Dr. Sandip Dutta

Monitoring the finances of the center, web development.

 

Dr. Sandip Dutta
Professor, Computer Science and Engg
Ph.D. (BIT Mesra 2012), Ex-HOD(CSE) (2014-2017), Ex-Dean Admission and Academic Control (2017-2020),Ex-HOD(2022-2022), Ex-Registrar(2023-2024)
Contact Address
Permanent Address Besides Manda Bagicha, Harihar Singh Road, Morabadi, Ranchi, Jharkhand (834008)
Local Address Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, Ranchi, Jharkhand (835215)
Phone (Office) 09431939630
Phone Residence 09431939630
Email Id sandipdutta@bitmesra.ac.in
Joined Institute on : 26-Apr-2001

  Work Experience
Teaching : 24 YearsResearch : 14 YearsIndividual: 34 Years

 

  Research Areas
Network Security and Cryptography, Biometric Security, Cyber Security, Digital Forensics, Data Warehousing, Blockchain, Security in Cloud Computing, Security in MANET, Software Engineering
  Publications
Journal

2025

  1. Deepshikha Kumari, Prashant Pranav, Abhinav Sinha, Sandip Dutta, “A Novel Approach to Intrusion Detection System Using Hybrid Flower Pollination and Cheetah Optimization Algorithm”, Scientific Reports, Nature, 15, 13071 (2025) https://doi.org/10.1038/s41598-025-98296-2 (SCIE, Impact Factor – 3.8)
  2. Purushottam Singh, Prashant Pranav, Sandip Dutta, “Optimizing Cryptographic Protocols Against Side Channel Attacks Using WGAN-GP And Genetic Algorithms”, Scientific Reports, Nature, 15, 2130 (2025) https://doi.org/10.1038/s41598-025-86118-4 (SCIE, Impact Factor – 3.8)
  3. Deepshikha Kumari, Prashant Pranav, Abhinav Sinha, Sandip Dutta, “A Hybrid Cheetah and Grey Wolf Optimization Algorithm for Network Intrusion Detection”, Engineering Research Express, IOP Science, Volume 7, Issue – 1, February (2025), 10.1088/2631-8695/adb47b (SCOPUS, ESCI, Impact Factor – 1.5)

2024

  1. Purushottam Singh, Prashant Pranav, Shamama Anwar, Sandip Dutta, “Leveraging Generative Adversarial Networks for Enhanced Cryptographic Key Generation”, Concurrency and Computation: Practice and Experience, Wiley, 2024, e8226. doi: 10.1002/cpe.8226 (SCIE, Impact Factor – 2)
  2. Purushottam Singh, Sandip Dutta, Prashant Pranav, “A Modified RC-4 Cryptosystems to Enhance Security by using Negative Key Schedule”, Security and Privacy, Wiley, e438. doi: 10.1002/spy2.438 (2024) (ESCI, Impact Factor – 1.9)
  3. Animesh Kumar, Prashant Pranav, Sandip Dutta, Soubhik Chakraborty “Analysis of the Empirical Complexity of AES – 128 Statistically”, Journal of Discrete Mathematical Sciences and Cryptography, Taru Publications, 2024 (SCOPUS, ESCI, Impact Factor – 1.4)
  4. Ankita Kumari, Purushottam Singh, Prashant Pranav, Sandip Dutta, Soubhik Chakraborty, “Prevention of Sleep Deprivation Attack in MANET using Cumulative Priority Based Cluster Head Selection”, Concurrency and Computation: Practice and Experience, 36 (16), Wiley, e8118, https://doi.org/10.1002/cpe.8118 (2024) (SCIE, Impact Factor – 2)
  5. Purushottam Singh, Sandip Dutta, Prashant Pranav, “Optimizing GANs for Cryptography: The Role and Impact of Activation Functions in Neural Layers Assessing the Cryptographic Strength”, Applied Sciences, MDPI (SCIE, IF – 2.4)
  6. Purushottam Singh, Sandip Dutta, Prashant Pranav, “Network Security and Cryptography: Threats, Obstacles and Solutions – A Bibliometric Analysis”, Recent Advances in Computer Science and Communications, Betham Science (SCOPUS)
  7. Nayancy, Sandip Dutta, and Soubhik Chakraborty, “Lightweight Blockchain Approach to Reduce Double-spend and 51% Attacks on Proof-of-Work”, Intelligent Data Analysis, IOS Press, vol. Pre-press, no. Pre-press, pp. 1-11, 2024 (SCIE, IF – 1.7)
  8. Animesh Kumar, Sandip Dutta, Prashant Pranav, “Analysis of SQL injection Attacks in the Cloud and in WEB Applications”, Security and Privacy, Wiley, 7(3), e370, 10.1002/spy2.370 (2024) (ESCI, Impact Factor – 1.9)

