PUBLICATION IN VARIOUS JOURNALS
No of publication:98


  • Mandal J. K., Hasan, K. L.,,“Secure Agent based Data Transmission in MANET,”, International Journal of Advanced Research in Computer Science, Vol. 4(Issue May-June 2013), ICV=5.47, ISSN:0976-5697, Indexed on EBSCO Host, DOAJ, Open J-Gate, Electronic Journal Library, Ulrichs, New Jour, (Reference ID 4929), 2013


  • Sengupta, M, Mandal, J. K.,, “Wavelet based Authentication/Secret Transmission Through Image resizing(WastiR), Signal & Image Processing: An International Journal, ISSN:0976-710X(o), 2229-3922(Print), Indexed on ProQuest, EBSCO, DOAJ, Pubzone, CiteSeer,Google Scholar, Inspec, getcited, March 2013


  • Sarkar Arindam, Mandal J. K.,, “Key Swap Over Among Group of Multilayer Perceptrons for Encryption in Wireless Communication(KSOGMLPE)”, International Journal of Information TECHNOLOGY, Control and Automation(IJITCA), Vol 3, No.1, January 2013, ISSN: 1839-6682, Indexed by:, DOAJ, getCITED,Scribd, Google Scholar, CSEB,Pubget ProQuest, pp. 85-100, DOI:10.521/ijitca.2013.3107,2013


  • Ghosal, S, J. K. Mandal,, “A Two Dimensional Discrete Fourier Transform Based Secret Data Embedding For Color Image Authentication (2D-DFTSDECIA)”, Signal & Image Processing :An International Journal (SIPIJ) Vol.3, No.6, AIRCC, DOI : 10.5121/sipij.2012.3608, December 2012


  • Ghosal, S, J. K. Mandal,, “A Fragile Watermarking Based On Separable Discrete Hartley Transform For Color Image Authentication (FWSDHTCIA)” Signal & Image Processing : An International Journal (SIPIJ) Vol.3, No.6, AIRCC, DOI : 10.5121/sipij.2012.3603, December 2012


  • Sarkar Arindam, Mandal J. K.,, “Evolutionary Computation Guided Energy Efficient Key Organization in Wireless Communication (ECEEKO)”, International Journal of Information and Network Security (IJINS), Vol 2, No.1, 2012, ISSN: 2089-3299, Indexed by: BASE (Bielefeld Academic Search Engine), Cabell's Directory, Cite Seerx , Computer Science Directory, DOAJ, EBSCO Publishing, EI, Electronic Journals Library, ELSEVIER, Google Scholar, Index Copernicus, ISSUU, NewJour,| OJS PKP, Open J-Gate, ProQuest, Science Central , Scirus , SCOPUS , Socolar Open Access, Ulrich's Periodicals Directory, World Wide Science , WorldCat., 2012


  • Sarkar Arindam, Mandal J. K., “Swarm Intelligence based Faster Public-Key Cryptography in Wireless Communication (SIFPKC)”, International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 3 No. 7 July 2012, pp 267-273, ISSN: 2229-3345, Indexed by: DOAJ, INDEX COPERNICUS, Google Scholar, Open J-Gate, Cornell University Library, SCIRUS, 2012


  • Mondal, U, Mandal, J. K.,, “Enhancing Security of Quality Songs with Embedding Encrypted Hidden Codes in Tolerance Level(SQHTL)”,Signal & Image Processing: An International Journal(SIPIJ), AIRCC


  • Mandal, J. K. , Ghoshal, S.,, “Two Dimensional Discrete Fourier Transform Based Secret Data Embedding in Color Images(2D-DFTSDECI)”,Signal & Image Processing:An International Journal(SIPIJ), AIRCC


  • Mondal U, Mandal, J. K.,,“Authentication of Audio signals through Embedding of Images(AASAI)”. Association for the Advancement of Modelling and Simulation Techniques in Enterprises (AMSE), France, communicated on line (www.amse-modeling.com under user of jkm), Dated:05-05-2011, ID 2771, No. 11 512(B)


