Chandrima Thakur | Wireless Communication | Best Researcher Award

Ms. Chandrima Thakur | Wireless Communication | Best Researcher Award

DST Project Fellow (SRF), Jadavpur University India

Chandrima Thakur is an enthusiastic academician and researcher specializing in electronics and telecommunication engineering. With a passion for advancing communication technologies, she focuses on wireless networks, energy harvesting, and secure communication. She has demonstrated excellent academic performance through various certifications, international conferences, and research collaborations.

Publication Profile

Scopus

Google Scholar

🎓 Education

Chandrima completed her Ph.D. (Thesis submitted in 2024) in Electronics and Telecommunication Engineering from Jadavpur University, Kolkata. She earned her M.Tech in Telecommunication Engineering from NIT Durgapur (2017) with a CGPA of 9.47 and her B.Tech in Electronics and Communication Engineering from Bengal College of Engineering & Technology (2015) with a CGPA of 8.96.

🧑‍🏫 Experience

Chandrima has served as a research fellow and faculty member at Jadavpur University and has contributed to various teaching labs for undergraduate and postgraduate students. She has also assisted in numerous project reports and theses, focusing on wireless energy harvesting and cooperative networks, and has gained industrial experience in PLC & SCADA and BSNL training.

🏆 Awards & Honors

Chandrima has received several accolades, including Best Paper Awards at NCECC 2020 and IEMENTech 2020, as well as the DST WB Project Fellow and State Government Fellowship. Her research contributions have been recognized at numerous national and international conferences, and she has participated in various workshops and webinars on advanced communication systems.

🔬 Research Focus

Her research primarily focuses on RF energy harvesting for wireless networks, cooperative spectrum sensing, physical layer security, and IoT applications. She also explores the integration of AI/ML in RF energy harvesting systems, device-to-device communication, and 6G communication technologies like IRS.

🏆Conclusion 

Chandrima Thakur is a promising researcher with strong academic accomplishments and significant contributions to the field of wireless communications. Her focus on RF energy harvesting and physical layer security aligns with the current needs of the telecom industry. With her passion for research, diverse expertise, and continual pursuit of knowledge, Chandrima is an excellent candidate for the Best Researcher Award.

Publication Top Notes

  • Title: Secrecy performance of an improved interference-aided RF energy harvesting scheme in two-way multi-antenna relay network
    Year: 2020
    Authors: C Thakur, S Chattopadhyay
    Citations: 4

 

  • Title: A novel interference-aided energy harvesting scheme for cooperative network
    Year: 2019
    Authors: C Thakur, S Chattopadhyay
    Citations: 3

 

  • Title: A novel relay‐aided centralized cooperative spectrum sensing scheme using radio frequency energy harvesting
    Year: 2023
    Authors: S Majumdar, C Thakur, S Chattopadhyay
    Citations: 2

 

  • Title: Performance of Combined RF and non-RF based Energy Harvesting scheme for Multi-Relay Cooperative Cognitive Radio Network
    Year: 2022
    Authors: C Thakur, S Majumdar, S Chatterjee
    Citations: 2

 

  • Title: A Novel Interference-aided RF Energy Harvesting scheme for Cooperative NOMA Network
    Year: 2021
    Authors: C Thakur, S Chattopadhyay
    Citations: 2

 

  • Title: Throughput analysis of multiple cognitive radio networks
    Year: 2016
    Authors: C Thakur, D Goswami, SD Roy, S Kundu
    Citations: 2

 

  • Title: Performance Analysis of RF-Powered Multi-device Diamond Relay IoT Network Using Adaptive NOMA
    Year: 2024
    Authors: C Thakur, S Chattopadhyay
    Citations: 1

 

  • Title: Cooperative Spectrum Sensing based Hybrid Smart Home Energy Management System with Energy Harvesting
    Year: 2023
    Authors: S Majumdar, C Thakur, S Chatterjee
    Citations: 1

 

  • Title: Throughput Analysis of Multi-Source Multi-Antenna Cooperative Relay Network with RF Energy Harvesting using Improved Relay Selection schemes
    Year: 2020
    Authors: S Roy, P Kabiraj, S Dey, C Thakur, S Chattopadhyay
    Citations: 1

 

  • Title: Development and Analysis of an RF-Powered Rechargeable Wireless Sensor Network for LR-WPAN
    Year: 2025
    Authors: C Thakur, S Chattopadhyay

 