2023

  1. Ankita Kumari, Sandip Dutta, Soubhik Chakraborty. “A fuzzy based Q–learning approach to prevent sinkhole attacks in MANET (FQ–SPM).” Journal of Intelligent & Fuzzy Systems Preprint: 1-12 (SCIE, IF – 2)
  2. Animesh Kumar, Sandip Dutta, Prashant Pranav, “FQBDDA: fuzzy Q-learning based DDoS attack detection algorithm for cloud computing environment”, International Journal of Information Technology, Springer (2023), https://doi.org/10.1007/s41870-023-01509-y (SCOPUS)
  3. Animesh Kumar, Sandip Dutta, Prashant Pranav, Supervised Learning for Attack Detection in Cloud, International Journal of Experimental Research and Review: Vol 31 No Spl Volume (2023): Recent trends in Science, Technology & Design (SCOPUS)
  4. Animesh Kumar, Sandip Dutta, Prashant Pranav, Prevention of VM Timing Side-channel Attack in a Cloud Environment using Randomized Timing Approach in AES – 128, International Journal of Experimental Research and Review: Vol 31 No Spl Volume (2023): Recent trends in Science, Technology & Design (SCOPUS)
  5. Animesh Kumar, Sandip Dutta, Prashant Pranav, “A Comparative Study of DDoS Attack in Cloud Computing Environment,” SSRG International Journal of Electronics and Communication Engineering, vol. 10, no. 7, pp. 87-96, 2023 (SCOPUS)
  6. Ankita Kumari, Sandip Dutta, Soubhik Chakraborty, A comparative study of different security issues in MANET, International Journal of Experimental Research and Review: Vol 31 No Spl Volume (2023): Recent trends in Science, Technology & Design (SCOPUS)
  7. Ankita Kumari, Sandip Dutta, Soubhik Chakraborty, Use of Node credibility and Andrews plot to detect and prevent BHA in MANET, International Journal of Experimental Research and Review: Vol 30 (2023) (SCOPUS)

2022

  1. Soumya Ray, Kamta Nath Mishra, Sandip Dutta, “An Innovative Technique for DDoS attack Recognition and Deterrence on M-health Sensitive Data”, Wireless Personal Communications (Springer), pp. 1-25, August 2022 (SCIE, IF – 2.017)
  2. Soumya Ray, Kamta Nath Mishra, Sandip Dutta, “Sensitive Data Identification and Security Assurance in cloud and IoT based Networks”, I. J. Computer Network and Information Security, MECS Press Hong Kong, vol.5, pp. 11-27, 2022 (SCOPUS)
  3. Soumya Ray, Kamta Nath Mishra, Sandip Dutta, “Detection and prevention of DDoS attacks on M-healthcare sensitive data: a novel approach”, International Journal of Information Technology (Springer), pp. 1-10,2022 (SCOPUS)

2021

  1. Prashant Pranav, Sandip Dutta, Soubhik Chakraborty, “Empirical and Statistical Comparison of Intermediate Steps of AES – 128 and RSA in Terms of Time Consumption”, Soft Computing Springer, 2021 (SCIE, IF – 4.2)
  2. Saumya Ray, Kamta Nath Mishra, Sandip Dutta, Susceptible data classification and security reassurance in cloud-IoT based computing environment. Sadhna, Springer, 46, 215 (2021) (SCIE, IF – 1.6)
  3. Soumya Ray, Kamta Nath Mishra, Sandip Dutta, Big Data Security Issues from the Perspective of IoT and Cloud Computing: A Review, Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science), Volume 14, Number 7, 2021, pp. 2057-2078(22), Bentham Science Publishers (SCOPUS)
  4. Dharmveer Kumar Yadav, Sandip Dutta, Test Case Prioritization Based on Early Fault Detection Technique, Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science), Volume 14, Number 1, 2021, pp. 302-316(15), Bentham Science Publishers (SCOPUS)