  • Nandi, U., Mandal, J. K,, “Region Based Huffman Compression with Regionwise Multiple Interchange of Codes(RBHM)”, Association for the Advancement of Modelling and Simulation Techniques in Enterprises (AMSE), France, communicated on line (www.amse-modeling.com under user of jkm), Dated:14-05-2011, ID 2777, No. 11 514(D)


  • Mandal, J. K, Mukhopadhyay, S.,, “A Novel Technique of Filtering High Random valued Impulse Noise and Optimization through Genetic Algorithm(HRVINGA)”. Association for the Advancement of Modelling and Simulation Techniques in Enterprises (AMSE), France, communicated on line (www.amse-modeling.com under user of jkm), Dated:07-05-2011, ID 2778(In press)


  • Mandal, J. K. Khamrui, Amrita,, “An Image Authentication Technique in Frequency Domain using Genetic Algorithm (IAFDGA)”, International Journal of Software Engineering & Applications(IJSEA), ISSN : 0975-9018 (Online); 0976-2221(Print), Indexed on DOAJ,EBSCO,INSPEC,ProQuest etc.,DOI:10.5121/ijsea.2012.3504, Vol. 3, No. 5, pp.39-46, Sept. 2012.( http://airccse.org/journal/ijsea/papers/3512ijsea04.pdf),2012


  • Mandal J. K.and Ghosal, S. K.,, “A Fragile Watermarking based on Separable Discrete Hartley Transform for Color Image Authentication (FWSDHTCIA)”, Journal of Signal & Image Processing: An International Journal (SIPIJ), ISSN : 0976-710X (Online); 2229-3922 (print), Extended version of conference (DPPR 2012), “Separable Discrete Hartley Transform based Invisible Watermarking for Color Image Authentication (SDHTIWCIA)”, paperID-69, July 13 ~ 15, 2012, Chennai


  • Mondal Uttam Kr. and Mandal, J. K.,, “Generating Audio Signal Authentication through Secret Embedded Self Harmonic Component (GASASH)”, Journal of IJSPTM, Extended version of conference (CNSA-2012)


  • Nandi, Utpal Mandal, J. K.,, “Comparative Study And Analysis of Adaptive Region Based Huffman Compression Techniques”, International Journal of Information Technology Convergence and Services (IJITCS),ISSN:2231-153X(Online)2231-1939(Print),Extended version of DDPR 2012 Chennai


  • Mandal J. K. and Das Debashis,, “Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain”, International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, July 2012, pp. 83-93, ISSN : 2249-1139, DOI : 10.5121/ijist.2012.2408.(2012)


  • Sengupta, Madhumita, J. K. Mandal, ,“An Authentication Technique in Frequency Domain through Daubechies Transformation (ATFDD)”, International Journal of Advanced Research in Computer Science, Volume 3 No. 4 (July-August 2012), pp. 236-242,(2012)


  • Sarkar, Arindam Mandal, J. K. ,“Secured Wireless Communication by High-Speed RSA Using Evolutionary Programming based Optimization Computation (HS-RSA-EP)”, International Journal of Advanced Research in Computer Science, Volume 3 No. 4 (July-August 2012).


  • Sarkar Arindam and Mandal, J. K., ,,“Energy Efficient Wireless Communication Using Genetic Algorithm Guided Faster Light Weight Digital Signature Algorithm (GADSA)”, International Journal Of Advanced Smart Sensor Network Systems (IJASSN), Vol 2, No.3, pp. 9-25, July 2012, DOI: 10.5121/ijassn.2012.2302


  • Sarkar Arindam and Mandal, J. K. ,“Multilayer Perceptron Guided Key Generation Through Mutation With Recursive Replacement In Wireless Communication (MLPKG), International Journal on Ad Hoc Networking Systems (IJANS) Vol. 2, No. 3, pp. 11-28, July 2012, DOI : 10.5121/ijans.2012.2302


