Highlights

Department

COMPUTER SCIENCE AND ENGINEERING (CYBER SECURITY)

 

Program: B.Tech. in Computer Science and Engineering (Cyber Security)
Year of establishment: 2024
Duration: 4 Years
Year of Commencement: 2024
Current Intake: 60

B.Tech in Computer Science and Engineering (Cyber Security) is an undergraduate 4 years program that integrates fundamental concepts of computer science with specialized knowledge in securing digital systems, networks, and data. The curriculum includes core subjects such as programming, data structures, and operating systems, along with advanced topics like cryptography, ethical hacking, network security, and digital forensics.

The program emphasizes both theoretical understanding and practical skills, enabling students to identify vulnerabilities, analyze cyber threats, and implement effective security solutions. Graduates are well-prepared for roles such as cybersecurity analyst, ethical hacker, and digital forensic expert, contributing to the protection of information systems across various industries.

 

OVERVIEW

  • The Department of Computer Science and Engineering (Cyber Security) has been established in the year 2024. B.Tech in CSE (Cybersecurity) is designed to address the industry’s increasing demand for skilled security professionals in the public and private sector, both in the Data Security and in the Network/Cloud Security domains.
  • The program covers core computer science subjects as well as cybersecurity specific courses. The emphasis of the program is to nurture students with the knowledge and skills required to secure computers, detect and analyse attacks and threats, respond to attacks, develop security policies, procedures, and standards.
  • The four-year undergraduate curriculum includes a sound preparation in Basic Sciences, Mathematical Foundations, Cybersecurity, Cryptography and Network Security, Secure Programming and Ethical hacking.
  • The designed imparts 21st century skills having the following component: Liberal education aspects for all round development, courses that trigger new age skills, project based learning, special topics (hands-on sessions on multiple topics with mentoring from expert), option for MOOC, UG Research Project/Product Development/Internships. The curriculum focuses on Liberal Art Courses, Foundation Courses, Professional Courses, and Electives that help them build expertise in some specialized areas. Curriculum developed, also emphasis on design oriented thinking, Communication, Collaboration and Creativity right from 1st year.
  • Stanford University, University of Michigan, Harvard University, Columbia University, University of Washington have standalone program in MS-PhD for data science.
  • After working as a Cybersecurity Architect for 15 years, most Cybersecurity professionals move up to Senior-level Cybersecurity roles as Senior Manager of IT & Security Compliance, Director of IT Security, Senior Manager, and Senior Director, A Chief Information Security Officer (CISO).

 

Career Pathways in CSE (Cyber Security) at Dr. B. C. Roy Engineering College, Durgapur

  • Cyber Security Analyst : Monitor, detect, and respond to cyber threats to protect organizational systems and data.
  • Ethical Hacker / Penetration Tester : Identify system vulnerabilities by performing controlled security testing and assessments.
  • Security Software Developer: Design and develop secure applications with built-in protection mechanisms.
  • Network Security Engineer: Secure network infrastructures against unauthorized access and cyber-attacks.
  • Cloud Security Specialist : Ensure data protection and compliance in cloud-based environments.
  • Digital Forensics Expert: Investigate cyber incidents and analyze digital evidence for legal and security purposes.
  • Security Analyst in Data Science & AI: Apply machine learning and deep learning techniques for threat detection and risk analysis.
  • Healthcare Data Security Specialist: Protect sensitive medical and biological data using secure architectures and AI-driven approaches.
  • Researcher / Academician: Pursue higher studies (M.Tech/Ph.D.) and contribute to advanced research in cyber security and AI.
  • Industry Roles & Certifications: Opportunities in leading tech companies, startups, and government sectors with certifications like CEH, CISSP, and CompTIA Security+.

 

PROGRAM EDUCATIONAL OBJECTIVES FOR B.TECH CSE (Cyber Security)

A graduate of Computer Science and Engineering (Cyber Security) will be able to:

  • PEO1: Be recognized as effective professionals for their applied skills, problem solving capabilities and professional skills in the field of cyber security.
  • PEO2: Develop themselves as effective communicators that help them for employment in the areas of cyber security and related fields.
  • PEO3: Incorporate ethical, legal and social implications as outcomes of their profession. PEO4: Actively engage themselves in activities which allow for the continuous development of their computing and cyber security skills.

