scans and Their Detection Methodologies, The ComputerJournal (Oxford University Press, British Computer Society, UK), vol 54, no 10, pages 1565 - 1581.
  • R Das, J K Kalita and D K Bhattacharyya, A Pattern Matching Approach for Clustering Gene Expression Data, the IJDMMM (Inderscience), vol 3, no 2, pages 130 - 149.
  • B Nath, D K Bhattacharyya and a Ghosh, Dimensionality Reduction for Association Rule Mining, International Journal of Intelligent Processing, vol 2, no 1, pp 9 - 21.
  • P Gogoi, D K Bhattacharyya, J K Kalita and B Borah, A Survey of Outlier Detection Methods in Network Anomaly Identification, The Computer Journal (Oxford University Press) , vol 54, no 4, pp 570 - 588.
  • M Goswami, R Das and D K Bhattacharyya, CNNC: A Common Nearest Neighbour Clustering Approach for Gene Expression Data, International Journal of Computational Vision and Robotics (IJCVR) Vol. 2, no 2 (Inderscience), pp 115-126.
  • M H Bhuyan, D K Bhattacharyya and J K Kalita, Survey on Incremental Approaches for Network Anomaly Detection, International Journal of Communication Networks and Information Security (IJCNIS) , vol 3, no 3, pp 226 - 239.
  • P Gogoi, B Borah, D K Bhattacharyya and J K Kalita, Anomaly Detection Using Unsupervised Model, International Journal of Computer Application , NSC (1), pp 19 - 30.
  • B Borah and D K Bhattacharyya, EMDAV: A Variable-Size Microaggregation Technique for Privacy, Information Assurance and Security Letters, vol 2, pp 13 - 18.
  • N Hoque, B Nath and D K Bhattacharyya, A New Approach on Rare Association Rule Mining, International Journal of Computer Applications vol 53, no 3, pp 1 - 6.
  • M H Bhuyan, D K Bhattacharyya and J K Kalita, Towards an unsupervised method for network anomaly detection in large datasets, Journal of Computing and Informatics (SCI).
  • Rosy Sarmah, Gene Expression Data Clustering using a Fuzzy Link based Approach, International Journal of Computer Information Systems and Industrial Management (IJCISIM) ISSN No. 2150-7988.
  • Saharia Navanath and Sharma Utpal and Kalita Jugal, A First Step Towards Parsing of Assamese Text. Language in India Vol 11, No 5, ISSN 1930 - 2940, pp 30 - 34.
  • Sharma Padmaja and Sharma Utpal and Kalita Jugal, Named Entity Recognition: A Survey for the Indian Languages, Language in India, Vol 11, No 5, ISSN 1930 - 2940, pp 35 - 40.
  • Bhatt, M., Guesgen, H., Woelfl, S. and Hazarika, S. M., QSTR - Emerging Applications, Trends and Future Direction, Journal of Spatial Cognition and Computation, Vol. 11, No. 1. Taylor and Francis, London. pp. 1 - 11.
  • M H Bhuyan, D K Bhattacharyya and J K Kalita, CA-KEP:A Secure CA based 2 Party Key Exchange Protocol, Journal of Information Assurance and Security (JIAS), Vol 7, pp 193 - 206, Mirlab, Dynamic Publisher, USA.

2010 Publications

  • N Sarma and S Nandi, A Multipath QoS Routing with Route Stability for Mobile Ad Hoc Networks, IETE Technical Review, vol.27, no. 5, pp.380-397, Sept-Oct, 2010.
  • A Das and D K Bhattacharyya, Horizontal Partition-based vs Vertical Patition-based Association Rule Mining, accepted for publication in the Australasian Journal of Information Systems (AJIS), (to appear)
  • P.Baruah, N.Sarma and S.S.Satapathy, “SINR based Vertical Handoff Algorithm between GPRS and WiMAX Network”, Journal of Theoretical and Applied Information Technology, Vol 14. No. 2 – 2010.
  • P.Mohanty, S.Panigrahi, N.Sarma and S.S.Satapathy, “Security Issues in Wireless Sensor Network Data Gathering Protocols: A Survey”, Journal of Theoretical and Applied Information Technology, Vol 13. No. 1 – 2010.
  • N. Sarma and S. Nandi, Service Differentiation using Priority based MAC Protocol in MANETs, Int. J. Internet Protocol Technology (Inderscience), vol. 5, no. 3, pp.115-131, September 2010.
  • D Das, U Sharma and D K Bhattacharyya, An Approach to Detection of SQL Injection Attack Based on Dynamic Query Matching, International Journal of Computer Applications, Foundation of Computer Science(FCS), U.S.A., vol 1, no. 25, article 6, 2010, pp: 39-45, URL: http://www.ijcaonline.org/journal/number25/pxc387766.pdf
  • S.S.Satapathy, K.Vedula, M.Dutta, S.K.Ray, “A comparative study of similarity between Nucleotide Sequence of a DNA molecule and Irrational Number”, NWDAA-2010, Tezpur, Assam, 22-23 January 2010.