  • Title: An RF-powered multi-device diamond relay IoT network using A-NOMA for WBAN
    Year: 2024
    Authors: C Thakur, S Chattopadhyay

 

  • Title: A Novel Relay Selection Strategy for RF Energy Harvested Communication Network
    Year: 2023
    Authors: M Saha, C Thakur, S Chattopadhyay
    Citations: 1

 

  • Title: Performance analysis and optimization of a hybrid TSR–PSR protocol for AF, DF and hybrid AF–DF relaying under Weibull fading
    Year: 2023
    Authors: RS Chowdhury, JK Sadhu, C Thakur, S Chattopadhyay
    Citations: 1

 

 

Didi Rosiyadi| Cybersecurity| Best Researcher Award

Prof. Didi Rosiyadi| Cybersecurity| Best Researcher Award 

Research Professor at Badan Riset dan Inovasi Nasional (BRIN), Indonesia.

Prof. Dr. Didi Rosiyadi is a distinguished Research Professor at the National Research and Innovation Agency (BRIN), Indonesia, specializing in artificial intelligence and cybersecurity. He earned his Ph.D. from NTUST, Taiwan, and has held leadership roles in prestigious research institutions. An esteemed educator and researcher, he has guided numerous postgraduate students and contributed significantly to computer science. Fluent in multiple languages, he actively collaborates globally and has received numerous grants for international research initiatives. Prof. Didi is also a prolific academic, serving as an editor and reviewer for various journals.

Profile

Scholar

Scopus

Education 🎓

Ph.D.: Computer Science and Information Engineering, NTUST, Taiwan (2008–2013). Master’s: Computer Science, University of Gadjah Mada, Indonesia (2001–2003). Bachelor’s: Computer Science, STMIK Bandung, Indonesia (1994–1999).

Experience 🏅

Research Professor: BRIN, 2023–Present. Lecturer: Various Indonesian universities (1999–Present). Leadership: Acting Director/Head, BRIN and LIPI (2016–2022). Editorial Roles: Chief Editor, Informatics and INKOM Journals.

Awards and Honors 🏆

Grants: BRIN-SIAT (China), BRIN-NTUST (Taiwan), LIPI Initiatives. Workshops: Asean IVO (Brunei), DAAD Summer School (Indonesia), CERN (Switzerland). Postdoctoral Programs: NTUST, Taiwan (2015, 2018). Global Collaborations: Mobility programs in Croatia, Thailand, and Geneva.

Research Focus 🔍

Domains: Artificial Intelligence, Cybersecurity, Data Security, and Informatics. Specializations: Measurement & indicators in technology and innovation. Global Research: Collaborations with institutions in Taiwan, Thailand, and Switzerland.

Conclusion

Prof. Dr. Didi Rosiyadi’s exemplary career, marked by leadership, global collaboration, and research excellence, positions him as a compelling nominee for the Best Researcher Award. By addressing minor gaps in publication impact and measurable leadership outcomes, he can further solidify his status as a top-tier candidate for this prestigious recognition.

Publication

  1. “A novel lightweight Machine Learning framework for IoT malware classification based on matrix block mean Downsampling”
    • Year: 2025
    • Authors: Farfoura, M.E., Mashal, I., Alkhatib, A., Batyha, R.M., Rosiyadi, D.
    • Citations: 0

 

  1. “Privacy-preserving reservation model for public facilities based on public Blockchain”
    • Year: 2024
    • Authors: Basuki, A.I., Rosiyadi, D., Susanto, H., Setiawan, I., Salim, T.I.
    • Citations: 0

 

  1. “A Low Complexity ML-Based Methods for Malware Classification”
    • Year: 2024
    • Authors: Farfoura, M.E., Alkhatib, A., Alsekait, D.M., Rosiyadi, D., AbdElminaam, D.S.
    • Citations: 0

 

  1. “Approximation-based homomorphic encryption for secure and efficient blockchain-driven watermarking service”
    • Year: 2023
    • Authors: Rosiyadi, D., Basuki, A.I., Ramdhani, T.I., Susanto, H., Siregar, Y.H.
    • Citations: 3

 

  1. “Securing the Privacy of Transactions Using Blockchain: Swap Battery Framework for Massive Subsidy Electric Motorcycle in Jakarta”
    • Year: 2024
    • Authors: Santoso, T.M., Nidya Neyman, S., Rosiyadi, D., Sahreza, Y., Khunaifi, A.
    • Citations: 0

 