 

PROGRAM SPECIFIC OUTCOMES (PSOs) A graduate of Computer Science and Engineering (Cyber Security) acquires ability to:

  • PSO1: Develop secure software with vulnerability assessment, and security requirements, designed with the least privileges for the protection of digital applications.
  • PSO2: Evaluate the function of cyber security by identifying the tools and systems to minimize the risk to an organization’s cyberspace.
  • PSO3: Apply machine learning models, methods, and techniques for data analysis, data handling, and data visualization for effective decision-making.

 

LABORATORIES

  • Data Structure and Algorithms                                                         
  • Analog and Digital Electronics
  • Computer Organization
  • IT Workshop (Python/Matlab/R)
  • Data Communication and Networks Lab
  • Design and Analysis of Algorithm Lab
  • System Security Lab
  • Operating System Lab
  • Object Oriented Programming Lab
  • Network Security Lab
  • Network Security Lab
  • Database Management System lab
  • Project Lab

 

PROGRAM OUTCOMES

Till 2024-25 AY

Program Outcomes (POs) Statement
PO1 Engineering Knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and an engineering specialization for the solution of complex engineering problems.
PO2 Problem Analysis: Identify, formulate, research literature, and analyze complex engineering problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and engineering sciences.
PO3 Design/ Development of Solutions: Design solutions for complex engineering problems and design system components or processes that meet the specified needs with appropriate consideration for public health and safety, and cultural, societal, and environmental considerations.
PO4 Conduct Investigations of Complex Problems: Use research-based knowledge and research methods including design of experiments, analysis and interpretation of data, and synthesis of the information to provide valid conclusions.
PO5 Modern Tool Usage: Create, select, and apply appropriate techniques, resources, and modern engineering and IT tools including prediction and modeling to complex engineering activities with an understanding of the limitations.
PO6 The Engineer and Society: Apply reasoning informed by the contextual knowledge to assess societal, health, safety, legal, and cultural issues and the consequent responsibilities relevant to the professional engineering practice.
PO7 Environment and Sustainability: Understand the impact of the professional engineering solutions in societal and environmental contexts, and demonstrate the knowledge of, and need for sustainable development.
PO8 Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the engineering practice.
PO9 Individual and Teamwork: Function effectively as an individual, and as a member or leader in diverse teams, and in multidisciplinary settings.
PO10 Communication: Communicate effectively on complex engineering activities with the engineering community and with the society at large, such as being able to comprehend and write effective reports and design documentation, make effective presentations, and give and receive clear instructions.
PO11 Project Management and Finance: Demonstrate knowledge and understanding of the engineering and management principles and apply these to one’s own work, as a member and leader in a team, to manage projects and in multidisciplinary environments.
PO12 Life-Long Learning: Recognize the need for, and have the preparation and ability to engage in independent and life-long learning in the broadest context of technological change.

 

2025-26 AY Onwards

Program Outcomes (POs) Statement Knowledge and Attitude Profile
PO1 Engineering Knowledge: Apply knowledge of mathematics, natural science,  computing, engineering fundamentals and an engineering specialization as specified  in WK1 to WK4 respectively to develop to the solution of complex engineering  problems.  WK1, WK2, WK3. WK4
PO2 Problem Analysis: Identify, formulate, research literature, and analyze complex engineering problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and engineering sciences. WK1, WK2, WK3, WK4
PO3 Design/ Development of Solutions: Design solutions for complex engineering problems and design system components or processes that meet the specified needs with appropriate consideration for public health and safety, and cultural, societal, and environmental considerations. WK5
PO4 Conduct Investigations of Complex Problems: Use research-based knowledge and research methods including design of experiments, analysis and interpretation of data, and synthesis of the information to provide valid conclusions. WK8
PO5 Engineering Tool Usage: Create, select and apply appropriate techniques,  resources and modern engineering & IT tools, including prediction and modelling  recognizing their limitations to solve complex engineering problems. WK2, WK6
PO6 The Engineer and The World: Analyze and evaluate societal and environmental  aspects while solving complex engineering problems for its impact on sustainability  with reference to economy, health, safety, legal framework, culture and  environment. WK1, WK5, WK7
PO7 Ethics: Apply ethical principles and commit to professional ethics, human values,  diversity and inclusion; adhere to national & international laws. WK9
PO8 Individual and Collaborative Team work: Function effectively as an individual,  and as a member or leader in diverse/multi-disciplinary teams.   
PO9 Communication: Communicate effectively and inclusively within the engineering  community and society at large, such as being able to comprehend and write  effective reports and design documentation, make effective presentations  considering cultural, language, and learning differences   
PO10 Project Management and Finance: Apply knowledge and understanding of  engineering management principles and economic decision-making and apply these  to one’s own work, as a member and leader in a team, and to manage projects and  in multidisciplinary environments.    
PO11 Life-Long Learning: Recognize the need for, and have the preparation and ability  for i) independent and life-long learning ii) adaptability to new and emerging  technologies and iii) critical thinking in the broadest context of technological change. WK8