2009 Publications

  • P.Mohanty, S.Panigrahi, N.Sarma and S.S.Satapathy, “HCEPSN: A Hierarchical Cluster based Energy efficient data gathering Protocol for wireless Sensor Network”, ICIT-2009, Bhubaneswar, Orissa, 21-24 December 2009.
  • Rosy Das, D K Bhattacharyya and J K Kalita, Clustering Gene Expression Data using Density Approach , in the IJRTE, vol 2, no 1-6, November, 2009 (ISSN: 1797-9617), Finland.
  • S Sarma and D K Bhattacharyya, A Grid Density based Technique for Clustering Satellite Images, accepted for publication in International Journal of SPRS (Elsevier).
  • S Sarma and D K Bhattacharyya, A Grid Density based Neighbourhood Search Technique for Clustering Satellite Data, accepted for publication in IEEE Transaction on Geoscience and Remote Sensing (IEEE Press).
  • Rosy Das, D K Bhattacharyya and J K Kalita, A Pattern Matching Approach for Clustering Gene Expression Data, accepted for publication in International Journal of Computational BioScience (Special Issue), 2009.
  • M Karmakar and D K Bhattacharyya, Privacy Preserving Data Mining using Matrix Algebraic Approach, Int'nl Journal of Converegence Information Technology, vol 4, no 3, September 30, 2009 (DOI: 10.4156/jcit.vol4.issue3.5).
  • M H Bhuyan, S Saharia and D K Bhattacharyya, An Effective Method for Fingerprint Classification, accepted for publication in IAJT, 2009.
  • M H Bhuyan and D K Bhattacharyya, An Effective Fingerprint Classification and Search Method, Intn'l Journal of Computer Science and Network Security, vol.9, no.11, November, 2009, pages: 39-48.
  • Rosy Das, D K Bhattacharyya and J K Kalita, A Pattern Matching Approach for Clustering Gene Expression Data, accepted for publication in IJDMMM.
  • Rosy Das and D K Bhattacharyya, A Pattern matching Approach for Identifying Coherent Patterns over Gene Expression Data, accepted for publication in Technical Journal, ASS, Vol. 50 (1 & 2), 2009
  • P Mohanty, S Panigrahi, S S Satapathy, and N Sarma, Routing Protocols for Wireless Sensor Networks: A Survey, National Workshop cum Seminar on Distributed Computing (NSDC 2009), Sikkim, 6-7 March, 2009.
  • P Mohanty, N Sarma, S Panigrahi and S S Satapathy, A symmetric Key based Secured Data Gathering Protocol for WSN, International Conference on Anti-counterfeiting, Security, and Identification in Communication (ICASID2009), Hong Kong, August 20-22, 2009.
  • P Mohanty, N Sarma, S Panigrahi and S S Satapathy, HCEPSN: A Hierarchical Cluster based Energy efficient data gathering Protocol for wireless Sensor Network, International Conference on Information Technology (ICIT 2009), Bhubaneswar, December 21-24, 2009.
  • D Das, U Sharma and D K Bhattacharyya, A Web Intrusion Detection Mechanism based on Feature based Data Clustering, in the Proc of IEEE IACC'09, pp 1124-1129, March, 2009.
  • Rory Lewis, J K Kalita, S Sharma and D K Bhattacharyya, Music Industry Scalar Analysis Using Unsupervised Fourier Feature Selection, in the Proc of IIS2009, Krakow, Poland, 2009.
  • Rosy Das, D K Bhattacharyya and J K Kalita, An Incremental Clustering of Gene Expression Data , accepted for publication IEEE NABIC'09
  • S. M. Hazarika, Landmark-based Shape Context for Recognition of Handwritten Digits, Utilizing Information Technology Systems across Disciplines: Advancements in the Application of Computer Science, Evon M. O. Abu-Taieh et. al. (Editors), IGI Global, January 2009.
  • N. M. Kakoty and S. M. Hazarika, Bio-signals controlled Prosthetic Hands National Conference on Industrial Problems on Machine and Mechanisms, Chennai, July 2009.
  • N. M. Kakoty and S. M. Hazarika, Classification of Grasp Types through Wavelet Decomposition of EMG Signals, 2nd International Conference on Bio-Medical Engineering and Informatics, Tianjin, China, October 2009.
  • Smriti K. Sinha, Azzadine Benamaur, Serugan Magali, Book Chapter 17: SERENITY in eBusiness and Smart Items Scenario, SERENITY Book, To be published by Spinger Verlog, 2009
  • G. Spyros, S. K. Sinha et al, Book Chapter 06: Security and Dependability Solutions for Web Services and Workflows: A Patterns Approach, SERENITY Book, To be published by Spinger Verlog, 2009. Paul El Khoury, Smriti K. Sinha, Mohand-Said Hacid and Emmanuel Coquery, Book Chapter on Integration of Security Mechanisms, Studies in Computational Intelligence (Submitted to editors of the book), 2009.
  • N. Saharia, D. Das, U. Sharma and J. Kalita, Part of Speech tagger for Assamese Text, proceedings of ACL- IJCNLP, 2009, 4-7 June, Singapore.
  • Rahman, M and Das, S and Sharma, U. Parsing of part-of-speech tagged Assamese Texts. International Journal of Computer Science Issues, Vol 6, No 1, 2009, ISSN (Online) 1694-0784, ISSN (Print) 1694-0814, pp 28-34.
  • S. Saharia, P.K. Bora and D.K. Saikia, Improving Character Recognition Accuracy of Tchebichef Moments by splitting of Images, Proc. of NCC, 09, pp 390-393, IIT Guwahati, January 2009.
  • D Das, U Sharma, D K Bhattacharyya, A Web Intrusion Detection mechanism based on feature based data clustering, Accepted for IEEE Advance Computing Conference, Patiala, March 6-7, 2009,
  • R D Sarmah, D Kalita, U Sharma, Identifying Parallelism for sequential programs and suggesting a storage specification, 54th Annual Technical Session of the Assam Science Society, Tezpur University, Feb 4, 2009.
  • N Saharia, U Sharma, Parsing of Assamese Sentences, 54th Annual Technical Session of the Assam Science Society, Tezpur University, Feb 4, 2009,
  • S.S.Satapathy, M. Dutta and S.K.Ray, “Higher tRNA Diversity in Thermophilic Bacteria: A Possible Adaptation to Growth at High Temperature” , MicrobiolRes, doi:10.1016/j.micres.2009.12.003
  • B.R.Powdel, S.S.Satapathy, A. Kumar, P.K.Jha, A.K.Buragohain, M.Borah and S.KRay, “A Study in Entire Chromosomes of Violations of the Intra-strand Parity of Complementary Nucleotides (Chargaff's Second Parity Rule)”, DNA Res., 2009 16(6):325-343; doi:10.1093/dnares/dsp021
  • S.S.Satapathy, M. Dutta and S.K.Ray, “Variable correlation of genome GC% with transfer RNA number as well as with transfer RNA diversity among bacterialgroups: a-Proteobacteria and Tenericutes exhibit strong positive correlation” , MicrobiolRes, doi:10.1016/j.micres.2009.05.005