  1. “Network Flow-Based Dataset Generator Based on OpenFlow SDN”
    • Year: 2023
    • Authors: Sidiq, M.F., Basuki, A.I., Haris, A.I., Taufik Yuniantoro, R.M., Rosiyadi, D.
    • Citations: 0

 

  1. “A Novel Deep Learning Approach Featuring Graph-Based Algorithm for Cell Segmentation and Tracking”
    • Year: 2023
    • Authors: Zhao, K., Niyogisubizo, J., Xiao, L., Rosiyadi, D., Wei, Y.
    • Citations: 1

 

  1. “BC-MTD: Blockchain-driven Moving Target Defense for Secure Vehicle Access”
    • Year: 2023
    • Authors: Sidiq, M.F., Basuki, A.I., Ramdhani, T.I., Susanto, H., Salim, T.I.
    • Citations: 0

 

  1. “Accelerating Encrypted Watermarking using Wavelet Transform and CKKS Homomorphic Encryption”
    • Year: 2022
    • Authors: Basuki, A., Setiawan, I., Rosiyadi, D., Ramdhani, T.I., Susanto, H.
    • Citations: 0

 

  1. “Improving Efficiency on BFV-based Encrypted Watermarking using Hadamard Product Decomposition”
    • Year: 2022
    • Authors: Basuki, A.I., Setiawan, I., Rosiyadi, D.
    • Citations: 2

Xian Guo | Cryptography | Best Researcher Award

Prof. Xian Guo | Cryptography | Best Researcher Award

Professor at Lanzhou University of Technology, China

Guo Xian (郭显) is an Associate Professor at Lanzhou University of Technology, China. Guo specializes in computer science and control theory. With a career spanning over two decades, he has contributed significantly to mobile ad hoc networks, security protocols, and intelligent systems. Guo has published numerous papers in renowned journals and participated in multiple international conferences, establishing himself as a key figure in his field. He is also an active member of the Association for Computing Machinery (ACM) and the China Computer Federation (CCF).

Profile

Scopus

Education 🎓

Guo Xian holds a Ph.D. in Control Theory and Control Engineering from Lanzhou University of Technology (2011), where he researched secure routing in mobile ad hoc networks. He earned his Master’s in Computer Science from the same university (2009), focusing on secure routing protocols for mobile networks. Guo’s academic journey began at Northwest Normal University, where he received his Bachelor’s in Mathematics (1997).

Experience 🧑‍🏫

Since 2013, Guo Xian has been an Associate Professor at Lanzhou University of Technology, where he teaches and conducts research in computer science. Prior to this, he worked at Lanzhou University of Arts and Science (formerly Gansu Union University) for over 15 years, developing expertise in secure routing protocols and mobile network security. His academic career has also involved supervising graduate students and contributing to research projects in security mechanisms and network design.

Awards and Honors 🏆

Guo Xian is a member of the Association for Computing Machinery (ACM) and the China Computer Federation (CCF). He has been recognized for his contributions to computer science and secure network research. Notably, his work has been published in leading journals, and he has received several accolades for his research on secure routing protocols. His expertise continues to be recognized both domestically and internationally.

Research Focus 🔍

Guo Xian’s research interests lie in mobile ad hoc networks (MANETs), security protocols, and intelligent systems. His work focuses on developing secure routing techniques for mobile networks, content-based systems, and privacy-aware forwarding mechanisms. Guo has also explored the integration of blockchain with software-defined networking, contributing significantly to the field’s security and privacy. His ongoing research continues to shape future advancements in these areas.

Conclusion 📍

Dr. Guo Xian is a highly accomplished researcher with significant contributions to network security, privacy-preserving techniques, and secure routing protocols. His deep expertise and consistent publication record make him a strong contender for the Best Researcher Award. By further expanding his interdisciplinary reach and fostering international collaborations, Dr. Xian could enhance his research’s global impact and recognition.