2020

  1. Prashant Pranav, Soubhik Chakraborty, Sandip Dutta, “A New Cipher System using Semi – natural Composition in Indian Raga”, Soft Computing Springer, 2020, Volume – 24, pp. 1529 – 1537 (SCIE, IF – 4.2)
  2. Dharamveer Kumar Yadav, Sandip Dutta, “Regression Test Case Selection and Prioritization for Object-Oriented Software”, Microsystem Technologies, 26, 1463–1477. https://doi.org/10.1007/s00542-019-04679-7, 2020 (SCIE, IF – 2.1)
  3. Nayancy, Sandip Dutta, Chakraborty, Soubhik, “A Survey on Implementation of Lightweight Block Ciphers for Resource Constraints Devices”, Journal of Discrete Mathematical Sciences and Cryptography. 1-22. 10.1080/09720502.2020.1766764, 2020 (SCOPUS)
  4. Soumya Ray, Kamta Nath Mishra, Sandip Dutta, Big Data Security Issues from the Perspective of IoT and Cloud Computing: A Review. Recent Advances in Computer Science and Communications, 2020 (SCOPUS)
  5. Shailly Ranjan, Soubhik Chakraborty, Sandip Dutta, “Musical Cryptography. Empirical Analysis of Algorithms”, GRIN Verlag, 2020

2019

  1. Dharmveer Kumar Yadav, Sandip Dutta, “Test Case Prioritization Using Clustering Approach for Object Oriented Software”, International Journal of Information System Modeling and Design. 10. 92-109. 10.4018/IJISMD.2019070106, 2019 (SCOPUS)

2015

  1. Chandan Kumar, Sandip Dutta, Soubhik Chakraborty, “Hiding Messages using Musical Notes: A Fuzzy Logic Approach.” International Journal of Security and its Applications, Vol. 9 No.1 (2015) pp.237-248, 2015
  2. Chandan Kumar, Sandip Dutta, Soubhik Chakraborty, “A Hybrid Polybius-Playfair Music Cipher”, International Journal of Multimedia and Ubiquitous Engineering, 10(8):187-198, 2015

2014

  1. Dharamveer Kumar Yadav, Sandip Dutta, “Study on Regression Test Selection Techniques for Object Oriented Programming”, International Journal of Applied Engineering Research, 9(22):12259-12278 · January 2014

2013

  1. Sandip Dutta, Chandan Kumar, Soubhik Chakraborty, “A Symmetric Key Algorithm for Cryptography using Music”, International Journal of Engineering & Technology (0975-4024), 5(3), 2013

2011

  1. Sandip Dutta, Soubhik Chakraborty S, N.C. Mahanti, “Fingerprint Based Cryptography Technique for Improved Network Security”, Journal of Computer Science and Engineering, Volume 5, Issue 2, February 2011
  2. Sandip Dutta, M.K. Singh, N.C. Mahanti, “Prolific Generation of Williamson Type Matrices”, Global Journal of Computer Science and Technology (GJCST), Volume 11, Issue 8, April/May 2011
  3. Sandip Dutta, Anand Kumar, N.C. Mahanti, “Network Security Based on Quantum Cryptography & Multi-qubit Hadamard Matrices”, Global Journal of Computer Science and Technology (GJCST), Volume 11, Issue 12, May/June 2011
  4. Sandip Dutta, Soubhik Chakraborty, N. C. Mahanti. “Fingerprint based cryptography technique for improved network security.” Journal of Computer Science and Engineering 5, no. 2 (2011): 11-18, 2011

