- Automated Planning, Formal Methods, Web services Composition, Cybersecurity, Distributed Systems, Bioinformatics
|2012||On Going||Associate Professor||Indian Institute of Technology Roorkee (IITR), India|
|2007||2012||Assistant Professor||Indian Institute of Technology Roorkee (IITR), India|
|2007||2010||Research Associate||Theoretical Computer Science Group, IMSc Chennai|
|2004||2007||Assistant Professor||BITS Pilani, India|
|2003||2004||Assistant Professor||KIIT University, India|
|PhD||Computer Science and Engineering||Indian Institute of Technology Kharagpur||2004|
|2016||till date||Member DAPC||IIT Roorkee|
|2015||till date||Secretary DFC||IIT Roorkee|
|2016||till date||Faculty Advisor, MTech||IIT Roorkee|
|2014||2016||Chairman, DAPC||IIT Roorkee|
|2014||2016||Member DAC||IIT Roorkee|
|2014||2016||Member FSC||IIT Roorkee|
|2013||2014||Departmental Representative to IAPC||IIT Roorkee|
|A Novel Approach to Plan Synthesis using Bounded Memory||IITR||2007|
|LAPUE: Logical Analysis of Plans in Uncertain Environments||DST New Delhi||2011|
|Information Security Education and Awareness (ISEA) Project phase II||DeitY||2014|
- ACM, Member
- ERCIM, Member
|Title||Course Code||Class Name||Semester|
|Theory of Computation||CS353||BTech CSE 3rd year 2017-18||Autumn|
|Principles of Programming Languages||CS312||BTech CSE 3rd year 2016-17||Spring|
|Advanced Operating System||CS502||MTech CSE 1st year 2016-17||Autumn|
|Formal Methods and Software Verification||CS512||MTech CSE 1st year 2016-17||Autumn|
|Advanced Automata Theory||CS514||PhD 2015-16||Autumn|
|Sujata Swain||Pervasive computing, Service oriented computing|
|Manik Chandra||Service Oriented Architecture|
|Amar Nath||Multi Agent System, Multi agent planning, SOA|
|Avadh Kishor||Multi-agent Systems, Game Theory, Decision Theory, Optimization Theory|
|Sandip T. Shingade||Distributed System|
|Jayendra Barua||Information Retrieval and Text Mining|
|Tarun Kumar Kulshrestha||Mobile Cloud Computing, Wireless Sensor Network|
|Topic||Scholar Name||Status of PHD||Registration Year|
|A Framework for Network Forensic Analysis||Pilli Emmanuel Shubhakar||A||2008|
|Similarity Analysis of Biological Sequences by Alignment-free Methods||Manoj Kumar Gupta||A||2009|
|Multiagent Planning with Interacting Actions||Satyendra Singh Chouhan||A||2013|
|Institute Visited||Purpose of Visit||Date|
|Theoretical Computer Science Group, IMSc Chennai||Collaborative research||1-15Nov14|
|Department of Computer Science, University of Perugia, Italy||Collaborative research||July 2014|
|Couse Name||Sponsored By||Date|
|Advances in Information Security and Cryptology||not applicable||14.12.2016|
|Recent Trends in Network Security||not applicable||15.12.2016|
|Instructional Seminar on Logical Aspects of Multi Agent Systems (ISLAMAS 2015)||IMSc Chennai||1.2.2015|
|Indian School on Logic and Applications (ISLA 2014)||DST||6.1.2014|
|Formal Methods Update Meeting 2012||not applicable||19.7.2012|
|Conference Name||Sponsored By||Date|
|Research Promotion workshop on Introduction to Graph and Geometric Algorithms||NBHM||6.3.2014|
|Formal Methods Update Meeting 2009||IITR (partial)||13.7.2009|
|Theoretical Computer Science Lecture by Prof Kamal Lodaya (IMSc Chennai)||IITR (partial)||19.1.2008|
|Design and Analysis of Authentication Protocols||IITR||14.12.2016|
|Formal Specification of Authentication Protocols||IITR||15.12.2016|