Vision

Ignite and nurture young learners to provide a sustainable, humane, and research-centric educational platform in the domain of cybersecurity for building a robust, resilient, and attack-free digital universe

Mission

  • M1: Provide committed and competent faculty and educational infrastructure to impart the theoretical and practical foundation of cyber security in the emanating youth.
  • M2: Establish MoUs and Centre of Excellences (CoEs) with Information Technology Sector to provide industry-ready cybersecurity graduates with research instinct imbibed for the sustainable development of young learners.
  • M3: Build collaborative and teamwork-centric project-oriented learning environment, to address global challenges whilst preserving human and ethical values.
  • M4: Encourage young minds to educate society to restore nationwide human safety and security in digital world.

HOD Details

DR. GOUR SUNDAR MITRA THAKUR

B.Tech, M.Tech, Ph.D.

Contact No:

Contact Email: gour.mitrathakur@bcrec.ac.in

 

Message from HOD

Welcome to the Department of Computer Science and Engineering (Cyber Security)! We are delighted to welcome you to a field that stands at the forefront of safeguarding the digital world.

We live in an age where technology connects people, systems, and organizations on an unprecedented scale. As digital transformation continues to reshape every sector of society, the need to protect information, preserve privacy, and defend critical infrastructures has become more important than ever. Cyber Security is no longer just a specialized discipline; it is a vital foundation for trust, resilience, and progress in the modern world.

At Dr. B. C. Roy Engineering College, Durgapur, our department is committed to preparing students to meet these emerging challenges with knowledge, integrity, and confidence. We offer a strong academic foundation, practical exposure to real-world security issues, and an environment that encourages analytical thinking, innovation, and responsible technological leadership.

Through a carefully designed curriculum, hands-on learning opportunities, and engagement with current tools and practices, we aim to equip our students with the skills needed to identify vulnerabilities, counter cyber threats, secure digital ecosystems, and contribute meaningfully to a safer technological future.

Whether your aspiration is to become a cyber security analyst, ethical hacker, security architect, researcher, or innovator, the education and experience you gain here will empower you to play a critical role in protecting the digital society of tomorrow.

Join us in this exciting journey of learning, exploration, and innovation. Together, let us build the expertise, resilience, and vision required to secure the future in an increasingly interconnected world.

Your future begins here. Embrace the opportunities ahead, and let us guide you toward excellence and success.

List of Faculty

Dr, Subir Panja Associate Professor
DR. SOHAM BANDYOPADHYAY Assistant Professor
Sudipta Samanta Assistant Professor
Amit Mondal Assistant Professor

List of Technical Staff

Achievements

Faculty Achievements:

1. Research Excellence & Scholarly Contributions

Our faculty members are actively engaged in high-quality research and innovation across emerging domains such as Artificial Intelligence, Machine Learning, Healthcare Analytics, and Data Science. Their work combines strong theoretical foundations with practical relevance, addressing real-world challenges through data-driven approaches. They contribute through publications in reputed journals and international conferences, fostering academic excellence, interdisciplinary collaboration, and exposure to advanced technologies.

  Publication details:
  International Journal: 12 (Including SCI, SCIE, SCOPUS)
  International Conference: 14 (Including Springer, IEEE)
  Book Chapter: 1 (Elsevier)

 

 Notable achievement:

  “Cardiac Risk Factors Identification with Hybrid Statistical Approach and Prediction of Cardiovascular Disease with Machine  Learning”, which was presented at the IEEE International Conference on Information Technology (OCIT 2023), National Institute of Technology Raipur.