2010

  1. Sandip Dutta, Soubhik Chakraborty, N.C. Mahanti, “A Novel Method of Hiding Message Using Musical Notes”, IJFCA (International Journal on Futuristic Computer Applications), International Journal of Computer Applications (0975 – 8887), Volume 1 – No. 16, 2010

Conferences

International

2025

  1. Purushottam Singh, Prashant Pranav and Sandip Dutta, “Anomaly Detection in IoT Networks using WGAN-GP: A Novel Approach for Robust IoT Security”, 4th International Conference on Cryptography, Network Security and Blockchain Technology (ICNSBT 2025), Proceedings in Lecture Notes in Networks and System, Springer (SCOPUS)

2024

  1. Deepshikha Kumari, Abhinav Sinha, Sandip Dutta and Prashant Pranav, “SMO-ANN: A Hybrid Classifier for Network Intrusion Detection System using Spider Monkey Optimization Algorithm”, 4th International Conference on Paradigms of Communication, Computing and Data Analytics (PCCDA 2024), Springer (SCOPUS)

2023      

  1. Deepshikha Kumari, Abhinav Sinha, Sandip Dutta, Prashant Pranav, “A Comprehensive Analysis of Various Cyber Attack Datasets Used for Intrusion Detection System”, International Conference on Machine Intelligence with Applications (ICMIA 2023), Springer
  2. Ankita Kumari, Prashant Pranav, Sandip Dutta, Soubhik Chakraborty, “Empirical and Statistical Comparison of RSA and El-Gamal in Terms of Time Complexity”, In: Hemanth, J., Pelusi, D., Chen, J.IZ. (eds), Proceedings of the International Conference on Intelligent Cyber Physical Systems and Internet of Things, Engineering Cyber – Physical Systems and Critical Infrastructure, 2023, Springer
  3. Purushottam Singh, Prashant Pranav, Vijay Nath, and Sandip Dutta, “Unmasking the Digital Illusion: A Comprehensive Bibliometric Analysis of Deepfake Detection Research”, 9th International Conference on Nanoelectronics, Computational Intelligence and Communication Systems (NCCS – 2023)
  4. Deepshikha Kumari, Abhinav Sinha, Sandip Dutta and Prashant Pranav, “A Comprehensive Analysis of Various Cyber Attack Datasets used for Intrusion Detection System”, International Conference on Machine Intelligence with Applications (ICMIA 2023), Springer (SCOPUS)

 2021

  1. Animesh Kumar, Sandip Dutta, “A Review on Cloud Computing Architecture.” Electronic Systems and Intelligent Computing: Proceedings of ESIC 2021 (2022): 197-202
  2. Prashant Pranav, Sandip Dutta, Soubhik Chakraborty, “An Involution Function-Based Symmetric Stream Cipher”, In: Nath V., Mandal J.K. (eds), Proceedings of the Fourth International Conference on Microelectronics, Computing and Communication Systems, Lecture Notes in Electrical Engineering, Volume – 673, Springer (SCOPUS), 2021
  3. Nayancy, Sandip Dutta, Soubhik Chakraborty, IoT Based Secure Communication to Enhance Blockchain Model, In: Nath V., Mandal J.K. (eds), Proceedings of the Fourth International Conference on Microelectronics, Computing and Communication Systems, Lecture Notes in Electrical Engineering, Volume – 673, Springer (SCOPUS), 2021
  4. Monalisha, Sandip Dutta, Survey of Lightweight Cryptography Algorithm for Data Security in the Internet of Things, In: Nath V., Mandal J.K. (eds), Proceedings of the Fourth International Conference on Microelectronics, Computing and Communication Systems, Lecture Notes in Electrical Engineering, Volume – 673, Springer (SCOPUS), 2021
  5. Dharmveer Kumar Yadav, Sandip Dutta, “Study and Analysis of Test Case Prioritization Techniques”, In: Nath V., Mandal J. (eds) Nanoelectronics, Circuits and Communication Systems. Lecture Notes in Electrical Engineering, vol 692. Springer, Singapore. https://doi.org/10.1007/978-981-15-7486-3_42, 2021