2008 Publications

  • Utpal Sharma, Jugal K Kalita, Rajib K Das. "Acquisition of Morphology of an Indic Language from Text Corpus", ACM Transactions on Asian Language Information Processing (TALIP), Vol 7, No 3, Article 9. August 2009.
  • B Borah and D K Bhattacharyya, CatSUB: A technique for Clustering Categorical Data Based on Subspace, the Icfai Journal of Computer Sciences, Vol. II, No. 2, pp. 7-20, April 2008.
  • B Borah and D K Bhattacharyya, DDSC: A Density Differential Spatial Clus- tering Technique, in the Journal of Computers (Academy Publisher), vol 3, no 2, pp 72-79, February, 2008).
  • B Borah and D K Bhattacharyya, Biclustering Expression Data Using Node Addition Algorithm, in the International Journal of Information Processing (Special Issue)(accepted for publication in 2008 Issue)
  • S Roy and D K Bhattacharyya, OPAM: An Efficient One Pass Association Mining Technique without Candidate Generation, in the Journal of CIT (Special Issue), vol 3, no 3, pp 32-38, ISSN : 1975-9320, S Korea, October, 2008.
  • Rosy Das, D K Bhattacharyya and J K Kalita, A New Approach for Clustering Gene Expression Time Series Data, Int'nl Journal of Bioinformatics Research and Applications (IJBRA), vol 5, no 3, pp 310-328, 2009.
  • B Nath, A Ghosh and D K Bhattacharyya, Faster Rule Generation Technique, Int'nl Journal of IT and Knowledge Management (IJITKM), vol 1, no 2, pp 267-279, 2008.
  • S Sarma, R Das and D K Bhattacharyya, A Distributed Algorithm for Intrinsic Cluster Detection over Large Spatial Data, Int'nl Journal of Computer Science, vol 3, No 4, pp 246-256, Fall 2008.
  • N Sarma, S Nandi and R Tripathi, "Enhancing Route Recovery for QAODV Routing in Mobile Ad Hoc Networks," The 9th International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN 2008), pp. 39-44, 2008 (IEEE Computer Society).
  • N Sarma and S Nandi, A Route Stability based Multipath QoS Routing (SMQR) in MANETs", The 1st International Conference on Emerging Trends in Engineering and Technology- ICETET-08, pp.193-198,16-18th July 2008 (IEEE Press).
  • N Sarma and S Nandi, A priority based QoS-Aware MAC protocol (PQAMP) in mobile ad hoc networks, The 4th ACM symposium on QoS and security for wireless and mobile networks 2008 (Q2SWinet08), Vancouver, British Columbia, Canada, pp.79-82, October 27 - 28, 2008.
  • N Sarma and S Nandi, A Strict Priority based QoS-Aware MAC Protocol for Mobile Ad Hoc Networks, The 5th International Conference on Distributed Computing and Internet Technologies (ICDCIT 2008), New Delhi, LNCS vol no. 5375, pp.121-132, Dec 10-12, 2008.
  • N Sarma and S Nandi, "Route Stability based QoS Routing in Mobile Ad Hoc Networks", Special issue of the Wireless Personal Communications Journal (Springer), 2008 (In Press).
  • N Sarma and S Nandi, "A Cross-layer QoS mapping framework for Mobile Ad Hoc networks", IETE Technical Review, Vol. 25, No. 6, pp.346-358, Nov-Dec 2008 (received IETE-K S Krishna Memorial Award for the best system oriented paper for the year 2009).
  • D Das, D K Bhattacharyya and U Sharma, Unwanted email detection using Classification approach, in the Proc of NCSA'08, April, 2008.
  • M Kalita, D K Bhattacharyya and M Dutta, Privacy Preserving Clustering- A Hybrid Approach, in the IEEE Proc of ADCOM2008, ISBN 978-1-4244-2962-2, pp 123-130, India (DOI:10.1109/ADCOM.2008.4760438).
  • S Roy and D K Bhattacharyya, An One Pass Approach to Mine Top-K Strongly Correlated Item Pairs, in the IEEE Proc of ADCOM2008, ISBN 978-1-4244-2962-2, India (DOI:10.1109/ADCOM.2008.4760438).
  • Rosy Das, Jugal Kalita and Dhruba Bhattacharyya, A Frequent-Itemset Nearest Neighbor Based Approach for Clustering Gene Expression Data, Fifth Biotechnology and Bioinformatics Symposium (BIOT 08), October 2008, Arlington, TX, pp. 73-78
  • S Roy and D K Bhattacharyya, SCOPE: An Efficient One Pass Approach to nd strongly Correlated Item Pairs, in the IEEE Proc of ICIT08,Bhubaneswar, pp 123- 126, India (http://doi.ieeecomputersociety.org/10.1109/ICIT.2008.10).
  • S Sharma and D K Bhattacharyya, Grid based clustering technique for setellite image application, accepted as short paper in INCA2008, Ahmedabad, India.
  • D Chutia and D K Bhattacharyya, Multi-resolution Segmentation for Extraction of Linear Features from High Resolution Indian Satellite Data- An Object-Oriented Approach, communicated, Ahmedabad, India.
  • B Nath, D K Bhattacharyya and A Ghosh, Faster Rule Generation Technique, communicated, Ahmedabad, India.
  • B Nath, D K Bhattacharyya and A Ghosh, Dimensionality Reduction Technique, communicated, Ahmedabad, India.
  • D Laskar and D K Bhattacharyya, Mixed Type Clustering and its application in Intrusion Detection System, communicated.
  • S Sharma and D K Bhattacharyya, Unsupervised Feature selection method, communicated.
  • D Das, U Sharma and D K Bhattacharyya, Unwanted email blocking using Biagram based document similarity, accepted as short paper in INCA08, Ahmedabad, India.
  • D Das, U Sharma and D K Bhattacharyya, An Intrusion Detection Mechanism based on Feature based Data Clustering, in the Proc of IEEE ICET08, pp 172-175, October, 2008.
  • S. M. Hazarika , Qualitative Spatial Representation and Reasoning , Encyclopedia of Information Sc & Technology, 2nd Edition , Mehdi Khosrow-Pour, Editor-in-Chief, Idea Group Inc., 2008
  • S. M. Hazarika, QualGrasp: Grasp Synthesis through Qualitative Reasoning, International Journal of Computational Cognition, Vol. 5, No. 3, Sept.2008
  • S. M. Hazarika and Bibha Roy, Semantic Search of Unstructured Knowledge using Qualitative Analysis, International Journal of Knowledge Management, Vol. 4, No. 2, pp 35-45, IGI Publishing, April-June 2008
  • N. M. Kakoty and S. M. Hazarika, Recognition of Grasp Types Based on Electromyogram Signals, International Conference on Computing, Communication and Networking IEEE, December 2008
  • S. M. Hazarika, Qualitative Shape Using Ordered Analogical Curvature Components, CIC 2008: 17th International Conference on Computing, Mexico City, Mexico, December 2008.
  • N. M. Kakoty and S. M. Hazarika, EMG Based Human Robot Interface: Exploiting BZC for Categorizing Hand Movements, CIC 2008: 17th International Conference on Computing, Mexico City, Mexico, December 2008.
  • A. Sharma, S. M. Hazarika and S. K. Sinha, Security Pattern Lattice: A Formal Model to organize Security Patterns, Proceedings of 2nd Intl Workshop on Secure System Methodologies using Patterns , IEEE Press, Turin, Italy, September 01-05, 2008.
  • Smriti K. Sinha and Azzedine Benamaur, A Formal Solution of Rewriting Attacks on SOAP Messages, Proceedings of the 2008 ACM workshop on Secure web services (SWS08), Conference on Computer and Communications Security (CCS08), Alexandria, Virginia, USA , ACM
  • Smriti k. Sinha and Subrata Sinha, Limitations of Web Service Security on SOAP Messages in a Document Production Workflow Environment, Proceedings of the 16th International Conference on Advanced Computing and Communication 2008 (ADCOM08) , IEEE Press, Dec.14 -17, 2008, India
  • • B.R.Powdel, A.Kumar, P.K.Jha, S.S.Satpathy, A.K.Buragohain, M.Borah and S.K.Ray, , “Frequency Distribution of Complementary Nucleotides and Intra-strand Parity in Chromosomes: a Novel Approach to the Parity Rule II”, 16th Annual International Conference Intelligent Systems for Molecular Biology, Toronto, Canada, July 19-23 2008.