Publications 📚

  • “Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials”
    • Authors: Fang, J., Feng, T., Guo, X., Ma, R., Lu, Y.
    • Journal: Journal of Cloud Computing, 2024, 13(1), 30
    • DOI: 10.1186/s13677-024-00306-6
    • Citations: 4

 

  • “DBCPCA: Double-layer blockchain-assisted conditional privacy-preserving cross-domain authentication for VANETs”
    • Authors: Guo, X., Lu, X., Jiang, Y., Fang, J., Zhang, D.
    • Journal: Ad Hoc Networks, 2024, 163, 103600
    • Citations: 0

 

  • “A Privacy-preserving Self-Sovereign Identity Scheme for Vehicular Ad hoc Networks”
    • Authors: Guo, X., Yuan, J., Feng, T., Fang, J., Wang, J.
    • Journal: Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46(7), pp. 2783–2792
    • Citations: 0

 

  • “A Practical and UC-Secure Decentralized Key Management and Authentication Scheme Based on Blockchain for VNDN”
    • Authors: Guo, X., Almadhehagi, S., Feng, T., Jiang, Y., Fang, J.
    • Journal: Computer Science and Information Systems, 2024, 21(3), pp. 725–757
    • Citations: 0

 

  • “Privacy-Preserving k-Nearest Neighbor Classification over Malicious Participants in Outsourced Cloud Environments”
    • Authors: Guo, X., Li, Y., Jiang, Y., Wang, J., Fang, J.
    • Journal: Cryptography, 2023, 7(4), 59
    • Citations: 0

 

  • “Privacy preserving multi-classification LR scheme for data quality”
    • Authors: Laicheng, C., Wentao, W., Tao, F., Xian, G.
    • Journal: Xi’an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50(5), pp. 188–198
    • Citations: 0

 

  • “CPPABK: Conditional privacy-preserving authentication scheme for VANETs based on the key derivation algorithm”
    • Authors: Wang, Y., Guo, X.
    • Journal: International Journal of Security and Networks, 2023, 18(4), pp. 199–212
    • Citations: 0

 

  • “An intelligent zero trust secure framework for software defined networking”
    • Authors: Guo, X., Xian, H., Feng, T., Jiang, Y., Zhang, D.
    • Journal: PeerJ Computer Science, 2023, 9, e1674
    • Citations: 0

 

  • “Homomorphic Encryption Based Privacy-Aware Intelligent Forwarding Mechanism for NDN-VANET”
    • Authors: Guo, X., Wang, B., Jiang, Y., Zhang, D., Cao, L.
    • Journal: Computer Science and Information Systems, 2023, 29(1)
    • Citations: 1

 

  • “Efficient privacy-protection scheme for distributed machine learning against collusion attack”
    • Authors: Cao, L., Wu, Q., Wu, R., Guo, X.
    • Journal: Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2022, 50(5), pp. 39–45
    • Citations: 0

 

Surjit Paul | Information Systems Security | Young Scientist Award

Mr. Surjit Paul | Information Systems Security | Best Researcher Award

Mr. Surjit Paul is a dedicated and research-oriented academic professional currently pursuing a Ph.D. at the Vinod Gupta School of Management, IIT Kharagpur. With a strong background in computer science and a focus on information security breaches and their impact on firm performance, Mr. Surjit Paul has a proven track record of excellence in both teaching and research. Holding an M.Tech from NIT Jamshedpur and an MCA from Biju Patnaik University, Mr. Surjit Paul is an accomplished educator, currently serving as an Assistant Professor at ARKA JAIN University. Proficient in a range of programming languages and research methodologies, Dr. [Your Name] is committed to advancing knowledge in cybersecurity, social media analytics, and website accessibility.

Profile

Scholar

🎯 Objective

Highly motivated, focused, and research-oriented approach to teaching and learning to achieve the desired goals of the organization. Always eager to learn new tools and technologies required to excel in the current learning environment.

🎓 Education

Ph.D. (Pursuing) Vinod Gupta School of Management (VGSoM), Indian Institute of Technology Kharagpur, Thesis Title: “Information Security Breach Incidents and Firms’ Performance”, Supervisor: Prof. Saini Das, Assistant Professor, VGSoM, IIT Kharagpur. M.Tech CSE, 2017 National Institute of Technology Jamshedpur, CGPA: 9.35, Thesis Title: “Design a Quantum Secure Authentication Protocol for Entity Authentication”, Supervisors: Prof. Sanjay Kumar & Prof. R.R Suman. M.C.A, 2014, Biju Patnaik University of Technology Odisha, Rourkela, CGPA: 9.06. B.Sc IT (Hons), 2010, Ranchi University, Ranchi, Percentage: 78.58%. 12th Science, 2007, Jharkhand Academic Council (JAC) Ranchi, Percentage: 65.80%. 10th, 2005, Jharkhand Academic Council (JAC) Ranchi, Percentage: 76.40%

🏆 Awards & Achievements

Best Researcher Award by SCIENCE FATHER, UGC-JRF/NET Computer Science & Applications, 2015, GATE (Computer Science & Information Technology), 2014, M.Tech (Computer Science & Engineering) Branch Topper, MCA Branch Topper