2020

  1. Sanyukta, Sandip Dutta, “An Improved Pig Latin Algorithm for Lightweight Cryptography”, In: Sahana S., Bhattacharjee V. (eds) Advances in Computational Intelligence. Advances in Intelligent Systems and Computing, vol 988. Springer, Singapore. https://doi.org/10.1007/978-981-13-8222-2_28, 2020
  2. Priyanka, Sandip Dutta, Soubhik Chakraborty, “Human Tracking System Based on GPS and IOT (Internet of Things)”. In: Pandian A., Senjyu T., Islam S., Wang H. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI – 2018). ICCBI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 31. Springer, Cham. https://doi.org/10.1007/978-3-030-24643-3_61, 2020

2019

  1. Dharmveer Kumar Yadav, Sandip Dutta, “A New Cluster-Based Test Case Prioritization using Cat Swarm Optimization Technique”, In: Nath V., Mandal J. (eds) Proceedings of the Third International Conference on Microelectronics, Computing and Communication Systems. Lecture Notes in Electrical Engineering, vol 556. Springer, Singapore. https://doi.org/10.1007/978-981-13-7091-5_36, 2019

2017

  1. Dharmveer Kumar Yadav, Sandip Dutta, “Regression Test Case Prioritization using Genetic Algorithm”, In: Sahana S., Saha S. (eds) Advances in Computational Intelligence. Advances in Intelligent Systems and Computing, vol 509. Springer, Singapore. https://doi.org/10.1007/978-981-10-2525-9_13, 2017

2016

  1. Dharmveer Kumar Yadav, Sandip Dutta, “Test Case Prioritization based on Early Fault Detection using Fuzzy Logic”, 3rd International Conference for Sustainable Global Development, Springer, 2016

2015

  1. Chandan Kumar, Sandip Dutta, Soubhik Chakraborty, “Cryptography key extraction from Music”, International Conference on Computational Intelligence, ICCI, 2015
  2. Sandip Dutta, “Information Security in Big data perspective”, Big Data Initiatives: Trends and Applications (BDI 2015), 2015

2014

  1. Chandan Kumar, Sandip Dutta, Soubhik Chakraborty, “Musical Cryptography using Genetic Algorithm”, IEEE International Conference on Circuits, Power and Computing Technologies ICCPCT-2014 Noorul Islam Centre for Higher Education, Kumaracoil, Thuckalay,Kanyakumari district, Tamilnadu-629180, INDIA, 2014

2011

  1. Sandip Dutta, Soubhik Chakraborty, N.C. Mahanti, “Using Raga as a Cryptographic Tool” 196. 178-183. 10.1007/978-3-642-22540-6_18, 2011

2008

  1. Sandip Dutta, A Kar, N.C. Mahanti, B.N. Chatterji, “Network Security using Biometric and Cryptography”, In: Blanc-Talon J., Bourennane S., Philips W., Popescu D., Scheunders P. (eds) Advanced Concepts for Intelligent Vision Systems. ACIVS 2008. Lecture Notes in Computer Science, vol 5259. Springer, Berlin, Heidelber

National

2015

      1. Sandip Dutta, “Image Compression using Wavelet Technique”, National Conference on Image Processing, 2015

2006

  1. Sandip Dutta, N.C. Mahanti, Smita Bhowmik, Jayeeta Nayak “Algorithm for Registration of IR and MMW Images”, National Conference on Mathematical Techniques: Emerging Paradigms for electronics and IT Industries (MATEIT 2006), Pg 123-129, 2006