  • Sarkar, Arindam Karforma S.and Mandal, J. K., “Object Oriented Modelling Of IDEA Using GA Based Efficient Key Generation For E-Governance Security (OOMIG)”, International Journal of Distributed and Parallel Systems (IJDPS), Vol.3, No.2, pp 171- 183, March 2012, DOI : 10.5121/ijdps.2012.3215 171


  • Dasgupta, K., Mandal, J. K. Mondal, Dutta, P.,,“Hash based Least Significant Bit Technique for Video Steganography (HLSB)”, International Journal of Security, Privacy and Trust Management (IJSPTM), ISSN 2277-5498, AIRCC,2012


  • Mandal, J. K.(Co author),et al, “Z-Transform based Digital Image Authentication Quantization Index Modulation (Z-DIAQIM)”, Advances in Intelligent and Soft Computing, vis CSIA-2012, ISSN:1867-5662, Indexed by ISI Proceeding, DBLP, SCOPUS, EI-Compendex, MetaPress, Springerlink etc., 2012


  • Mondal U. K., Mandal, J. K., ,“Secret Data Hiding within Tolerance Level of Embedding in Quality Songs(DHTL)”, Advances in Intelligent and Soft Computing, vis CSIA-2012, ISSN:1867-5662, Indexed by ISI Proceeding, DBLP, SCOPUS, EI-Compendex, MetaPress, Springerlink etc., 2012


  • Mandal, J. K., Ghoshal, S. K., ,“A Novel DFT based Information Embedding for Color Image Authentication (DFTIECIA)”, Advances in Intelligent and Soft Computing, vis CSIA-2012, ISSN:1867-5662, Indexed by ISI Proceeding, DBLP, SCOPUS, EI-Compendex,MetaPress, Springerlink etc., 2012


  • 27. Mandal, J. K(Co-author) et al,, “Image Authentication Technique based on DCT(IATDCT)”, Advances in Intelligent and Soft Computing, vis CSIA-2012, ISSN:1867-5662, Indexed by ISI Proceeding, DBLP, SCOPUS, EI-Compendex, MetaPress, Springerlink etc., 2012 (accepted )


  • Mandal, J. K., Pal, Manas,, “A Bit Level Session Based Encryption Technique to Enhance Information Security”, International Journal on Computer Science and Engineering, Vol. 04, No. 1,ISSN No.: 2229-5631, e-ISSN: 0975-3397, Indexed, January 2012


  • Mandal, J. K., Pal Manas,, “A Generic Session Based Bit Level Cryptographic Technique to Enhance Information Security”, International Journal of Computer Science and Network Security, Vol. 11, No. 12, pp. 117-122, Koria, ISSN No.: 1738-7906, Indexed, December 2011


  • Sengupta, M and Mandal J K,,”Transformed IRIS Signature fabricated Authentication in Wavelet based Frequency Domain (TISAWFD)”, International Journal of Advanced Research in Computer Science (IJARCS), vol. 2, no. 5,pp. 486-490,http://www.ijarcs.info, ISSN 0976-5697, indexed in: Index Copernicus, DOAJ, Open J Gate, Electronic Journal Library, New Jour, Science central.com, Ulrichs Web, Dayang Journal System, Sept-Oct 2011.