 

  • Faculty members actively contribute to the global research community as reviewers for reputed international journals, including:
    1. Biomedical Signal Processing and Control (Elsevier, SCIE)
    2. Journal of Big Data (Springer Nature, SCIE)
    3. Scientific Reports (Springer Nature, SCIE)
    4. SN Computer Science (Springer, Scopus Indexed)
  • Ongoing scholarly contributions include authorship of books under leading international publishers:
    1. AI and ML in IoT Security: Challenges, Solutions, and Future Directions (CRC Press, 2025)
    2. Securing the Internet of Things: Machine Learning and Beyond (Springer, 2025)
  •  The research focus areas include:
    1. Artificial Intelligence & Machine Learning
    2. Healthcare and Disease Prediction Models
    3. Cyber Security and IoT Applications

2. Faculty Development & Continuous Learning

  • Successfully completed multiple FDPs from premier institutes:
    1. IIT Kharagpur – Fundamentals of Machine Learning (NPTEL)
    2. IIT Guwahati – Teaching Methodology & Behavioral Remodeling
    3. NIT Warangal – Data Science for All
  • Participated in AICTE ATAL FDPs on:
    1. Data Science
    2. Cloud Computing (CloudEd Program)
    3. Machine Learning in Computer Vision
  • Completed TCS APEX FDP Certifications:
    1. Artificial Intelligence (2025)
    2. Cyber Security (2025)
  • Attended STTPs, Workshops, and Webinars including:
    1. AICTE Sponsored STTP on Quality Teaching & Research (IMI Bhubaneswar)
    2. Smart Manufacturing in Industries FDP
    3. Generative AI & Agentic AI FDP (Sister Nivedita University)

 Faculty members have collectively participated in 22+ Faculty Development Programs (FDPs)

3. Awards, Recognition & Academic Distinction

  • UGC-NET Qualified (Eligible for Assistant Professor & Ph.D.)
  • Topper in NPTEL Course (IIT Kharagpur)
  • Served as:
    1. Teaching Assistant for NPTEL Certification Courses
    2. Institutional Teaching Assistant (IIT Kharagpur)
  •  Recognized as:
    •  Reviewer for multiple high-impact journals and conferences
  •  Academic excellence demonstrated through consistent achievements in certification and evaluation roles

4. Leadership, Coordination & Institutional Contributions

  •  Coordinated major academic and national-level events:
    1. Symposium on Soft Computing and Machine Learning (IEI Durgapur Chapter)
    2. FDP on IoT with Artificial Intelligence & Machine Learning (2024)
  • Organized AICTE-VAANI Sponsored Programs:
    1. Med-Tech Magic: Transforming Healthcare for a Better Tomorrow (2024)
    2. Advanced Computing in Supercomputing, AI & Quantum Computing (2024)
    3. Future of Healthcare: Robotics, Deep Learning & Emerging Technologies (2024)
  • Academic Leadership Roles:
    1. Appointed as Chief Head Examiner (MAKAUT, 2024)
    2. Appointed as Head Examiner (MAKAUT, 2023–24)
    3. Appointed as Question Paper Moderator (Sister Nivedita University)
  • Served as:
    1. Reviewer for international journals and conferences
    2. Coordinator for multiple FDPs and institutional initiatives

 

Student Achievements:

  • Students have actively participated in national and international hackathons, coding competitions, and innovation challenges, earning several winning positions, runner-up awards, and participation recognitions.
  • Many students have successfully completed certifications in Artificial Intelligence, Data Science, Cybersecurity, Cloud Computing, Ethical Hacking, Computer Vision, and Prompt Engineering.
  • Students have also completed programming certifications and training in C, C++, Java, Python, JavaScript, and Data Structures & Algorithms (DSA).
  • Participation and achievements in Google Cloud Study Jams, national-level technology contests, and industry-oriented hackathons demonstrate strong technical engagement.
  • Several students have completed internships, job-simulation programs, and professional training courses offered by reputed organizations and technology platforms.
  • Students actively participate in technical workshops, seminars, bootcamps, and technology-based training programs, enhancing both academic and practical knowledge.
  • In addition to technical achievements, students regularly take part in social responsibility activities such as blood donation camps, tree plantation drives, yoga camps, and digital well-being awareness programs.
  • Students have also achieved recognition in sports and extracurricular activities, including athletics events such as 100m, 200m, and 400m races, shot put, discus throw, and annual sports competitions.
  • Many students have received participation certificates, merit certificates, and academic recognitions in various institutional and national-level events.
  • Active involvement in technical clubs, innovation programs, quizzes, and student-led initiatives reflects strong leadership and teamwork skills.
  • Overall, these achievements highlight the department’s focus on technical excellence, innovation, social responsibility, and holistic student development.