Book Chapters

  1. Prashant Pranav, Anushkaa Prabhat, Deepshikha Kumari and Sandip Dutta, “Intrusion Detection System: Datasets, Threats, and Taxonomy”, Chapter – 03 In: Minakshi, Bijalwan A., Kumar T. (eds), Exploiting Machine Learning for Robust Security, 2025, IGI Global (SCOPUS)
  2. Purushottam Singh, Prashant Pranav, Sandip Dutta, “GAN Cryptography”, Chapter – 14 In: Pranav P., Patel A., Jain S. (eds), Machine Learning in Healthcare and Security (pp. 184-194), CRC Press
  3. Prashant Pranav, Sandip Dutta, Soubhik Chakraborty, “Security Issues for the Semantic Web”, Chapter – 18 In: Jain S., Jain A., Balas V. (eds), Web Semantics: Cutting Edge and Future Directions in Healthcare, 2021, Elsevier
  4. Prashant Pranav, Soubhik Chakraborty, Sandip Dutta, “Statistical Comparative Study of the Execution Time of AES-128, RSA and Blowfish through ANOVA”, In: S. Chakraborty, P. Pal Choudhury, S. S. Hassan, J. K. Das and A. Sengupta (Eds.), A Treatise on Computational Mathematics, Kolkata Press Books, Ist Ed., 2022, p.289-298 (ISBN: 978-93-94689-08-4)
  Current Sponsored Projects
  1. Title: Cyber Security Assessment of DDCS of Prototype Fast Breeder Reactor (PFBR) against Cyber Threats (IGCAR/EIG/DDCSD/2023/W.O.No. BITM-01)Role: PIFunding Agency: IGCAR (Indira Gandhi Centre for Atomic Research)

    Grant: Rs. 29,77,000

    Duration: 2023 – 2026

  2. Title: Center for Advanced Research on Machine Learning for Geospatial Analytics and Solutions for the state of JharkhandRole: Co-PIFunding Agency: PURSE, DST

    Grant: Rs. 8.5 Cr

    Duration: 2023 – 2027

  3. Title: Development of Intelligent Blockchain Techniques for providing efficient management and storage security solutions for E healthcare (BT/AGCJC0094/01/22)Role: CO – PIFunding Agency: BIRAC (Biotechnology Industry Research Assistance Council), DBT

    Grant: Rs. 10,00,000

    Duration: 2023

  Text and Reference Books
  1. Prashant Pranav, Sandip Dutta, Soubhik Chakraborty, Nayancy “Applied Cryptography for Researchers and Practitioners”, Nova Science Publishers, 2023
  2. Soubhik Chakraborty, Prashant Pranav, Naghma Khatoon, Sandip Dutta, “A Guide to Design and Analysis of Algorithms”, Nova Science Publishers, 2022
  3. Prashant Pranav, Sandip Dutta, Soubhik Chakraborty, “Recent Trends in Cryptography and its Allied Areas: Securing Voice Communication using Music”, RAR Publication, 2020
  Intellectual Property Rights (IPR)
  1. Title: An Encryption Based Portable Device for Generating Electronic Health Records (EHRs) and Method Thereof

           Patent No.: 202431032969

           Status: Published

           Date: 3rd May, 2024

           Inventors: Shamama Anwar, Prashant Pranav, Sandip Dutta

  1. Title: Network Security Defending Device

Patent No.: 409757-001

Status: Published

Date: 8th March, 2024

Inventors: Animesh Kumar, Saurabh Srivastava, Prashant Pranav, Sandip Dutta

 

  Fellow
  1. Prashant Pranav (Awarded, Completion Year – 2020, Area of Research: Cryptography, Music, and Algorithm Analysis, Thesis Title: Design and Analysis of Algorithms with Special Emphasis on Cryptography)
  2. Dharamveer Kumar Yadav (Awarded, Completion Year – 2020, Area of Research: Software Engineering, Thesis Title: Regression Test Case Selection and Prioritization of Test Case for Object-Oriented Software)
  3. Soumya Ray (Awarded, Completion Year – 2022, Area of Research: Security in Healthcare)
  4. Animesh Kumar (Awarded, Completion Year – 2024, Area of Research: Cryptography, Cloud Computing, Thesis Title: Design and Analysis of Security Protocols with a Special Emphasis on Cloud Computing)
  5. Nayancy (Awarded, Completion Year – 2024, Area of Research: Lightweight Cryptography, Blockchain, Thesis Title: Design and Analysis of Blockchain Protocols with a Special Emphasis on Lightweight Cryptography)
  6. Ankita Kumari (Awarded, Completion Year – 2024, Area of Research: Cryptography, MANET, Thesis Title: Design and Analysis of Security Protocols with a Special Emphasis on Mobile Ad-hoc Networks)
  7. Purushottam Singh (Pursuing, Area of Research: GAN Cryptography)
  8. Deepshikha Kumari (Pursuing, Area of Research: Intrusion Detection System)
  9. Sujit Kumar Chatterjee (Pursuing, Area of Research: Data Warehousing)