2007 Publications

  • B.R.Powdel, MBorah, S.S.Satpathy and S.K.Ray, , “A quadratic relationship of altered GC content with the genome G+C % in bacteria: a quantitative study using discrete probability distribution”, ”, BioConvene, International conference on bioinformatics & drug discovery, University of Hyderabad, 20- 22nd December, 2007.
  • S Sharma, R Das and D K Bhattacharyya, Intrinsic Cluster detection Using Geometrical Shapes, in the Proc of ADCOM07 (IEEE), pp 371-376, December 18-21, 2007, Guwahati, India.
  • R Das, S Sharma and D K Bhattacharyya, An effective dissimilarity measure for clustering Gene expression Time series data, in the Proc of BIOT07, October, 2007, Colorado, USA
  • B Borah and D K Bhattacharyya, Biclustering Expression Data Using Node Addition Algorithm, in the Proc of ADCOM07 (IEEE), pp 307-312, 2007, Guwahati, India.
  • H Kalita, D K Bhattacharyya, et al A New Algorithm OPTICS(BOPT)P.1 for Self Organization in an Adhoc Sensor Network, in the Proc of ADCOM07, pp 523-528, India.
  • B Nath, D K Bhattacharyya and A Ghosh, Frequency count based filter for Dimensionality Reduction, in the Proc of ADCOM07 (IEEE), pp 377-381, 2007, Guwahati, India.
  • B Nath, D K Bhattacharyya and A Ghosh, Mining for Association Rules using Multi-objective Genetic Algorithms: A partition Based Approach, in the Proc. of NCTAC, 2007, Tezpur, pp. 119-124.
  • B Nath, D K Bhattacharyya and A Ghosh, Dimentionality Reduction using Multi-objective Genetic Algorithm in the Proc. of NCTAC, 2007, Tezpur, pp. 155-161.
  • R Das, S Sharma and D K Bhattacharyya, DGDCT: A Distributed Grid-Density Based Algorithm for Intrinsic Cluster Detection over Massive Spatial Data, in the Proc of ICDCN08 (LNCS ISSN 0302-9743), pp 239-250, Kolkata, India.
  • S. M. Hazarika "Qualitative Framework for Vision-based Closure Grasps" 13th National Conference on Machines & Mechanisms Bangalore, India, December 2007
  • S. M. Hazarika "Pattern Mining as Abduction: From Snapshots to Spatio-temporal Patterns" 15th International Conference on Advanced Computing & Communication Guwahati, India, pp 289-294, December 2007
  • L. Basantakumar Singh and S. M. Hazarika "Enhanced Shape Context for Object Recognition" 15th International Conference on Advanced Computing & Communication, pp 529-534, Guwahati, India, December 2007
  • R. Tripathy and N Sarma, Efficient Route Recovery in QoS-based AODV Routing Protocol, International Conference on Intelligent Systems & Networks (IISN-2007), pp. 140-145, Feb 23-25, 2007, Haryana, India.
  • M. Jims and N. Sarma, QoS-Aware MAC Protocols in MANETs, National Conference on Trends in Advanced Computing (NCTAC-2007), pp. 8-13, March 22-23, 2007, Tezpur, India.
  • M. P. Baruah and N. Sarma, Quality of Service Routing in MANETs, National Conference on Trends in Advanced Computing (NCTAC-2007), pp. 35-42, March 22-23, 2007, Tezpur, India.
  • D. Acharjee and N. Sarma, An Alternate Failure Tolerant Model for Multipath Routing of Sensor Networks, National Conference on Trends in Advanced Computing (NCTAC-2007), pp. 236-238, March 22-23, 2007, Tezpur, India.
  • M Jims, N Sarma, and S Nandi, "Priority Based Fairness Provisioning QoS-Aware MAC Protocol", the 15th International Conference on Advanced Computing and Communications (ADCOM 2007), December 2007 (IEEE Press) (received best paper award)
  • N Sarma, and S Nandi, "Route Stability based QoS Routing (RSQR) in MANETs", the 10th International Symposium on Wireless Personal Multimedia Communications (WPMC 2007), December 2007.
  • D Acharjee and N Sarma, Slope Based Shortest Path Routing For Wireless Sensor Network, the 15th International Conference on Advanced Computing and Communications (ADCOM 2007), December 2007.
  • S. M. Hazarika, Pattern Mining as Abduction: From Snapshots to Spatio-temporal Sequential Patterns, IEEE ICDM Workshop on Spatial and Spatio-temporal Data Mining, Omaha, USA, October 2007