  • Mandal J. K. and Mukhopadhyay S,,”PSO based Edge Keeping Suppression of Impulses in Digital Imagery”,Advances in Intelligent Soft Computing, vis INDIA-2012, ISSN:1867-5662,Indexed by ISI Proceeding, DBLP,COPUS etc.,2012.(accepted)


  • Mandal J. K. and Ghoshal, N.,Chowdhury Soumit,,"A Steganographic Scheme for Color Image Authentication using Z-Transform (SSCIAZ)”,Advances in Intelligent Soft Computing, vis INDIA-2012, ISSN:1867-5662, Indexed by ISI Proceeding, DBLP,COPUS etc.,2012.(accepted)


  • Mandal J K and . Roy, P., "A Relaxed ParzenWindow based Multifeatured Fuzzy-GIS Model to Forecast Facility Locations (RPWMFGISFFL)”,Advances in Intelligent Soft Computing, vis INDIA-2012, ISSN:1867-5662,Indexed by ISI Proceeding, DBLP,COPUS etc.,2012.(accepted)


  • Mandal J K and . Mondal, U,, "Fabrication of Message Digest to Authenticate Audio Signals with Alteration of Coefficients of Harmonics in Multi-stages(MDAC), International Journal of Network Security & Its Applications, ISSN:0975-2307(p), (www.airccse.org/journal/sipij/sipij.html), indexed by inspec, scholar,DOAJ,pubget etc.,(InPress).


  • Mandal J K and . Mukhopadhyay S,, "Filtering using all neighbour directional weighted pixels: Optimization using particle swarm optimization”,Signal & Image processing: An InternationalJournal(SIPIJ), ISSN: 2229-3922 (www.airccse.org/journal/sipij/sipij.html), indexedbyinspec,scholar,DOAJ,pubgetetc.,(InPress).


  • Mandal J. K. and Ghatak Subhankar ,, "An Efficient (2, 2) Visual Cryptographic Protocol through Meaningful Shares to Transmit Messages/Images (VCPTM)" , International Journal of Computer Theory and Engineering (IJCTE), ISSN:1793-8201 (Print Version), Indexed by: EBSCO, ETLibrary, Google Scholar, INSPEC and WorldCat, 2011(In process).


  • Mandal J. K. and Mondal Uttam ,, "Preservation of IPR of Songs through Embedding Secret Song (IPRSESS)" , International Journal of Computer Theory and Engineering (IJCTE), ISSN:1793-8201 (Print Version), Indexed by: EBSCO, ETLibrary, Google Scholar, INSPEC and WorldCat, 2011(In process).


  • Mandal J. K. and Sarkar Arindam,,"Neuro Genetic Key based Recursive Modulo-2 Substitution using Mutated Character for Online Wireless Communication (NGKRMSMC)", International Journal of Computer Theory and Engineering (IJCTE), ISSN:1793-8201 (Print Version), Indexed by: EBSCO, ETLibrary, Google Scholar, INSPEC and WorldCat, 2011(In process).


  • Mondal, J. K.,Mukhopadhyay, S., "GA based Denoising of Impulses (GADI), Communications in Computer and Information Science (CCIS), ISSN:1865-0929, Vol. 203, PDCTA 2011, pp. 76--85. Springer, Heidelberg (2011).


  • Mondal, U, Mandal, J. K.,, "Songs Authentication through Embedding a Self Generated Secure Hidden Signal (SAHS), Communications in Computer and Information Science (CCIS), ISSN: 1865-0929, Vol. ., CISIM 2011, pp. , Springer, Heidelberg (2011).


  • Mondal, J. K.,Mukhopadhyay, S.,, "A Novel Technique for Removal of Random Valued Impulse Noise Using All Neighbor Directional Weighted Pixels (ANDWP)", Communications in Computer and Information Science (CCIS), ISSN:1865-0929, Vol. 203, PDCTA 2011, pp. 102--111. Springer, Heidelberg (2011).


  • Mondal, U, Mandal, J. K.,, "A Fourier Transform Based Authentication of Audio Signals through Alternation of Coefficients of Harmonics (FTAT), Communications in Computer and Information Science (CCIS), ISSN:1865-0929, Vol. 203, PDCTA 2011, pp. 76--85. Springer, Heidelberg (2011).