 

RACHEL HPC FACILITY Resource Usage Policy

Policy Overview

Date: 11 March 2026

The Rachel High Performance Computing (HPC) Facility provides shared computational infrastructure to support the research, teaching, and scholarly activities of the institution. To ensure equitable access and the efficient utilization of these resources, all registered users are required to read, understand, and comply with the provisions set out in this Policy. These guidelines are effective immediately upon account activation and apply to all submitted workloads, stored data, and system interactions.

ParameterLimit / Requirement
Maximum Job Runtime120 hours (5 consecutive days)
Per-User Storage Quota150 GB (unauthorised use prohibited)
Job MonitoringUser's ongoing responsibility
Storage MaintenancePeriodic review & cleanup required
Non-Compliance ActionJob termination / access suspension

Job Runtime Limit

No user shall be permitted to execute any computational job on the Rachel HPC cluster for a continuous period exceeding total 120 hours (CPU-5 consecutive days or GPU-3 consecutive days). Jobs that approach or exceed this threshold will be subject to administrative intervention, including automatic or manual termination, to preserve system availability for all users.

Users requiring extended runtime beyond the standard limit must submit a written request to the System Administrator prior to job submission, providing scientific justification and an estimated resource budget.

Storage Utilization Limit

Individual users shall not utilize more than total 150 GB (for CPU nCPU-12 Core & for GPU nGPU-6 Core) of storage on the Rachel HPC system without prior written authorization from the System Administration team. This quota encompasses all personal directories, project workspace, and temporary scratch areas associated with the user account.

The following storage hygiene practices are mandatory:

  • Removal of completed job output files that are no longer required for active analysis.
  • Deletion of temporary, intermediate, and scratch files upon job completion.
  • Regular archival of results to institutional long-term storage systems.
  • Prompt response to storage-usage alerts issued by System Administration.

Fair Resource Usage

All users are expected to exercise good judgement in their use of Rachel HPC resources. Users shall not monopolies CPUs, memory, network bandwidth, or storage in a manner that disrupts or prevents other researchers, faculty members, or students from accessing the facility.

Submitting large numbers of simultaneous jobs that saturate the scheduler queue without scientific necessity, or deliberately circumventing resource allocation controls, constitutes a violation of this Policy.

Job Monitoring Responsibility

Users bear full responsibility for monitoring all jobs they submit to the Rachel HPC scheduler. This responsibility includes:

  • Regularly checking job status, output logs, and resource-consumption metrics.
  • Promptly terminating any job found to be stalled, malfunctioning, or producing incorrect results.
  • Ensuring that submitted jobs do not run beyond their stated resource requirements.

Users who are unable to actively monitor a job due to absence or other commitments should make arrangements for a designated colleague to assume monitoring responsibility, or should limit job scope accordingly.

Storage Maintenance

Users shall periodically review their allocated storage space and proactively remove unnecessary files, redundant datasets, temporary data, and intermediate outputs. Maintaining adequate free capacity on the Rachel HPC storage systems is a shared responsibility that directly impacts the productivity of all users.

System Administration may issue storage-usage warnings when a user's allocation approaches the permitted quota. Users are expected to respond to such warnings within five (5) working days by reducing their storage footprint to within the authorized limit.

Policy Compliance

All users of the Rachel HPC facility are required to comply with the provisions of this Policy as a condition of continued access. Compliance is the personal responsibility of every account holder.

  Non-Compliance & Administrative Authority Failure to comply with any provision of this Policy may result in the immediate termination of running jobs, restriction of computational resource allocations, or temporary suspension of access privileges to the Rachel HPC facility. The System Administrator reserves the right to terminate any user process deemed to be making undue or excessive use of system resources, without prior notice, in order to maintain overall system stability and equitable access for all users.

                                                                                                                              

Signature of HOD (CSE)