|Verification of Authentication Protocols||IITR||16.12.2016|
|Planning in multi agent systems||IMSc Chennai||3.2.2015|
|A method for generating knowledge based programs as conditional plans||Department of Computer Science, University of Perugia, Italy||29.7.2014|
|Advanced concepts of functional programming in Haskell||Department of Computer Science, University of Perugia, Italy||16.7.2014|
|Verification and Synthesis of Multiagent Plans||CMI, Chennai||20.7.2012|
|Robot Programs||IFCAI University, Dehradun||24.4.2011|
|Automated Planning: Introduction and Recent Trends||University of Madras, Chennai||13.7.2010|
|Some Approaches for Deductive Planning||IITR||13.7.2009|
|Plan Specification Techniques||IITR||3.11.2007|
|I am the academic coordinator of the Erasmus+ Programmme Inter-institutional agreement 2014-20 between IIT Roorkee and University of Perugia, Italy.||University of Perugia, Italy||RP|
Selected Journal Publications
Satyendra Singh Chouhan and R. Niyogi. DiMPP: A complete distributed algorithm for multi-agent path planning. J. of Experimental &Theoretical Artificial Intelligence, 29:6, 1129-1148, online April 2017.
Satyendra Singh Chouhan and R. Niyogi. MAPJA: Multi agent planning with joint actions. Applied Intelligence, 47: 1044-1058, May 2017.
Shagun Akarsh, Avadh Kishor, R. Niyogi, Alfredo Milani, and Paolo Mengoni. Social Cooperation in Autonomous Agents to avoid the tragedy of the commons. Int. J. of Agricultural and Environmental Information Systems, 8(2), 1-19, March 2017.
Satyendra Singh Chouhan and R. Niyogi. Plan restructuring in multi agent planning. Procedia Computer Science, 46, 396-401, May 2015.
Vaskar Raychoudhury, Jiannong Cao, R. Niyogi, Weigang Wu, and Yi Lai. Top-k leader election in mobile ad hoc networks. Pervasive and Mobile Computing, 13, 181-202, September, 2014.
Manoj Kumar Gupta, R. Niyogi, and Manoj Misra. A 2D Graphical representation of protein sequence and their similarity analysis with probabilistic method. Match Communications in Mathematical and in Computer Chemistry, 72(2), 519-532, April 2014.
Amod Kumar Lal and R. Niyogi. A multi-agent planning approach to model a tele-surgery domain. Int. J. of Intelligent Systems and Applications, 5(9), 27-38, August 2013.
Manoj Kumar Gupta, R. Niyogi, and Manoj Misra. An alignment free method to find similarity among protein sequences via general form of Chou's pseudo amino acid composition. SAR and QSAR in environmental research, 24(7), 597-609, July 2013.
Manoj Kumar Gupta, R. Niyogi and Manoj Misra, A New Adjacent Pair 2D Graphical Representation of DNA Sequences, J. of Biological Systems, 21(3), 1350005-1-1350005-15, March, 2013.
Satyendra Singh Chouhan and R. Niyogi. An analysis of the effect of communication for multi agent planning in a grid world domain. Int. J. of Intelligent Systems and Applications, 4(5), 8-15, May 2012.
E.P. Subhakar, R. C. Joshi and R. Niyogi. Network forensics frameworks: survey and research challenges. Digital Investigation, 7(1-2), 14-27, November, 2010.
Nilesh Ukey, R. Niyogi, Kuldip Singh, Alfredo Milani, and Valentina Poggioni. A bidirectional heuristic search for web service composition with costs. Int. J. on Web and Grid Services, 6(2), 160-175, June 2010.
R. Niyogi. A Logic Based Approach to Planning for Specifying a Class of Temporally Extended Goals. Int. J. on AI Tools, 13(3), 469-485, September 2004.
