
{"id":393,"date":"2025-01-06T15:56:59","date_gmt":"2025-01-06T10:26:59","guid":{"rendered":"https:\/\/oldbackup168.msit.edu.in\/computer-application\/?page_id=393"},"modified":"2025-05-24T12:41:25","modified_gmt":"2025-05-24T07:11:25","slug":"publications","status":"publish","type":"page","link":"https:\/\/oldbackup168.msit.edu.in\/computer-application\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Research Publications &amp; Achievements<\/h3>\n\n\n\n<p>1. Aparna Datta,Ashis Datta and Biswajit Biswas&nbsp;&#8220;A Fuzzy Multilayer Perceptron Network based detection and classification of lobar intracerebral hemorrhage from Computed Tomography images of brain&#8221;, 3rd&nbsp; International Conference on ReTIS of the IEEE,2011.&nbsp;<\/p>\n\n\n\n<p>2.  Aparna Datta,Ashis Datta,\u201d A method for automatic detection and classification of lobar ischaemic stroke from brain CT images\u201d.2017,&nbsp; Computer, Communication and Electrical Technology (pp.343-348), doi:&nbsp;<a href=\"https:\/\/www.researchgate.net\/deref\/http%3A%2F%2Fdx.doi.org%2F10.1201%2F9781315400624-63\">10.1201\/9781315400624-63<\/a><\/p>\n\n\n\n<p>3. A. Datta,S.Ghosh,A Datta \u201cclassification of motor imagery-based eeg for controlling robotic hand movement.\u201dI3SET2022: International Conference on Information, Innovation &amp; Intelligence Systems for Emerging Technologies .<\/p>\n\n\n\n<p>4. A. Datta and S. Ghosh, \u201cMethodical Prediction of Cardiovascular Disease Using Consolidated Machine Learning Classification Algorithms and Analysis,\u201d <em>International Journal of Computer Sciences and Engineering<\/em>, vol. 11, no. 1, pp. 76\u201380, 2023, [Online]. Available: <a href=\"http:\/\/www.ijcseonline.org\">www.ijcseonline.org<\/a><\/p>\n\n\n\n<p>5. A. Datta, P. Mukherjee, and G. Paul, \u201cCNN-based Binary and Categorical Model to Detect Tumor from MR Images,\u201d <em>International Journal of Computer Sciences and Engineering<\/em>, vol. 11, no. 1, pp. 56\u201361, 2023, doi: 10.34740\/kaggle\/dsv\/2645886.<\/p>\n\n\n\n<p>6. Projato Chakraborty, Aditya Basak,Hemanta Dey,Aparna Datta and Ashoktaru Pal \u201c<a href=\"https:\/\/drive.google.com\/file\/d\/1gR-fQksUONEOrOoP1m9MdJqrJPiiaBuD\/view?usp=sharing\">HEALTHZOID: A Machine Learning Based Disease Diagnosis System<\/a>\u201d, <a href=\"https:\/\/cmjjournal.com\/\">Communication and Management Journal<\/a>, ISSN : 2269-7195,Volume 8,Issue 12,2023,Pp(227-243), DOI:- <a href=\"https:\/\/cmjjournal.com\/volume-8-issue-12-2023-2\/\">10.36896\/CMJ2023.V8I12.23.21312<\/a>&nbsp;<\/p>\n\n\n\n<p>7.A. Datta and S. Ghosh, \u201cUnlocking Neural Commands-EEG Classification for Robotic Hand Control through Motor Imagery.\u201d 1st International Conference on Recent Innovation in Science,Computing and Communication (RISCC 2024), 19th- 20th April, 2024<\/p>\n\n\n\n<p>8. G. Paul,B Roy,A.datta \u201cRevolutionizing Chronic Kidney Disease Detection System through Machine Learning and Client-Server Integration.\u201d 2<sup>nd<\/sup>&nbsp;International Conference on Data Analytics and Insights (ICDAI-2024)&nbsp;on July 25-27, 2024<\/p>\n\n\n\n<p>9. A. Datta, A. Mondal, and A. Sarkar, \u201cKey Logger and Prevention of Security Breaches,\u201d 2024, pp. 107\u2013122. doi: 10.4018\/979-8-3693-9235-5.ch006.<\/p>\n\n\n\n<p>10.A. Datta and S. Sen, \u201cA Security and Privacy Validation Methodology for E-Health Systems Using Cloud Storage,\u201d 2024, pp. 173\u2013192. doi: 10.4018\/979-8-3693-9235-5.ch009.<\/p>\n\n\n\n<p>11. A. Datta and M. Gomes, \u201cPhishing Detection System Using Machine Learning,\u201d 2024, pp. 331\u2013354. doi: 10.4018\/979-8-3693-6665-3.ch015.<\/p>\n\n\n\n<p>12. Subhayan Bhattacharya (JU), Sankhamita Sinha (MSIT), and Prof. Sarbani Roy (JU)<br><em>Impact of Structural Properties on Network Structure for Online Social Networks<\/em><br><em>International Conference on Computational Intelligence and Data Science (ICCIDS 2019), published in Procedia Computer Science Journal, Elsevier.<\/em><\/p>\n\n\n\n<p>13. Subhayan Bhattacharya (JU), Sankhamita Sinha (MSIT), Prof. Sarbani Roy (JU), and Amarnath Gupta<br><em>Towards Finding the Best-Fit Distribution for OSN Data<\/em><br><em>Published in The Journal of Supercomputing, March 2020.