2006 Publications

  • S. Saharia, P. K. Bora, D. K. Saikia, Fast Computation of Legendre Moments, Proc. of National Workshop on Trends in Advanced Computing 2006 (NWTAC06), Narosa Publishing House, pp 170-177, Tezpur, 23-24 January 2006.
  • M. Dahal, D. K. Saikia, A Comparative Study of RTT Based Congestion Control(RBCC) Scheme with TCP SACK in Wireless Environment, Proc. of National Workshop on Trends in Advanced Computing 2006 (NWTAC06), Narosa Publishing House, pp 13-22, Tezpur, 23-24 January 2006.
  • M. Dahal, D. K. Saikia, RTT Based Congestion Control and Path Switching Scheme for SCTP, IEEE International Conference on Communication Technology November 27-30, 2006, Guilin, China.
  • S Roy and D K Bhattacharyya, Data Clustering Techniques: A Review, Networks, Data Mining and Artificial Intelligence, Narosa, India, pp 139-152, 2006
  • A Das and D K Bhattacharyya, Finding Frequent Itemsets over High Dimensional Data Using Partitioning FP-growth, Networks, Data Mining and Artificial Intelligence, Narosa, India, pp 130-138, 2006
  • B Bora and D K Bhattacharyya, An Entropy based Hierarchical Clustering Algorithm for Categorical and Mixed Type Data, Networks, Data Mining Artificial Intelligence, Narosa, India, pp 153-162, 2006
  • P J Dutta, D K Bhattacharyya, J K Kalita and M Dutta, Clustering Approach to Content Based Image Retrieval, GMAI, pp. 183-188, Geometric Modeling and Imaging-New Trends (IEEE), 2006.
  • R Das, S Sharma and D K Bhattacharyya, A Distributed Clustering Technique for Intrinsic Cluster Detection over Large Spatial Datasets, accepted for publication in the InSciT2006 (IEEE), 2006.
  • S S Satapathy and N Sarma, A Power Efficient Multi-zone data gathering protocol for WSNs, in the proc. of National Workshop on Trends in Advanced Computing 2006 (NWTAC06), pp.23-32, 23-24 January, 2006.
  • R Tripathy and N Sarma, Route Recovery Mechanism for QoS routing in MANETs, in the proc. of National Workshop on Trends in Advanced Computing 2006 (NWTAC06), pp.39-45, 23-24 January, 2006.
  • P S Reddy, N Sarma and R. K. Das, Fault Tolerant distributed ME Algorithms: A Survey, in the proc. of National Workshop on Trends in Advanced Computing 2006 (NWTAC06), pp.92-99, 23-24 January, 2006.
  • N Dutta and N Sarma, Providing QoS for Real-Time Multimedia Applications by Bandwidth Adjustment, in the proc. of National Workshop on Trends in Advanced Computing 2006 (NWTAC06), pp.113-119, 23-24 January, 2006.
  • N Sarma and S Nandi, QoS Support in Mobile Ad Hoc Networks, Third IEEE/IFIP International Conference on Wireless and Optical Communications Networks (WOCN 2006), Bangalore, India, 11-13 April, 2006.
  • S. S. Satapathy and N Sarma, TREEPSI: TRee based Energy Efficient Protocol for Sensor Information, Third IEEE/IFIP International Conference on Wireless and Optical Communications Networks (WOCN 2006), Bangalore, India, 11-13 April, 2006.
  • P S Reddy, N Sarma and R K Das, Enhancing Fault-tolerance in a Distributed Mutual Exclusion Algorithm, Ninth IEEE International Conference on Information Technology (CIT 2006), Bhubaneswar, India, 18-21 December, 2006.
  • Rajib K Das, Enhanced OTIS k-ary n-cube networks, accepted for presentation in ICDCIT 2006, Bhubaneswar, Dec 2006.
  • Utpal Sharma, Rajib K Das and Jugal K Kalita, Unsupervised Acquisition of Morphological Features of Assamese from a Text Corpus . National Workshop on Trends in Advanced Computing (NWTAC 2006), Tezpur, 23-24 January 2006, pp 178-184
  • Ramjee Dixit and Utpal Sharma, Universal Netwrking Language (UNL) Representation of Assamese Sentences . National Workshop on Trends in Advanced Computing (NWTAC 2006), Tezpur, 23-24 January 2006, pp 207-212
  • D.Das, S.S.Satapathy, A.K.Buragohain and S.K.Ray, , “Occurrence of all nucleotide combinations at the third and the first positions of two adjacent codons in open reading frames of bacteria” , Current Science, Vol. 90, No. 1, 10 January 2006.



