पूर्वोत्तर क्षेत्रीय विज्ञान एवं प्रौद्योगिकी संस्थान
North Eastern Regional Institute of Science and Technology 
deemed university under MHRD, Govt.of India
Nirjuli - 791109, Arunachal Pradesh
Skip to main content

Research: (Last Two Years)

  • Area of research
  • Recent Publication
  • Sponsored projects/Consultancy
Area of research Faculty
Image Processing  
Computer Networks  
Biometric Signal Processing  
Information Security  
Cryptography  
Network Security  
Reliability Engineering  
Artificial Intelligence  
Cognitive Radios  
Speech Processing  
Opportunistic Networks  
Wireless Sensor Networks  
Cloud Computing  
  1. Kapang Legoh, Utpal Bhattacharjee and Themrichon Tuithung, “Development of Multi-Variability Speech Corpus of Adi Language for Speech Recognition Researches,” International Journal of Advanced Research in Computer Science and Software Engineering, Vo. 3, No. 10, October 2013, P: 604-610. ISSN: 2277-128X
  2. Margaret Kathing, Suchismita Bhattacharjee, Roshni Rajkumari " A Comparative study of Counter mode with Cipher block chaining Message uthentication code Protocol (CCMP) and Temporal Key Integrity Protocol (TKIP):Wireless Security" in International Journal of Computing, Communications and Networking Volume 2, No.1, January –March 2013 ISSN 2319-2720.
  3. Roshni Rajkumari, Suchismita Bhattacharjee and Ningrinla Marchang, “A Survey on Spectrum Sensing based attack in Cognitive Radio Network and its Mitigation”, In Proc. EGTET, 7-8 March,2014, Don Bosco Unuversity, Assam
  4. G.C. Deka, Margaret Kathing, Das P. Kumar "A comparative Study on IPv4 and IPv6", In proceedings of International Conference on Communication Systems and Network  Technologies(CSNT 2013) MIR LABS, Gwalior, 6-8 April 2013 ISBN 978-0-7685-4958-3
  5. G.C. Deka, Margaret Kathing, Das P. Kumar "Library Automation in Cloud" at 5th International Conference on Computational Intelligence and Communication Networks(CICN 2013) Mathura, 27-29 Sept. 2013, Page No. 474 - 479 INSPEC Accession Number: 13896106
  6. V Thakur , M Saikia , "Hiding secret image in video," International Conference on Intelligent Systems and Signal Processing (ISSP- 2013), held at Gujarat on 1-2 March 2013 page 150-153, ISBN:978-1-4799-0316-0 doi:10.1109/ISSP.2013.6526892
  7. Hussain Ahmed Choudhury, Monjul Saikia "Comparative Study Of Block Matching Algorithms For Motion Estimation" International Conference on Advanced Computer Science & Information Technology (ICACSIT) Bhubaneswar, 17-11-2013 ISBN No.: 978-93-82702-39-9 page 1-6
  8. Swanirbhar Majumder, Monjul Saikia, Souvik Sarkar, and Subir Kumar Sarkar "A Novel SVD and GEP Based Image Watermarking" ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of CSI - Volume II, Advances in Intelligent Systems and Computing 249, DOI: 10.1007/978-3-319-03095-1_65, © Springer International Publishing Switzerland 2014
  9. M. Marjit Singh “QoS of MANet Through Trust Based AODV Routing Protocol by Exclusion of Black Hole Attack”, Elsevier Procedia Technology 10(2013) 530-537.
  10. M. Marjit Singh Computing Network Reliability Where Nodes are Imperfectly Reliable and Links are Perfectly Reliable”, Cyber Times International Journal of Technology and Management, Vol 6, Issue 1, Pp 108-113, October 2012-March 2013,ISSN: 2278-7518.
  11. M. Marjit Singh A Survey on Reliable Data Transfer Protocols for Wireless Sensor Networks”, Proceedings of International Conference on Reliability, Infocom Technologies and Optimization 2013, Pp 230-235,January 29-31, 2013, Amity University Noida, India, ISBN: 978-93-81583-85-2.
  12. M. Marjit Singh Towards techniques of detecting node replication attack in static wireless sensor networks”, International journal of information and computation technology, vol. 4, No. 2,( 2014), pp: 153-154. ISSN 0974-2239.
  13. Monjul Saikia “Hiding secret image in video,” International Conference on Intelligent Systems and Signal Processing (ISSP- 2013), Gujarat March 2013.
  14. Monjul Saikia Comparative Study Of Block Matching Algorithms For Motion Estimation” International Conference on Advanced Computer Science & Information Technology (ICACSIT) Bhubaneswar, Nov. 2013.
  15. Monjul Saikia “A Novel SVD and GEP Based Image Watermarking” ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of CSI – Volume II, Advances in Intelligent Systems and Computing 249, DOI: 10.1007/978-3-319-03095-1_65,  2014
  16. Margaret Kathing, Rima Rani Chutia, “Biometric based Authentication  Techniques: A comparative Study”, International Journal of Advanced Research in Computer Science and Software Engineering Volume 4, Issue 3, March 2014, ISSN: 2277 128X
  17. Margaret Kathing,  Pallabi Saikia, “Biometric Authentication Approach using Face Recognition System”, International Journal of Advanced Research in Computer Science and Software Engineering Volume 4, Issue 3, March 2014, ISSN: 2277 128X
  18. M. Marjit Singh, “Modified PCT on Variable Cipher Block Chaining Mode”, Springer AISC 340, DOI: 10.1007/978-81-322-2247-7_47, pp 457-465, 2015.