  • Haldar, P., Mandal, J. K.,, "Analysis of Change of Landuse Pattern of Large Scale Landuse/Landcover Images”. Association for the Advancement of Modelling and Simulation Techniques in Enterprises(AMSE), France, communicated on line (www.amse-modeling.com under user of jkm), Dated:07-05-2011, ID 2775, No. 11 513(1B)(accepted).


  • Chakraborty, R, Mandal, J. K.,, "Triple SV: A Bit Level Symmetric Block Cipher Having High Avalanche Effect”, International Journal of Advanced Computer Science and Application(IJACSA),, ISSN 2156 5570(on), 2158-107X(p) Volume 2, Issue 7, pp., April,2011(accepted).


  • Chakraborty, A, Mandal, J. K.,,“A File based GIS Anchored Information Retrieval Scheme (FBGISIRS) through Vectorization of Raster Map”, International Journal of Advanced Research in Computer Science (IJARCS), ID 1422, vol. 2, no. 4, http://www.ijarcs.info, ISSN 0976-5697, indexed in: Index Copernicus, DOAJ, Open J Gate, Electronic Journal Library, New Jour, Science central.com, Ulrichs Web, Dayang Journal System, July_August 2011.


  • Mandal, J. K.,Khamrui, A,,“A Genetic Algorithm based Steganography on Color Images (GASCI)" International journal of Signal and Imaging Systems Engineering (IJSISE),Indersciences, accepted may 2011.


  • Chakraborty, R, Mandal, J. K., ,“Shuffle_RAT: An FPGA-Baed Iterative Block Cipher”, International Journal of Advanced Research in Computer Science (IJARCS), vol. 2, no. 3, http://www.ijarcs.info,?ISSN 0976-5697, indexed in: Index Copernicus, DOAJ, Open J Gate, Electronic Journal Library, New Jour, Science central.com, Ulrichs Web, Dayang Journal System, accepted May 2011.


  • Mandal, J. K., Chakraborty, R,, ”FPGA Based Cipher Design & Implementation of Recursive Oriented Block Arithmetic and Substitution Technique (ROBAST)”, International Journal of Advanced Computer Science and Application(IJACSA),, ISSN 2156 5570(on), 2158-107X(p) Volume 2, Issue 4, pp. 54-59, April,2011.


  • Mandal, J. K., Ghoshal, N., ”Gray Value based Adaptive Data Hiding for Image Authentication (GVADHIA)”, Journal of Advanced Research In Computer Science, ISSN 0976-5697, Volume II, Issue II,pp. March-April,2011.


  • Mandal, J. K., Ghoshal, N.,”Steganographic Technique for High Volume Data Transmission through Colour Image(STHVSDTCI)”, Journal of Advanced Research In Computer Science, ISSN 0976-5697, Volume II, Issue II,pp. March-April,2011.


  • Mandal, J. K., Ghoshal, N.,”DFT based Hiding Technique for Colour Image Authentication(DFTHTCIA)”, Journal of Advanced Research In Computer Science, ISSN 0976-5697, Volume II, Issue I,pp. 417-422, Jan-Feb,2011


  • Mandal, J. K., Chakraborty, R.,”An RTL Based Design & Implementation of Block Cipher Through Time-Stamp-Keyed-Oriented Encryption Technique(TSK-OET)”, Journal of Advanced Research In Computer Science, ISSN 0976-5697,Volume II, Issue I, pp. 428-432,Jan-Feb,2011.


  • Mandal, J. K., Ghoshal N. et al., “A Authentication Technique for Image/Legal Document (ATILD)”, International Journal of Signal Processing Systems, ISSN 1615-5262, Springer Verlag. Communicated 27th, Feb. 2009, accepted for publication, October 2010.


  • Jayanta Kumar Pal, J. K. Mandal and Kousik Dasgupta., “A Novel Visual Cryptographic Technique through Grey Level Inversion (VCTGLI), The Second International conference on Networks & Communications (NeCoM-2010), Springer Verlag, Chennai, India. AIRCC, pp.124-133,(ISSSN 1865-0929), 2010 Vis. International journal of Network Security & its Applications(IJNSA), Vol. 2, No. 4,pp.118-126, October 2010(ISSN: 0974-9330(OL), 0975-2307(p), DOI: 10.5121/ijnsa.2010.2410, 2010.