2005 Publications

  • S M Hazarika and A G Cohn, Qualitative Spatial Change in a Mereotopology, Journal of Artificial Intelligence Research IOS Press, To Appear.
  • S. M. Hazarika and Hemanta Kalita, A Qualitative Preprocessor using RCC-5 for spatial data mining, DATA MINING 2005, Athens, Greece.
  • B. Bora, D. K. Bhattacharyya, A Distributed Density Based Clustering Algorithm for Large Dataset, Proc. of ICISIP 2005, January, 2005
  • S Dutta and S M Hazarika, Qualitative Approach to Synthesis of Planar Grasp, 2nd India International Conference on AI Pune, India, December 2005.
  • S M Hazarika, Closure Grasps using Qualitative Kinematics 12th National Conference on Mechanisms and Machines, Guwahati, India, December 2005.
  • A Mukerjee and S M Hazarika, Heterogeneous Mereotopology International Joint Conference on AI - 07, Workshop on Spatial and Temporal Reasoning, Hyderabad, India, 2007.
  • B Bora and D K Bhattacharyya, Image Retrieval by Content Using Segmentation Approach, in the Proc of PREMI'2005 (LNCS-Springer-Verlag), December, 2005.
  • A Das and D K Bhattacharyya, Rule Mining in Dynamic Databases, in the Australasian Journal of Information Systems (AJIS), vol 13, no 1, pp 19-39, September, 2005.
  • A Das and D K Bhattacharyya, View Materialization Using Self Information, in the Proc of PREMI'2005 (LNCS Springer-Verlag), December, 2005.
  • S Roy and D K Bhattacharyya, An Approach to Find Embedded Clusters Using Density Based Technique, ICDCIT 2005, LNCS 3816, Springer-Verlag Berlin Heidelberg, pp. 523-535, 2005.
  • B Nath and D K Bhattacharyya, Partition Based Association Rule Mining in Cancer Databases Using Multi-objective Genetic Algorithms in the Proc of BIOT'2005, Colorado, 2005. PP 85-
  • B Nath, D K Bhattacharyya and A Ghosh, Partition Based Association Rule Mining Using Multi-objective Genetic Algorithm, in the Proc of ADCOM'2005, December, 2005.
  • A Ahmed, B Bora and D K Bhattacharyya, A Frequency Vector Based Hierarchical Clustering Algorithm for Mixed Type of Data, in the Proc of ADCOM'2005, December, 2005.
  • B Bora and D K Bhattacharyya, A Density based Subspace Clustering technique for Gene Expression Data, in the Proc of BIOT-2005, October, 2005, USA.
  • N Sarma and S Nandi, Enhanced QoS Support in Mobile Ad Hoc Networks, in the proc of Intl Conference on Telecommunications and Networks (TeNe05), Bridgeport University, USA, 10-20 Dec, 2005.
  • Rajib K Das, Routing and topological properties of enhanced OTIS-cube, in Proceedings of ADCOM 2005, Coimbatore, 2005.
  • Rajib K Das, Fault tolerant routing in folded hypercubes using extended safety vector, Proceedings of ADCOM 2005, Coimbatore, 2005.
  • Rajib K Das, Fault tolerant routing in star graphs using fault vector, Lecture Notes in Computer Science, Springer Verlag GmbH, ISSN:0302-9743, Vol. 3741/2005, Proceedings of IWDC 2005, pp. 475-486, Kharagpur, 2005.
  • S.K.Verma, D.Das, S.S.Satapathy, A.K.Buragohain and S.K.Ray, “Compositional symmetry of DNA duplex in bacterial genomes”, Current Science, Vol. 89, No. 2, 25 July 2005



2004 Publications

  • M Dutta, et al. An algorithm for clustering large categorical databases using a fuzzy set based approach, communicated to PKDD 2004 (8th European Conference on Principles and Practice of Knowledge Discovery in Data Bases).
  • B Bora and D K Bhattacharyya, An Improved Sampling Based DBSCAN for Clustering Large Spatial Databases, Proc of ICISIP-2004 (IEEE Press), Chennai, pp 92-96
  • A Das and D K Bhattacharyya, FFC:Feature Selection Using Frequency Count, accepted for publication in the WI'2004 (ACM/IEEE), China, 2004.
  • R K Das and D K Bhattacharyya, Parallel Algorithm for Density Based Clustering over Large Databases, Proc. of CIT-2004, Orissa, 2004, pp.89-92
  • P J Dutta, D Bhattacharyya, J Kalita and M Dutta, Spatial Color Indexing using Clustering Technique, accepted in the SCI'2004, Orlando, USA, 2004.
  • A Das and D K Bhattacharyya, Faster Algorithms for Association Rule Mining, accepted in the CCCT'2004, Austin (Texas), USA, 2004.
  • B Bora, D K Bhattacharyya and J K Kalita, Image Retrieval by Content Using Segmentation Approach, accepted in the CCCT'2004, Austin (Texas), USA, 2004.
  • S. Saharia, P. K. Bora, D. K. Saikia, A Comparative Study on Discrete Orthogonal Chebyshev Moments and Legendre Moments for Representation of Printed Characters, Proc. of 4th Indian Conference on Computer Vision, Graphics & Image Processing, India Statistical Institute, Kolkata Dec 16-18, 2004.
  • B. Bora, D. K. Bhattacharyya, and R. K. Das, A Parallel Density-Based Data Clustering Technique on Distributed Memory Multicomputers, Proc. of ADCOM 2004, Ahmedabad.
  • R. K. Das, Adaptive fault-tolerant routing in star-graphs, Lecture Notes in Computer Science, Springer-Verlag Heidelberg, ISSN: 0302-9743, Volume 3326 / 2004, Proc. of IWDC, Kolkata, December, 2004.
  • B Roychoudhury, D K Saikia, A Macro-Mobility Scheme for Reduction in Handover Delay and Signaling Traffic in MIPv6, Lecture Notes in Computer Science, Springer-Verlag Heidelberg, ISSN: 0302-9743, Volume 3326 / 2004, Proc. of IWDC, Kolkata, December, 2004.
  • N. Sarma, S. K. Singh, A Mutual Exclusion Algorithm for Mobile Ad hoc Networks, Proc. of the National Workshop on WNMC04, Tezpur, August 2004.
  • N. Sarma, B. Bora, Provisioning QoS in Mobile Ad hoc Networks, Proc. of the National Workshop on WNMC04, Tezpur, August 2004.
  • B. Roychoudhury, D. K. Saikia, Performance Enhancing of Mobile IPv6 Through Mobile Agents, Proc. of the National Workshop on WNMC04, Tezpur, August 2004.
  • M. Dahal, D. K. Saikia, An RTT Based Congestion Control Scheme for TCP and its Performance in Wireless Environment, Proc. of the National Workshop on WNMC04, Tezpur, August 2004.
  • A. Das, D. K. Bhattacharyya, Rule Mining in Dynamic Databases, Lecture Notes in Computer Science, Springer-Verlag Heidelberg, ISSN: 0302-9743, Volume 3326 / 2004, Proc. of IWDC, Kolkata, December, 2004.
  • A Das and D K Bhattacharyya, Faster Algorithms for Association Rule Mining, in the Proc of ADCOM2004, Ahmedabad, India, December 2004.
  • A Das and D K Bhattacharyya, Efficient Rule Mining in Dynamic databases, in the Proc of IWDC'04 (LNCS Series), pp 46-51, 2004
  • Ashish Ghosh, Bhabesh Nath, Multi-objective rule mining using genetic algorithms, Information Sciences, vol 163, No 1-3, pp 123-133, Elsevier Inc. 2004



