पूर्वोत्तर क्षेत्रीय विज्ञान एवं प्रौद्योगिकी संस्थान   
North Eastern Regional Institute of Science and Technology 
deemed-to-be-university under the Ministry of Education, Govt. of India
Nirjuli - 791109, Arunachal Pradesh 
Skip to main content
faculties

MS Margaret Kathing

Associate Professor

Image Processing, HCI, Information Security.

E-mail: mk[AT]nerist(dot)ac(dot)in
Phone (EPBX/Office): 0360-2257401-8 extn. 6232, Mobile : 9436059101

  • Professional Background
  • Educational Details
  • Sponsored Research Projects
  • Memberships in Professional bodies
  • Teaching Engagements
  • Projects and Thesis Supervised/ Currently Supervising
  • Participation in short term courses
  • Courses or Conferences Organised
  • Special Lectures Delivered
  • Publications
From To Designation Organisation
19-06-2001 19-06-2009 Lecturer NERIST
19-06-2009 19-06-2015 Assistant Professor NERIST
19-06-2015 Till date Associate Professor NERIST
Degree Subject University Year
B.Tech CSE NEHU 1999
M.Tech CSE NERIST 2011
Topic Funding Agency Year
E-Learning & E-Examination MHRD 2004

IEEE membership, ACM membership

Title Course Code Module Semester
Application Software (CS-4102) Diploma       Semester-I
System Software (CS 4101) Diploma Semester-I
Object Oriented Programming in C++, (CS 4301) Degree Bridge Semester-I
Computer Architecture (CS 5204) Degree Semester-II
Data Processing and File System  (CS 3201/CS 4401) Diploma/Degree Bridge Semester-II
Programming in Java CS 4202/ CS 4401 Diploma/Degree Bridge Semester-II
Principles of Programming Language CS 4104 Degree Semester-I
Basics of Computer ES-3100 Diploma Semester-I
System Software () CS 4101 Diploma Semester-I
Software Engineering CS 5102 Degree Semester-I
Advanced Computer Architecture IT-7101 PG Semester-I
High  Performance Computing CS 7103 PG Semester-I
Advanced Image Processing CS 7013/IT 7011 PG Semester-II
Pattern Recognition and Application IT 7026 PG Semester-II
Title of Project Names of Students
The Prospect of DNA Computing  - Theories in Cryptography using RSA Algorithm Ms. Geeta Kuli, M.Tech (CSE)      
Information Security Scheme using DNA computing with Traditional Cryptography Algorithm Ms. Himakshi Haloi, M.Tech (IT)
Multimodal Biometric Recognition Techniques Based on Decision level Fusion. Ms. Rimarani Chutia, M.Tech (CSE)
Attacks on Biometrics and its Countermeasure :: A Biocryptosystem Approach. Ms. Payel Borah, M.Tech(IT)
Course Name Sponsored By Date
“Behavioural Competency Development: Psychological Aspects”                  AICTE   March 23-27, 2009
Staff Development Programme on "Soft Computing in Engineering Applications",   AICTE 25th January to 5th February 2010
North East Spring School on “Graphs: Theory, Algorithms and Applications”  ISI, Kolkata February 22-25, 2010
FDP on "Emerging Research Areas in Computer Science and Information Technology" TEQIP 1st to 5th May'12
FDP workshop on Engineering Optimization. TEQIP 14th May to 18th May, 2012
FDP on Advance in Integrated Manufacturing & Robotic TEQIP 26th June-30th June, 2012
FDP on Advances in Networking Technplogies  TEQIP 29th April to 3rd May, 2013
FDP on " Advances in Electronics & Communication (AEC)"  TEQIP 22nd -26th, July , 2013
FDP on  " Advances in Computer Science and Engineering ",      TEQIP August 26th -30th , 2013
FDP on " Optical Technique and Devices in Scientific and Engineering System Application"                   TEQIP   28th Oct. - 1st Nov. 2013
FDP on "Emerging Research Issues in Speech and Natural language Processing"    TEQIP 30th Sept. to 4th Oct. 2013
FDP on " Appropriate Technology for Rural Development"  TEQIP August 25th -29th, 2014
Conference Name Sponsored By Date
Title Place Date
Tools and Technique for designing Multimedia Webpage and Web server. NERIST Dec 16th to 26th , 2003
Information Security – A Practical Approach NERIST March 10th  to 16th , 2008
  1. Integrating Face and Iris triat to design a Personal Authentication Technique(PAT) by using PCA &Canny edge detection Method:  Rima Rani Chutia, Margaret Kathing, Accepted and Presented in NCIT2015, 15th - 16th Sept. 2015, Rajiv Gandhi University, India.
  2. Biometric based Authentication  Techniques: A comparative Study: Rima Rani Chutia, Margaret Kathing, International Journal of Advanced Research in Computer Science and Software Engineering Volume 4, Issue 3, March 2014, 1117-1124.
  3. A Biometric Authentication Approach using Face Recognition System :Pallabi Saikia, Margaret Kathing,International Journal of Advanced Research in Computer Science and Software Engineering Volume 4, Issue 3, March 2014, 102-105.
  4.  Information Security Scheme using DNA computing with Traditional Cryptographic algorithm: Rimakshi Haloi, Margaret Kathing, International Conference on Convergence of Technology (I2CT), Pune, India , paper ID:1052, April 2014.
  5. Partial Image Encryption using Peter De Jong Chaotic Map Based Bit-plane PermutationUsing Matlab and their Performance Analysis:  Monjul Saikai, Nitumani Hazarika , Margaret Kathing, ITC-5L, Chandigarh, March 20-21, ACEEE  2014
  6. Library Automation in Cloud : Deka Ganesh Chandra, Margaret Kathing, Das Prashanta Kumar, 5th International Conference on Computational Intelligence and Communication Networks(CICN 2013) Muthura, 27-29 Sept. 2013, Page No. 474 - 479  DOI: 10.1109/CICN.2013.104EID: 2-s2.0-84892630738
  7. Face Detection using Skin Colour Model and taking the distance between the Eyes: Pallabi Saikia,, Gollo Janam, Margaret Kathing, International Journal of Computing, Communications and Networking Volume 1, No.3, November – December 2012
  8. Overview of Image Retrieval Methods on Basis of Face Recognition: Margaret Kathing, M. Saikai and T.Tuithung, National Conference on "Emerging Trends in Engineering, Technology & Sciences for Sustainable Development" (ETETSSD-2012) held on 05th-06th June 2012 in JNU New Delhi