👨‍🏫 Experience

Teaching & Research Experience

Assistant Professor, Dept. of Computer Science & IT, School of Engineering and IT, ARKA JAIN University Jharkhand (August 2023 – Present). Ph.D. Researcher, Vinod Gupta School of Management, IIT Kharagpur (July 2017 – Present)

Industry Experience

Summer Intern, Indian Institute of Management Indore (July – September 2016). Java Programmer, Napasoft Jamshedpur (Vendor of TATA STEEL LTD. Jamshedpur) (November 2010 – July 2011)

🔬 Research Interests

  • Cyber Security
  • Information Security & Stock Market Impact
  • Social Media Analytics
  • Accessibility & Usability

💻 Research Techniques/Computer Skills

  • Accessibility, usability, security, and privacy analysis of websites
  • Social media analytics, sentiment & emotion analysis, and topic modeling
  • Event study methodology
  • Meta-analysis

🛠️ Software & Tools

  • Python, Java, C, C++, R
  • SAP ABAP
  • Web Technology
  • MS-Office
  • Achecker, Sortsite, PENTEST, Wireshark

Publications Top Notes 📝

  • Accessibility and usability analysis of Indian e-government websites
    • Authors: S. Paul, S. Das
    • Journal: Universal Access in the Information Society
    • Volume: 19
    • Issue: 4
    • Pages: 949-957
    • Year: 2020
    • Citations: 48
    • This article analyzes the accessibility and usability of Indian e-government websites, highlighting the challenges and areas for improvement.

 

  • Investigating information dissemination and citizen engagement through government social media during the COVID-19 crisis
    • Authors: S. Paul, S. Das
    • Journal: Online Information Review
    • Volume: 47
    • Issue: 2
    • Pages: 316-332
    • Year: 2023
    • Citations: 12
    • This study examines how government social media channels disseminated information and engaged with citizens during the COVID-19 pandemic.

 

  • A novel initial basic feasible solution method for Transportation problem
    • Author: S. Paul
    • Journal: International Journal of Advanced Research in Computer Science
    • Volume: 9
    • Issue: 1
    • Pages: 0
    • Year: 2018
    • Citations: 9
    • This article proposes a new method for finding the initial basic feasible solution for transportation problems.

 

  • Real-Time Multimodal Biometric User Authentication for Web Application Access in Wireless LAN
    • Authors: S. Kumar, S. Paul, D.K. Shaw
    • Journal: Journal of Computer Science
    • Volume: 13
    • Issue: 12
    • Pages: 680-693
    • Year: 2017
    • Citations: 5
    • This study presents a real-time multimodal biometric authentication system for secure access to web applications over wireless LAN.

 

  • Communication in vehicular cloud network using ns-3
    • Authors: S. Kumar, S. Paul, A.K. Amar
    • Journal: International Journal of Control Theory and Applications
    • Volume: 10
    • Year: 2017
    • Citations: 4
    • This paper discusses communication protocols in vehicular cloud networks using the ns-3 network simulator.

 

  • A Quantum Secure Entity Authentication Protocol Design for Network Security
    • Authors: S. Paul, S. Kumar, R.R. Suman
    • Publication: Research Anthology on Advancements in Quantum Technology
    • Pages: 289-301
    • Year: 2021
    • Citations: 3
    • This article designs a quantum secure entity authentication protocol aimed at enhancing network security.

 

  • A Quantum Secure Entity Authentication Protocol Design for Network Security
    • Authors: S. Paul, S. Kumar, R.R. Suman
    • Journal: International Journal of Information Security and Privacy
    • Volume: 13
    • Issue: 4
    • Pages: 1-11
    • Year: 2019
    • Citations: 3
    • This paper provides a detailed analysis and design of a quantum secure entity authentication protocol for network security.

 

  • Comparative Analysis of Various PPP Authentication Protocols
    • Authors: S. Paul, S. Kumar
    • Journal: International Journal of Innovative Research in Computer and Communication Engineering
    • Year: 2017
    • Citations: 3
    • This study compares different Point-to-Point Protocol (PPP) authentication methods.

 

  • Design and Modeling of Real Time Multimodal Biometric Authentication System
    • Authors: S. Kumar, S. Paul, D.K. Shaw
    • Journal: Journal of Computer Science (Accepted)
    • Year: 2017
    • Citations: 2
    • This article discusses the design and modeling of a real-time multimodal biometric authentication system.