2003 Publications

  • U Sharma, J Kalita, and R K Das. Root Word Stemming by Multiple Evidence from Corpus. 6th International Conference on Computational Intelligence and Natural Computing (CINC-2003), North Carolina, September 26-30, 2003.
  • D K Saikia, M Dahal, Packet Loss Free Congestion Control in TCP for Controlled Packet Latency and Optimal Throughput, Proc. Of the IEEE TENCON 2003, Bangalore, 14-17 October, 2003.
  • B Roychoudhury, D K Saikia, Handover Management in Mobile Ipv6 Using Mobile Agents, Proc. of the Intnl Conf. On Information Technology, Bhubaneswar, December, 2003.
  • M Dutta, et al. QROCK : A quick version of the ROCK algorithm for clustering of Categorical data, Proceedings of the International Conference on Information Technology, Vol II ,ITPC-2003 (Information Technology Prospects and Challenges), May 2003, Nepal.
  • M Dutta et al. A new method for computing two-cluster projections in the Cactus algorithm, Proceedings of CIT 2003 (International Conference on Information Technology. 2003, Bhubaneswar, India.
  • I Hussain and N Sarma. A Fault-Tolerant Task Scheduling for Real-Time Multiprocessor Systems, Proceedings of CIT 2003 (International Conference on Information Technology) 2003, Bhubaneswar, India, pp 308-313
  • G Singh, B Bora and D K Bhattacharyya, Spatial Data Mining and Its Application in Information Retrieval, Proc. of RTPS-2003, Guwahati, India
  • N Sarma and D K Bhattacharyya, A Secure Payment Protocol, Proc. of RTPS-2003, Guwahati, India
  • A Das and D K Bhattacharyya, Efficient Rule Mining for Dynamic Database, Proc.of ITPC-2003, vol 1, May, 2003, Kathmandu, Nepal, pp 25-30
  • D K Bhattacharyya and S Nandi, Digital Watermarking Using Information Theoretic Approach, Proc. of ITPC-2003, vol 2, May, 2003. Kathmandu, Nepal, pp 141-147
  • A Das, D K Bhattacharyya and J Kalita, Horizontal vs Vertical Partitioning in Association Rule Mining: A Comparison Proc. of CINC-2003, North Carolina, USA
  • S. Saharia, P. K. Bora, D. K. Saikia, Representation of Printed Characters with Legendre Moments, Proc. of 5th International Conference on Advances in Pattern Recognition 2003, Dec 11-13, 2003, India Statistical Institute, Kolkata.
  • Rajib K Das and Dhruba K Bhattacharyaya, Parallel Algorithm for Clustering in Large Spatial Database, CIT 2003, December 21-25, 2003, Bhubaneswar.



2002 Publications

  • G. Cohn, D. Magee, A. Galata, D. Hogg and S. M. Hazarika Towards an Architecture for Cognitive Vision using Qualitative Spatio-Temporal Representations and Abduction Spatial Cognition III, Lecture Notes in Artificial Intelligence, Springer
  • S. M. Hazarika and A.G. Cohn Abducing Qualitative Spatio-Temporal Histories from Partial Observations Principles of Knowledge Representation and Reasoning: Proceedings of KR'02, April 2002. Morgan Kaufmann.
  • U. Sharma, J. Kalita, and R. K. Das. Unsupervised Learning of Morphology for Building a Lexicon for Highly Inflectional Language. Morphological and Phonological Learning: Proceedings of the 6th Workshop of the ACL Special Interest Group in Computational Phonology (SIGPHON), July 2002, Philadelphia, ACL, pp 1-10
  • U. Sharma, J. Kalita, and R. K. Das. Classification of Words Based on Affix Evidence. International Conference on Natural Language Processing, ICON-2002, December 18-21, 2002, Mumbai, Vikas Publishing House Pvt Ltd., New Delhi, pp 31-39
  • B. Roychoudhury, D. K. Saikia, Optimization of Mobile IP Binding Update Traffic, Proc. Of the Intnl Workshop on Distributed Computing, January, 2002, Calcutta University.
  • M Dutta et al. A fast summary based algorithm for clustering large categorical databases, Proceedings of ICWES12, Ottawa, CANADA