  19. M. Marjit Singh, “Preventing Node Replication Attack in Static Wireless Sensor Networks”, IEEE Xplore,DOI:10.1109/ICRITO.2014.7014687, 2014.
  20. M. Marjit Singh, “Reliability Computation of Mobile Adhoc Network Using Logistic Regression”, IEEE Xplore, DOI: 10.1109/WOCN.2014.6923060,2014.
  21. M. Marjit Singh, “Towards Techniques of Detecting Node Replication Attack in Static Wireless Sensor Networks”, International Journal of Information and Computation Technology, Vol 4, Number 2(2014), ISSN: 0974-2239, pp 153-164, 2014.
  22. Ningrinla Marchang, Suchismita Bhattacharjee, Roshni Rajkumari, "Cognitive Radio Networks Security Threats and Attacks : A Review", In Proc. International Conference on Information and Communication Technologies, PESITM, Shimoga, May 5-6, 2014.
  23. Ningrinla Marchang, Amar Taggu, Roshni Rajkumari and Suchismita Bhattacharjee Brahmacharjee, , “Dynamic Decision Rule for Cooperative Spectrum Sensing in Cognitive Radio Network”, IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT’15), 5th-7th March 2015.
  24. Ningrinla Marchang, Suchismita Bhattacharjee, Roshni Rajkumari, , “Effect of Colluding Nodes in Collaborative Spectrum Sensing” , IEEE 2nd International Conference on Signal Processing and Integrated Networks (SPIN’15), 19th-20th Feb 2015.
  25. Monjul Saikia, Hazarika Nitumoni;, "A novel partial image encryption using chaotic logistic map," International Conference on Signal Processing and Integrated Networks (SPIN-2014) 20-21 Feb. 2014 , vol., no., pp.231,236, doi: 10.1109/SPIN.2014.6776953.
  26. Monjul Saikia, Choudhury, Hussain Ahmed;, "Reduced three steps logarithmic search for motion estimation," International Conference on Information Communication and Embedded Systems (ICICES), 2014, vol., no., pp.1,5, 27-28 Feb. 2014
    doi: 10.1109/ICICES.2014.7033946.
  27. Monjul Saikia, Boruah Debabrat;, "Implementation of ElGamal Elliptic Curve Cryptography over prime field using C," Information Communication and Embedded Systems (ICICES), 2014 International Conference on , vol., no., pp.1,7, 27-28 Feb. 2014
  28. Monjul Saikia,  Margaret Kathing,  Nitumoni Hazarika ,  "Partial Image Encryption using Peter De Jong Chaotic Map based Bit-Plane Permutation and it’s Performance Analysis" published in ACEEE Fifth International Conference on Recent Trends in Information, Telecommunication and Computing ITC 2014 on Mar 21st at Chandigarh, India  ISBN: 978-94-91587-21-3 SearchDL ID: 02.ITC.2014.5.5  Page(s): 1 – 10 URL: http://searchdl.org/index.php/conference/view/751
  29. Monjul Saikia,Choudhury, Hussain Ahmed; "Survey on block matching algorithms for motion estimation," IEEE international conference on Communications and Signal Processing (ICCSP), 2014 International Conference on , vol., no., pp.036,040, 3-5 April 2014 doi: 10.1109/ICCSP.2014.6949794
  30. Monjul Saikia, Hussain Ahmed Choudhury, "Cross Three Steps Logarithmic Search For Motion Estimation" Published in IEEE International Conference on Convergence of Technology 6th – 8th April 2014 at Pune, India. ISBN: 978-1-4799-3759-2/14 page
  31. Monjul Saikia,Hazarika, N.; Borah, S.; "A wavelet based partial image encryption using chaotic logistic map," Advanced Communication Control and Computing Technologies (ICACCCT), 2014 International Conference on , vol., no., pp.1471,1475, 8-10 May 2014 doi:10.1109/ICACCCT.2014.7019347   
  32. Amar Taggu "A Comprehensive analysis of DoS attacks in Mobile Adhoc Networks", K. Das, IEEE ICACCI 2014 (International Conference), 24th-27th September 2014.
No Project Title Name of P.I./Co-P.I. Duration Funding Agency Amount
1 The project “North Eastern Quality Improvement Programme” (NEQIP) under AICTE was sanction vide Office Letter No. AICTE/UB/36/NEQIP/Aru/Deg/NERIST/33/2013/129 dated 18/12/129 Dr. (Mrs.) T. Tuithung,
( Associate Professor (Project Co-ordinator)
2013-2016 AICTE Rs. 7.00 Cr
(The first installment is also sanctioned vide order No. AICTE/UB/36/NEQIP/Aru/Deg/ NERIST/33/2013/129 dated 18/12/356.)