  • Mandal, J. K. Mondal, U,”?Frame Based Symmetric Key Cryptography”, International Journal of Advanced Networking and Applications (IJANA), ISSN: 0975-0290(P), Oct, 2010.


  • Mandal, J. K., Nandi, U., “Region Based Huffman(RBH) Compression Technique with Code Interchange, Malayasian Journal of Computer Science(ISSN 0127-9084),Vol. 23, No. 2, pp. 111.120,(ISSN 0127-9084), Oct. 2010.


  • Mandal, J.K., Pal, J. K.,“A (2,N) Visual Cryptographic Technique for Banking Applications, International Journal of network Security & Its Applications(IJNSA) , Vol. 2, No. 4, pp. 118-127, ISSN -0974-9330(OL),0975-2307(P), Oct, 2010.


  • Mandal, J. K., Som, S., ”Cascaded Block Wise Bits Manipulation Technique(CBBMT)”, International Journal of Technology and Engineering Systems(IJTES), Vol. 1, No. 1, Jan-June 2010, ISSN No.:0976-269X, pp. 19-27, 2010.


  • Mandal, J.K., et. al., “Secured Data Hiding and Image Authentication in Frequency Domain using Mask(SDHIAFDM)”, International Journal of Innovative Computing, Information & Control, ISSN 1349-4148,(Accepted) July 2009.


  • Mandal, J. K., Som, S., “Random Byte Value Shift(RBVS) Algorithm”,JIS Management Vista, Vol. III., No. 1, July-Dec. 2009, ISSN No. 0974-0872,pp. 81-88, 2009.


  • Mandal, J. K., Dutta, S., “Ensuring Information Security Through 123-bit Recursive Substitution of Bits Through Prime-nonprime Detection of Sub-stream (RSBP)”, Journal of Scientific & Industrial Research, National Institute of Science Communication and Information Research, (CSIR) New Delhi, India, vol. 68, July 2009, pp. 584-591, 2009.


  • Mandal, J. K., Ghoshal N., “A Novel Technique for Authentication of Image/Hiding Large Volume of Data (AI/HIVD)”, Association for the Advancement of Modelling & Simulation Technique in Enterprises (A. M. S. E.), France, 2008, August 2009.


  • Mandal, J. K., Halder, P., and Mal, S., “ A GIS anchored Information Retrieval Scheme (GISIRS) based on Vectorization of Raster map”, International Journal of Engineering Research and Industrial Applications, ISSN: 0974-1518, Vol.-2, No. III, pp. 265-280, 2009.


  • Mandal, J. K., et. al., “A Genetic Function Based Cryptosystem(GFC)”, International Journal of Computer Science & Network Security, Vol. 09, No. 9, pp. 310-315, Koria, ISSN No.: 1738-7906,September 2009.


  • Mandal, J. K., Halder, P., Mal, S., “Change Detection Based on Remote Sensing Information Model and its Application on Amarabati Land”, GIS India- India’s first GIS Journal since 1992, ISSN: 0972-5776, Volume 18, No-09,, pp. 3-4, September 2009.


  • Mandal, J. K., et. al. ,“Region based Huffman(RBH) Compression Technique with Code Interchange”, Malayasian Journal of Computer Science(MJCS), Malayasia,(Accepted(Ref. No. MJCS/AI005)) Nov.2009.


  • Mandal, J. K., Halder, P., et al., “An Efficient Technique to Digitize Polygon Segments of a Map/ Image (ETDPS)”, International Journal of IT and Knowledge Management, ISSN: 0973-4414, Volume 2, Number 2, pp. 313-316,December 2009.