2001 Publications

  • G. Cohn and S. M. Hazarika Continuous Transitions in Mereotopology Commonsense-2001 Fifth Symposium on Logical Formalizations of Commonsense Reasoning, May 2001, New York, pp 71-80.
  • S. M. Hazarika and A. G. Cohn Qualitative Spatio-Temporal Continuity Conference on Spatial Information Theory (COSIT-01), Lecture Notes in Computer Science No. 2205, September 2001, Springer, pp 92-107.
  • S. M. Hazarika and A. G. Cohn Qualitative Self-Localization using a Spatio-Temporal Ontology: A Preliminary Report IJCAI-01 Workshop on Spatial and Temporal Reasoning with an Agents' Focus August 2001, Seattle, Washington, USA.
  • S. M. Hazarika and A. G. Cohn Taxonomy of Spatio-Temporal Vagueness: An Alternative Egg-Yolk Interpretation. Joint COSIT-FOIS Workshop on Spatial Vagueness, Uncertainty and Granularity, October 2001, Maine, USA..
  • B. Roychoudhury, D. K. Saikia, Client Server Adaptation in Mobile Environment, Proc. of The National Workshop on Mobile Computing, 11-12 January, 2001.Tezpur, India.
  • M Dutta et al. An Incremental Clustering Algorithm for clustering large sets of Categorical Data, Proceedings of CIT 2001 (4th International Conference on Information Technology), 20-23 Dec 2001, National Institute of Science and Technology, Berhampur, Orissa,. pp 45-50.
  • G. Cohn and S. M. Hazarika, Qualitative Spatial Representation and Reasoning: An Overview, Fundamenta Informaticae, Vol. 46, No. 1-2, pp 1-29, IOS Press, April 2001
  • M Dutta et al. An algorithm for clustering of categorical data using the concept of neighbours, Proceedings of the 1st National Workshop on Soft Data Mining and Intelligent Systems (SDIS-2001), September 2001, Tezpur University, pp 103-205.
  • G. Cohn and S. M. Hazarika, Spatio-Temporal continuity in Geographic Space, Specialist Meeting on Fundamental Questions in Geographical Information Science, July 2001, Manchester, England.
  • M Dutta and D K Bhattacharyya, On the Complexity of ROCK Clustering Algorithm, Proc of SDIS'01, September 2001, Tezpur University, pp 97-101, 2001.
  • B Bora and D K Bhattacharyya, GA in Robust Clustering, Proc of SDIS'01, September 2001, Tezpur University, pp 31-36.
  • A Das and D K Bhattacharyya, Effective Rule Mining Using Modified Apriori, Proc of SDIS'01, September 2001, Tezpur University, pp 117-119.
  • A Das and D K Bhattacharyya, Efficient Rule Mining using Vertical Partitioning, Proc of CIT2001, December, 2001, Orissa.
  • Smriti K. Sinha and Gautam Barua, PAGE CUBE: A Model for Storage and Retrieval of Documents Relevant to a Document Production Workflow in an Office, Proc. of the 7th International Conference on Database Systems for Advanced Applications (DASFAA'01) April 18-20 2001, Hong Kong, China, IEEE Computer Society Press, pp 74-81.



2000 Publications

  • Bennett, A. G. Cohn, P. Torrini and S. M. Hazarika Describing Rigid Body Motions in a Qualitative Theory of Spatial Regions Proceedings of AAAI-2000, July 2000, Austin, Texas, USA, AAAI Press, pp 503-509.
  • B. Bennett, A. G. Cohn, P. Torrini and S. M. Hazarika A Foundation for Region-Based Qualitative Geometry Proceedings of European Conference on AI (ECAI-2000), August 2000, Berlin, Germany, IOS Press, pp 204-208.
  • D K Bhattacharyya and S Nandi, CA in Password-only Authenticated Key Exchange, Proc of Int'nl Conference on IT and Communication, August, 2000, Bangkok, Thailand, pp 89-97.
  • S R Siddique and D K Bhattacharyya, A Secure Dual Watermarking Technique, Proc. of ICCCD2000 (Vol II), December, 2000, Kharagpur, India, pp 667-670.
  • S R Siddique and D K Bhattacharyya, A Simplified Dual Watermarking Technique, Proc. of ADCOM2000 (IEEE), December, 2000, Cochin, India, pp 318-321.
  • R K Das, A Das and D K Bhattacharyya, A Distributed k-medoids Algorithm for Large Data Sets, Proc of WDC2000, 2000, Jadavpur, India.
  • D K Bhattacharyya, A Das and R K Das, A New Distributed Algorithm for Large Data Clustering, Proc. of IDEAL2000 (LNCS Series), 2000.Springer-Verlag, Berlin, Heidelberg, pp 29-34.
  • R. K. Das, A Scalable Parallel Algorithm for k-means Clustering, Proc. of 8th International Conference on Advanced Computing and Communications (ADCOM 2000), December 14-16, 2000, Cochin, India, pp. 250-253.
  • R. K. Das, A Parallel k-medoids Clustering Algorithm, Proc. of 8th International Conference on Advanced Computing and Communications (ADCOM 2000), December 14-16, 2000, Cochin, India, pp. 328-331.
  • R K Das and D K Bhattacharyya, A New Scheme for SEC-DED Codes, Proc of Int'nl Conference on IT and Communication, August, 2000. Bangkok, Thailand, pp 81-89.
  • C. Goswami, S. Saharia, Making Quality of Education Globally Equivalent : Networking of Academic Institutions , Management Paradigms in the E-Millenium, Proc. of 12th Annual Convention of Association of Indian Management Schools, Aug 6-8, 2000.
  • Smriti K. Sinha and Gautam Barua, A Protocol for Secure Flow of Persistent Multi-Part Documents in an Office , Proc. of the International Forum cum Conference on Information Technology and Communication at the Dawn of the New Millennium, Vol 3, August 2000, Bangkok, Thailand, pp 157-172.



1999 Publications

  • D K Bhattacharyya, R K Das and S Nandi, FFT based Enciphering Scheme, Proc of CIT99, India, pp. 249-254.
  • D K Bhattacharyya, R K Das and S Nandi, An Efficient Image Clustering Scheme, Proc of CIT99, India, pp. 244-249.
  • D K Bhattacharyya and S Nandi, CA based Encryption Scheme, Proc of NCET99, India, pp 26-33.
  • S. M. Hazarika, Reaching an Optimum Mechanism through Perturbations and Comparative Graphs, Journal of the Institution of Engineers (India), Vol. 14 No.2, 1999.
  • D K Bhattacharyya and S Nandi, Efficient Design of ENCA based Cipher System, Journal of IETE Research, vol 47, no 3, May-June, 1999. pp 163-173
  • D K Bhattacharyya and S Nandi, Design of new Class of t-EC / d-ED / AUED Codes, Journal of IETE Research, vol 45, no 5, October, 1999.
  • Smriti K. Sinha and Gautam Barua, An Architecture for Document Production Workflow in an Office, Proc. of International Conference on Information Technology (CIT99), Dec 1999, Bhubaneswar, India, Tata McGraw Hill Publishers, pp 45-52.



1998 Publications

  • D K Bhattacharyya and S Nandi,Theory and Design of SEC-DED-AUED Codes, in Digital Computer Technique, IEE(E), vol 145, no 2, pp 1-6, March, 1998
  • D. K. Saikia, R. K. Sen, R. Badrinath, Embedding Torus on the Star Graph, IEEE Transaction on Parallel and Distributed Computing, Vol.9, No. 7, July, 1998.