<\/em><br>DOI:\u00a010.1007\/s11227-020-03232-y<\/p>\n\n\n\n<p>14. Saubhik Goswami, Tanmay Singha<br><em>Classification in Data Mining Using POEMs\/GA Algorithm<\/em><br><em>Presented at the 2017 International Conference on Energy, Communication, Data Analytics, and Soft Computing (ICECDS), IEEE.<\/em><\/p>\n\n\n\n<p>15. Soumya Chakravarty, Arijit Sil<br><em>2D Line Clipping Algorithm Using Pixel Color Attribute<\/em><br><em>Published in Advances in Computer Science and Information Technology (ACSIT), Volume 2, Number 4 (April-June, 2015).<\/em><\/p>\n\n\n\n<p>16. Reshmi Maulik, Subhajit Datta and Subhashis Majumdar,\u201d The Causality of Bug Resolution: A Tale of Two Systems&#8221;, In 33rd ACM International Conference on the Foundations of Software Engineering (FSE Companion \u201925),<\/p>\n\n\n\n<p>June 23\u201328, 2025, Trondheim, Norway. ACM, New York, NY, USA, 8 pages. https:\/\/doi.org\/10.1145\/3696630.3731616.<\/p>\n\n\n\n<p>17. Reshmi Maulik, Subhajit Datta and Subhashis Majumdar,\u201d The Effects on Bug Resolution Time: A Causal<\/p>\n\n\n\n<p>Discovery Perspective&#8221;, 3rd Analytics Global Conference. March 8-9, 2025, NSHM Institute of Computing and Analytics Kolkata.<\/p>\n\n\n\n<p>18. Reshmi Maulik, Michael Gomes, Abhiraj Sardar, Subhajit Datta and Subhashis Majumdar,\u201d Aadhaar Trust: Strengthening the Legal System\u2019s Data Integrity\u201d, First International Conference on Multi-disciplinary Research Trends in Engineering and Technology (ICMRTET) 2024, March 12-13, 2024, ISBN no: 978-93-340-3091-4.<\/p>\n\n\n\n<p>19. Reshmi Maulik, Subhajit Datta and Subhashis Majumdar,\u201d Litmus Test for Linus\u2019 Law: A Structural Equation Modeling Based Approach\u201d, Proceedings of the 26th International Conference on Evaluation and Assessment in Software Engineering (EASE 22), June 2022,pp-237-242.<\/p>\n\n\n\n<p>20. Reshmi Maulik and NabenduChaki,\u201d A Comprehensive review on Wormhole attacks in MANET\u201d, Procd International Conference on CISIM 2010, Krackow, Oct 8-10, 2010, pp-233-238<\/p>\n\n\n\n<p>21. Reshmi Maulik and NabenduChaki ,\u201dPhishNet: Enhancing the Security Aspect of IMS Users\u201d, The First International Conference on Networks &amp;amp; Communications (NetCoM-2009), Chennai, India, December 27-29, 2009.<\/p>\n\n\n\n<p>22. Reshmi Maulik, \u201cAn Overview of Phishing and Its Indian Perspective\u201d, National Conference on Recent Trends in Network Security and Cryptography (NCNSC 09), PES Institute of Technology, Bangalore, India, October 22-23, 2009.<\/p>\n\n\n\n<p>23. Reshmi Maulik,\u201d A Review on Mitigating Security Threats in Aadhaar\u201d, Indian Journal of Computer Science and Engineering (IJCSE), May- June, 2024, Vol. 15, No.3 e-ISSN : 0976-5166, p-ISSN : 2231-3850, DOI : 10.21817\/indjcse\/2024\/v15i3\/241503027.<\/p>\n\n\n\n<p>24. Reshmi Maulik and NabenduChaki, \u201cA Study on Wormhole Attacks in MANET\u201d, IJCISIM, Vol3(2011), pp-271-279. ISBN no- 2150-7988<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Research Publications &amp; Achievements 1. Aparna Datta,Ashis Datta and Biswajit Biswas&nbsp;&#8220;A Fuzzy Multilayer Perceptron Network based detection and classification of [&hellip;]<\/p>\n","protected":false},"author":57,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"left-sidebar","site-content-layout":"","ast-site-content-layout":"","site-content-style":"boxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-393","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/oldbackup168.msit.edu.in\/computer-application\/wp-json\/wp\/v2\/pages\/393"}],"collection":[{"href":"https:\/\/oldbackup168.msit.edu.in\/computer-application\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/oldbackup168.msit.edu.in\/computer-application\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/oldbackup168.msit.edu.in\/computer-application\/wp-json\/wp\/v2\/users\/57"}],"replies":[{"embeddable":true,"href":"https:\/\/oldbackup168.msit.edu.in\/computer-application\/wp-json\/wp\/v2\/comments?post=393"}],"version-history":[{"count":7,"href":"https:\/\/oldbackup168.msit.edu.in\/computer-application\/wp-json\/wp\/v2\/pages\/393\/revisions"}],"predecessor-version":[{"id":593,"href":"https:\/\/oldbackup168.msit.edu.in\/computer-application\/wp-json\/wp\/v2\/pages\/393\/revisions\/593"}],"wp:attachment":[{"href":"https:\/\/oldbackup168.msit.edu.in\/computer-application\/wp-json\/wp\/v2\/media?parent=393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}