Laboratories

The High-Performance Cyber Security Lab is designed to support advanced computing and security experiments using modern high-performance systems. It enables the analysis of large-scale data, simulation of cyber-attacks, and development of intelligent security solutions within a safe and controlled environment.

While the lab primarily focuses on cyber security, it also promotes multidisciplinary research by integrating machine learning (ML) and deep learning (DL) techniques for security analysis and robust model development. In addition, the lab emphasizes the design of secure architectures for medical and healthcare data, ensuring privacy, reliability, and trustworthy decision-making in sensitive data-driven applications. This combination of cyber security and intelligent data analysis broadens the scope of research toward real-world, high-impact domains. The lab facilities of the department are as follows:

Intrusion Detection                                                                               

Detect and prevent cyber attacks using machine learning techniques.       

Network Anomaly Detection

Identify unusual or suspicious activities in network traffic.

DDoS Attack Simulation

Study large-scale attacks and evaluate system protection strategies.          

IoT Security

Ensure secure communication among interconnected smart devices.

ML/DL-Based Model Security & Explainability (Human-Centric Data)

Analyze and secure machine learning and deep learning models by extracting critical features from human-centric neural and biological datasets, while incorporating explainable AI techniques to ensure transparent, reliable, and trustworthy decision-making.

Log Analysis Lab                                                                                                  

Examine system logs to detect hidden vulnerabilities and cyber threats.

 

 

Area of Research

Our research endeavors are strategically positioned at the intersection of computational intelligence, biomedical systems, and next-generation technologies, aiming to unravel complex real-world phenomena through mathematically grounded and data-driven methodologies.
  • Cyber Security & Secure Computing Paradigms: Advancing secure system design through intelligent threat detection, data protection strategies, and resilient computational frameworks for safeguarding critical digital infrastructures.
  • Blockchain Security & Decentralized Systems: Investigating secure blockchain architectures, smart contract vulnerabilities, and decentralized trust mechanisms to ensure integrity, transparency, and robustness in distributed systems.
  • Digital Forensics & Cyber Crime Investigation: Developing advanced techniques for evidence acquisition, analysis, and reconstruction of cyber incidents to support legal investigations and enhance cyber crime detection capabilities.
  • AI-Driven Cyber Threat Intelligence: Leveraging machine learning and deep learning techniques for anomaly detection, intrusion detection systems, malware analysis, and predictive threat modeling.
  • Internet of Things (IoT) & Smart Intelligent Systems: Architecting interconnected systems integrating sensing, communication, and computation to enable smart environments, real-time monitoring, and adaptive decision-making.
  • Computational Neuroscience & Functional Brain Connectivity: Exploring neural system dynamics through advanced brain network modeling, focusing on decoding functional connectivity patterns and their implications in neurological and neurodevelopmental disorders.
  • Biomedical Signal Processing & Healthcare Informatics: Designing analytical frameworks for physiological signal processing and medical data analysis to enable disease prediction, clinical decision support, and data-driven healthcare solutions.
  • Explainable Artificial Intelligence (XAI): Developing interpretable machine learning models using techniques such as SHAP and LIME to ensure transparency, accountability, and deeper insight into decision-making processes.
  • Healthcare Data Analytics & Predictive Modeling: Leveraging statistical learning and AI-driven frameworks to extract actionable insights from healthcare datasets for early diagnosis and risk assessment.
  • Intelligent Systems & Emerging Technologies: Exploring Generative AI, Agentic Systems, quantum-inspired computing, and advanced machine intelligence to drive multidisciplinary innovation.

