Pattern Recognition, Machine Learning, Data Mining, Image processing, Information Security
| From | To | Designation | Organisation |
|---|---|---|---|
| 19-06-2001 | 19-06-2009 | Lecturer | NERIST |
| 19-06-2009 | 19-06-2015 | Assistant Professor | NERIST |
| 19-06-2015 | Till date | Associate Professor | NERIST |
| Degree | Subject | University | Year |
|---|---|---|---|
| B.Tech | CSE | NEHU | 1999 |
| M.Tech | CSE | NERIST | 2011 |
| PhD | CSE | TEZPUR UNIVERISiTY | 2024 |
| Topic | Funding Agency | Year |
|---|---|---|
| E-Learning & E-Examination | MHRD | 2004 |
IEEE membership, ACM membership
| Title | Course Code | Module | Semester |
|---|---|---|---|
| Application Software | (CS-4102) | Diploma | Semester-I |
| System Software | (CS 4101) | Diploma | Semester-I |
| Object Oriented Programming in C++, | (CS 4301) | Degree Bridge | Semester-I |
| Computer Architecture | (CS 5204) | Degree | Semester-II |
| Data Processing and File System | (CS 3201/CS 4401) | Diploma/Degree Bridge | Semester-II |
| Programming in Java | CS 4202/ CS 4401 | Diploma/Degree Bridge | Semester-II |
| Principles of Programming Language | CS 4104 | Degree | Semester-I |
| Basics of Computer | ES-3100 | Diploma | Semester-I |
| System Software () | CS 4101 | Diploma | Semester-I |
| Software Engineering | CS 5102 | Degree | Semester-I |
| Advanced Computer Architecture | IT-7101 | PG | Semester-I |
| High Performance Computing | CS 7103 | PG | Semester-I |
| Advanced Image Processing | CS 7013/IT 7011 | PG | Semester-II |
| Pattern Recognition and Application | IT 7026 | PG | Semester-II |
| Title of Project | Names of Students |
|---|---|
| The Prospect of DNA Computing - Theories in Cryptography using RSA Algorithm | Ms. Geeta Kuli, M.Tech (CSE) |
| Information Security Scheme using DNA computing with Traditional Cryptography Algorithm | Ms. Himakshi Haloi, M.Tech (IT) |
| Multimodal Biometric Recognition Techniques Based on Decision level Fusion. | Ms. Rimarani Chutia, M.Tech (CSE) |
| Attacks on Biometrics and its Countermeasure :: A Biocryptosystem Approach. | Ms. Payel Borah, M.Tech(IT) |
| Course Name | Sponsored By | Date |
|---|---|---|
| “Behavioural Competency Development: Psychological Aspects” | AICTE | March 23-27, 2009 |
| Staff Development Programme on "Soft Computing in Engineering Applications", | AICTE | 25th January to 5th February 2010 |
| North East Spring School on “Graphs: Theory, Algorithms and Applications” | ISI, Kolkata | February 22-25, 2010 |
| FDP on "Emerging Research Areas in Computer Science and Information Technology" | TEQIP | 1st to 5th May'12 |
| FDP workshop on Engineering Optimization. | TEQIP | 14th May to 18th May, 2012 |
| FDP on Advance in Integrated Manufacturing & Robotic | TEQIP | 26th June-30th June, 2012 |
| FDP on Advances in Networking Technplogies | TEQIP | 29th April to 3rd May, 2013 |
| FDP on " Advances in Electronics & Communication (AEC)" | TEQIP | 22nd -26th, July , 2013 |
| FDP on " Advances in Computer Science and Engineering ", | TEQIP | August 26th -30th , 2013 |
| FDP on " Optical Technique and Devices in Scientific and Engineering System Application" | TEQIP | 28th Oct. - 1st Nov. 2013 |
| FDP on "Emerging Research Issues in Speech and Natural language Processing" | TEQIP | 30th Sept. to 4th Oct. 2013 |
| FDP on " Appropriate Technology for Rural Development" | TEQIP | August 25th -29th, 2014 |
| Conference Name | Sponsored By | Date |
|---|
| Title | Place | Date |
|---|---|---|
| Tools and Technique for designing Multimedia Webpage and Web server. | NERIST | Dec 16th to 26th , 2003 |
| Information Security – A Practical Approach | NERIST | March 10th to 16th , 2008 |