  • Mandal J. K., Som S., et al., “Power and Secret Key XOR-ing Technique (PSKXT)”, International Journal BITM Transaction on EECC, Vol.1 No. 4, December, 2009, ISSN No. : 0974-9527, pp. 528-537.2009.


  • Mandal, J. K, Jha P. K., “Cascaded Recursive Key Rotation and Key Arithmetic of a Session Key(CRKRKA)”, International Journal of Intelligent Information Processing, Vol. 2, No. 1, January-June 2008, pp. 9-20, 2008.


  • Mandal, J. K., Dutta, S. ,“Development & Analysis of a Ciphering Model through Recursive Positional Substitution based on Prime-Nonprime of Cluster”, Association for the Advancement of Modeling and Simulation Techniques in Enterprises(AMSE, France), WWW.AMSE-Modeling.org, 2008.


  • Mandal, J. K., Ghoshal, N., “A Bit Level Image Authentication / Secrete Message Transmission Technique (BLIA/SMTT)”, Association for the Advancement of Modelling & Simulation Technique in Enterprises (A. M. S. E.), AMSE Journal of Signal processing and Pattern Recognition, ISSN 1240-4543, Vil. 51, No. 4, pp 1-13, France May 2008.


  • Mandal, J. K., Ghoshal, N., “A Novel Technique for Image Authentication in Frequency Domain using Discrete Fourier Transformation Technique (IAFDDFTT”, Malaysian Journal of Computer Science, ISSN 0127-9094, Vol. 21, No. 1, pp. 24-32, Faculty of Computer Science & Information Technology, University of Malaya, Kuala Lumpur, Malyasia,2008.


  • Mandal, J. K, Halder, P., “A GIS Based Pruning Management System of Tea Garden using Data Base Management System (GISBPMS)”, International Journal of Computer Science & Application,, Chikli, Maharastra, India, pp. 9-13, Vol. 2, No. 1, ISSN 0974-1003, 2008.


  • Mandal J.K., Jha,P.K., “A bit level Symmetric Encryption technique through recursive Session Key arithmetic (RSKA) to Enhance the Security of Transmission”, Advances in Modeling, Computer Science & Statistics(1D), AMSE Journal, France, 2007.


  • Mandal J.K., Jha, P.K., “Encryption through Cascaded arithmetic operation on pair of bit streams(CAOPB)”, Advances in Modeling, Computer Science & Statistics(1D), AMSE Journal, France,2007.


  • Mandal, J, K, Jha, P. K. , “ A Bit Level Symmetric Encryption Technique Through Recursive Carry Addition(RCA) of a Session Key”, Journal of Institute of Engineering, Pulchak, Kathmandu, Nepal,2007.


  • Jha P. K., S. Shakya, Mandal, J. K., “Encryption through Cascaded Recursive Arithmetic Operation and Key Rotation of a Session Key” ,“ZERONE”, Annual Technical Journal, Dept. of Computer and Electronic Eengineering, Volume 4, 2062/2005, pp 51-58, The Institute of Engineering, Pulchowk, Kathmandu, Nepal, 2006.


  • Jha P. K., Mandal, J. K., “A bit level Symmetric Encryption technique through recursive transposition operation (RTO) to enhance the Security of Transmission” Journal of Institute of Engineering, Tribhuban University, Pul-Chowk, Kathmandu, Nepal, pp. 106-116, 2006.


  • Mandal J.K., Jha,P.K., “A bit level Symmetric Encryption technique through bitwise operation of blocks(BOB)”, NorthBengal University Review(Sc & Tech.),vol.15, No. 1, Darjeeling,India,2006.


  • Mandal J.K., Jha,P.K., “A bit level Symmetric Encryption technique through recursive bitwise arithmetic manipulation(RBAM) to enhance the Security of transmission.”, Journal of Association of Computer Engineers Nepal(ACEN), Vol. 1 , No. 2, pp.10-19,Katmandu, Nepal 2006.