Faculty Activity

Publications
Journal
Date Name Description DOI Link
01-02-2026 Dr, Subir Panja Fuzzy-logic-based IoMT framework for COVID19 patient monitoring : Subir Panja, Arup Kumar Chattopadhyay, Amitava Nag, Jyoti Prakash Singh : Computers & Industrial Engineering DOI View
08-12-2025 DR. SOHAM BANDYOPADHYAY Decoding brain tumors: an attention-guided hybrid learning framework for multi-class classification of MRI images : Soham Bandyopadhyay, Arnab Banerjee, Bhumik Roy, Ankur Lodh : International Journal of Information Technology DOI View
01-04-2025 DR. SOHAM BANDYOPADHYAY AI-enabled computational intelligence approach to neurodevelopmental disorders detection using rs-fMRI data : S Bandyopadhyay, M Sarma, D Samanta : Computers and Electrical Engineering DOI View
05-03-2025 DR. SOHAM BANDYOPADHYAY Novel framework of significant risk factor identification and cardiovascular disease prediction : Soham Bandyopadhyay a , Ananya Samanta b , Monalisa Sarma c , Debasis Samanta d : Expert Systems with Applications DOI View
07-01-2025 Dr, Subir Panja An Efficient Malware Detection Approach Based on Machine Learning Feature Influence Techniques for Resource-Constrained Devices : SUBIR PANJA, SUBHASH MONDAL, AMITAVA NAG, JYOTI PRAKASH SINGH, MANOB JYOTI SAIKIA AND ANUP KUMAR BARMAN : IEEE ACCESS DOI View
16-04-2024 DR. SOHAM BANDYOPADHYAY Tri‑fuzzy interval arithmetic with deep learning and hybrid statistical approach for analysis and prognosis of cardiovascular disease : Soham Bandyopadhyay, Monalisa Sarma, Debasis Samanta : International Journal of Information Technology DOI View
14-04-2024 DR. SOHAM BANDYOPADHYAY SOHAM BANDYOPADHYAY Statistical Analysis of Renal Risk Factors and Prediction of Chronic Kidney Disease : Soham Bandyopadhyay, Monalisa Sarma, Debasis Samanta : SN Computer Science DOI View
24-02-2024 DR. SOHAM BANDYOPADHYAY Decoding autism: Uncovering patterns in brain connectivity through sparsity analysis with rs-fmri data : S Bandyopadhyay, S Peddi, M Sarma, D Samanta : Journal of neuroscience methods DOI View
08-06-2018 DR. SOHAM BANDYOPADHYAY Improving the Performance of Fuzzy Minimum Spanning Tree based Routing Process through PNode Fuzzy Multicasting Approach in MANET : Soham Bandyopadhyay, Sunil Karforma : I. J. Computer Network and Information Security DOI View
08-03-2016 DR. SOHAM BANDYOPADHYAY Derivation and Comparative Study on Centroid Ranking Value of TrIFN and Apply on Fuzzy Geometric Programming : Soham Bandyopadhyay : I.J. Information Technology and Computer Science DOI View
Conference
Date Name Description DOI Link
29-07-2025 DR. SOHAM BANDYOPADHYAY Predicting ADHD: Combining Data-Driven ROI Extraction and Composite Graph Spectral Analysis : Soham Bandyopadhyay, M Unnikrishnan, Monalisa Sarma, Debasis Samanta : International Conference on Computer Vision and Image Processing DOI View
21-04-2025 DR. SOHAM BANDYOPADHYAY Autism Spectrum Disorder Prediction Using Sparse Connectivity Patterns in RS-fMRI Data : Soham Bandyopadhyay, Santhoshkumar Peddi, Monalisa Sarma, Debasis Samanta : 2024 IEEE 21st India Council International Conference (INDICON) DOI View
04-11-2024 DR. SOHAM BANDYOPADHYAY Prediction of neurodevelopmental disorder by combining data-driven ROI extraction and frequency specific brain functional connectivity approach : Soham Bandyopadhyay, Monalisa Sarma, Debasis Samanta : 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT) DOI View
19-02-2024 DR. SOHAM BANDYOPADHYAY Cardiac Risk Factors Identification with Hybrid Statistical Approach and Prediction of Cardiovascular Disease with Machine Learning : Soham Bandyopadhyay; Monalisa Sarma; Debasis Samanta : 2023 OITS International Conference on Information Technology (OCIT) DOI View
11-12-2023 DR. SOHAM BANDYOPADHYAY Statistical analyses for key risk factor identification and prediction of chronic kidney disease : Ananya Samanta, Soham Bandyopadhyay, Debasis Samanta : 2023 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC) DOI View
Thesis Supervised
Patent
Name Year Description
Sudipta Samanta 2017 Extract, transform and load (ETL) system and method Patent number: 9633095 Abstract: An ETL system for extracting transactional data from a plurality of source machines is provided. The ETL system includes a data query module configured to provide an interface to enable a data analyst to define an input query to extract transactional data, which is present on a plurality of source machines. The source machines form a multi-tenant system and each source machine is identified by a unique tenant identifier. The system also includes a query parsing module coupled to the data query module and configured to deconstruct the input query to create a tree structure. The tree structure comprises a plurality of distinct queries. The system further includes a data extraction module coupled to the query parsing module and configured to extract transactional data based on the distinct queries and copy the transactional data to a destination system wherein the transactional data comprises a plurality of data types.