Selected Conference Publications
Alfredo Milani and R. Niyogi. Automated Web Services Composition with Iterated Services. 23rd Intl Symposium on Methodologies of Intelligent Systems (ISMIS), pp185-194, 26-29 June 2017, Warsaw, Poland.
Sujata Swain and R. Niyogi. A planning based approach for context aware services composition in pervasive systems, Intl Conference on Distributed Computing and Networking (ICDCN), 4-7January2017, Hyderabad, India.
Sujata Swain and R. Niyogi. An ontology based approach for satisfying user requests in context aware settings. 30th IEEE Intl. Conference on Advanced Information Networking and Applications (AINA), pp1130-1137, 23-25 March 2016, Cras-Montana, Switzerland.
Satyendra Singh Chouhan and R. Niyogi. Multi agent planning with collaborative actions. 29th Australasian Joint Conf. on AI (AI 2016), pp609-620, 5-8 Dec 2016, Hobart, Australia.
Satyendra Singh Chouhan and R. Niyogi. DMAPP: a Multi agent planning with collaborative actions. 28th Australasian Joint Conf. on AI (AI 2015), pp609-620, 30 Nov-4 Dec 2015, Canberra, Australia.
R. Niyogi and Alfredo Milani. Planning with Sets. 22nd Intl Symposium on Methodologies of Intelligent Systems (ISMIS), pp399-409, 21-23 October 2015, Lyon, France.
Radheyshyam Sharma, Manoj Misra, and R. Niyogi. RaMaN: A dynamic clustering protocol resilient against colluded role-manipulability and node replication attacks. Int. Conf. on High Performance Computing and Simulation (HPCS 2014), pp871-876, 21-25 July, 2014, Bologna, Italy.
R. Niyogi and Vihan Jain. A method for generating knowledge based programs as conditional plans. Eighth International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2013), 20-23 November 2013, Shenzhen University, Shenzhen, China.
Manoj Kumar Gupta, R. Niyogi, and Manoj Misra. An experimental analysis of phylogenetic trees based on topological score. International Conference on Informations Systems Design and Intelligent Applications (INDIA 2012), 5-7 January 2012, Visakapatnam, India.
E.P. Subhakar, R. C. Joshi and R. Niyogi. Router and Interface marking for network forensics. Seventh Annual IFIP WG 11.9 International Conference on digital forensics, pp209-220, 29 Jan-2 Feb 2011, Orlando, USA.
E.P. Subhakar, R. C. Joshi and R. Niyogi. Data Reduction by Identification and Correlation of
E.P. Subhakar, R. C. Joshi and R. Niyogi. An IP Traceback Model for Network Forensics. 2nd International
R. Niyogi and R. Ramanujam. An epistemic logic for planning with trials. Second International Workshop on Logic, Rationality and Interaction (LORI-II), pp238-250, 8-11 October 2009, Chongqing, China.
R. Niyogi. Planning with Trial and Errors. International Conference on Intelligent Agent and Multi-Agent Systems (IAMA09), 22-24 July, 2009, Chennai, India.
R. Niyogi. An Approach to Planning with External Events and Auxiliary Goals. Fourth International Conference on Intelligent Computing and Information Systems (ICICIS'09) In cooperation with ACM SIGMIS, pp386--391, 19-22 March 2009, Cairo, Egypt.
- TPC member: SMARTCOMP 2017, AIST 2017, DIAS 2017, INTIS 2016, SAAAS 2016, TENSYMP 2015, SRF-ICDCN 2015, ICACNI 2014, ICDCIT 2014, ICDCIT 2011, IBM-ICARE 2010, IITM 2010.
- I was the course Instructor for the following Distance Learning courses conducted by the Distance Learning Programme Division (DLPD), BITS PILANI, (2005-2007). Courses: Data Structures and Algorithms, Structure of Programming Languages, Network Security.