  • Mandal J.K.,Jha,P.K.,”Encryption through cascaded recursive arithmetic operation and key rotation of a Session Key(CRAOKR)”,Technical publication of Engineering Association of Nepal,Nepal 2006.


  • Mandal, J. K., et al., "Prime Position Encoding, A Secure Encryption Realized by a Microprocessor Based System", Advances in Modeling, D; Computer Science & Statistics (AMSE), France, 2005.


  • Mandal J.K.,Jha,P.K.,”A bit level Symmetric Encryption technique through bit Transposition Technique (BTT) to enhance the Security of Transmission “,Journal of Purbanchal Engineering College, Kathmandu, pp. 106-116, Nepal, 2005.


  • Mandal, J. K. et al., "Towards Implementation of Security and Storage Efficiency for Geographical Information System", Advances in Modeling, B; Signal Processing and Pattern Recognition (AMSE), Vol. 47, No. 3, pp.1-12, France, 2004.


  • Mandal, J. K., et al., "A 256-bit Recursive Pair Parity Encoder for Encryption", Advances in Modeling, D; Computer Science & Statistics (AMSE), Vol. 9, No. 1, pp. 1-14, France, 2004.


  • Mandal J. K., et al.,” Microprocessor-Based Bit Level Cryptosystem Through Arithmetic Manipulation of Blocks (AMB)”, Journal of Institute of Engineering, Vol. 4, No. 1,pp. 1-7, Nepal, December 2004.


  • Mandal, J. K.,Ghosh, A., “A Comparative Study on Different Methods of Assessing the Effectiveness of Performance Evaluation System in Different Organizations, “ZERONE”, Annual Technical Journal, Dept. of Computer and Electronic Eengineering, Volume 3,2061/2004, pp 55-60, The Institute of Engineering, Pulchowk, Kathmandu, Nepal, 2004.


  • Mandal, J. K., Mal, S., & Dutta , S., “A Microprocessor Based Generalized Recursive Pair Parity Encoder for Secured Transmission”, Journal of Technology, Vol. XXXVII, No. 1-2, pp. 11-20, India, July 2003.


  • Mandal, J. K. , Mal, S., “A Cascaded Technique of Encryption Realized using a Microprocessor Based System, AMSE Journal, France,2002.


  • Mandal, J. K. , Dutta, S., “A Cascaded-Transpose Based Universal Encryption Technique, North Bengal Review (Sc. & Tech),India, 2002.


  • Mandal, J. K., “An Efficient Storage Scheme for Management of Social Database System”, Advances in Modeling Measurement & Control, AMSE, Vol. 19, No. 1,pp. 31-43, France, 1999.


  • Mandal, J. K.,“Coding through clustering of bits for better utilization of storage space”, Advances in Modeling and Analysis, D; Mathematical Tools General Computer Tools, AMSE, Vol.4, No. 1,2,pp. 49-59, France,1999.


  • Mandal, J. K.,Chaudhuri, A., "A Cascaded Image Compression Scheme", N.B.U. Review(Sci & Tech.), India, Vol. 8, No. 2, 1999.


  • Mandal, J. K., Chaudhuri, A.,“A New Universal Data Compression Technique Using Running Difference Method”, International Journal of Information and Computing Science(IJICS), Volume 2, No.1, pp. 30-43, India, June 1999.


  • Mandal, J. K.,"Efficient Usage of Storage Space for Processing and Storing of Large Volume of Data", N.B.U. Review(Sci. &Tech.), India,Vol.7, No.2 , 1997.


  • Mandal, J. K., "A Gray-like Coding Scheme with Error Correction Capabilities", Advances in Modeling and Analysis, A (AMSE), France, Vol. 22, No.3, 1994.


  • Mandal, J. K.,et. al., "Towards identification of local storm using fractal approach", Indian National Science Academy, (INSA) Part A, Physical Science, bb/2083A, dated, Nov., 90.