Student Activity

PARTICIPATION IN TECHNICAL AND ACADEMIC EVENTS:

The following activities highlight the academic, technical, and professional development initiatives undertaken by the students during the last academic year.

Seminars & Awareness Campaigns

Project SHIELD: Awareness Campaign on Nationwide Digital Fraud

  • Students participated in a nationwide initiative by the India Today Group and the International Fact-Checking Network to combat cyber and telecommunication fraud.

  • Gained insights into modern scams including digital arrest fraud, OTP theft, phishing, and AI-generated voice manipulation.

  • Engaged in live scam demonstrations and victim case studies conducted by experts from the India Today Fact Check Bureau.

  • Selected "Project SHIELD Champions" among students to foster digital safety within the campus community.

  • Learned critical reporting mechanisms through the national cybercrime portal and helpline 1930.

Cyber Attacks in Global Politics

  • Explored the impact of cyber warfare and state-sponsored activities on international relations.
  • Attended a guest lecture by Prof. Abhijit Banerjee on cyber diplomacy and international cooperation.
  • Student presenters analyzed high-profile global cases such as Stuxnet, the SolarWinds breach, and the Ukraine power grid attack.
  • Discussed the Indian cybersecurity landscape, focusing on DDoS attacks and disinformation campaigns.

 

Webinars 

Full Stack Development (Euphoria GenX, Kolkata)

  • Attended by 37 students from the 3rd semesters of CSE (CS) on September 18, 2025.
  • Focused on bridging the gap between the academic curriculum and modern industry requirements in web development.

 

Technical Session on Engineering & Management Practices (Genex Engineering)

  • Conducted on September 19, 2025, with participation from 61 students of the CSE (CS) department.
  • Engaged with industry experts to understand professional standards in the current technological landscape.

 

Workshops & Hands-on Training

20-Hour Hybrid Workshop: Full Stack Development using Django & React

  • Participated in a comprehensive training program involving 12 hours of offline and 8 hours of online sessions in January 2026.
  • Received hands-on training in backend development (Django) and frontend interfaces (React) under the guidance of industry experts from Genex Engineering & Management Solutions.
  • Successfully developed five AI-integrated projects as part of the workshop outcome:

              PicPay: Image-to-product recognition and price comparison chatbot.

              MindCare with StudyBuddy: AI-driven learning and mental wellness platform.

              Bengali-Doctor: A bilingual healthcare chatbot.

              OPTIBUY: AI-based device recommendation system.

              DSA Chatbot: An AI assistant specifically for learning Data Structures and Algorithms.

Technical Clubs & Student Initiatives

Inauguration of "CODE_RED" Coding Club

  • The club was formally inaugurated on February 8, 2026, by Principal Sanjay S. Pawar.
  • Primarily organized and managed by students of CSE (Cyber Security) to create a hub for technical learning.
  • Established as a platform for hosting coding competitions, hackathons, and technology-related collaborative activities for both CSE (AIML) and CSE (CS) departments.

 

Industry Interactions:

The Department of CSE (CS) maintains a robust and dynamic interface with premier industrial organizations, ensuring that our academic framework remains deeply rooted in real-world application. By fostering consistent engagement with stalwarts such as the Durgapur Steel Plant (DSP), Damodar Valley Corporation (DVC), and CSIR-CMERI, the department creates a fertile ecosystem for technical evolution. These collaborations transcend traditional learning, as our students actively participate in intensive internships that provide them with a first-hand look at large-scale industrial operations and complex problem-solving.

Beyond internships, our department serves as a hub for knowledge exchange through regular interactions with seasoned industry resource persons. By collaborating on live industry projects, we integrate cutting-edge tools, sophisticated techniques, and professional methodologies directly into the students' academic journey. This proactive exposure acts as a powerful catalyst, motivating students to implement industry-standard concepts within their studies and future careers. Ultimately, this synergistic approach ensures that our graduates are not just academically proficient but are "industry-ready" professionals equipped with the resilience and technical acumen to thrive in a competitive global landscape.

×
×
× -
z