Department of Mathematics
Research Publication
Title of paper | Name of Author/s | Name of Journal | Year of Publication |
Conservative primal hybrid finite element method for weakly damped Klein-Gordon equation | Sanjib K. Acharya, Amiya K. Pani, Ajit Patel, Ravina Shokeen | Computers and Mathematics with Applications | 2025 |
Multiple solutions to an elliptic problem driven by a singular nonlinearity | R.Kr. Giri, D. Choudhuri & K. Saoudi | Journal of Differential Equations [ doi.org/10.1016/j.jde.2025.113263 ] | 2025 |
Exponential B-spline collocation method with Richardson extrapolation for generalized Black-Scholes equation | Shobha Mangal, Vikas Gupta | Journal of Applied Mathematics and Computing | 2025 |
Stability, sensitivity, and bifurcation analysis of a fractional-order HIV model of CD T cells with memory and external virus transmission from macrophages | P Sardar, S Biswas, KP Das, SK Sahani, Vikas Gupta | The European Physical Journal Plus | 2025 |
Exploring Neimark-Sacker Bifurcation and Chaos Control in a Tri-species DiscreteTime Model | Exploring Neimark-Sacker Bifurcation and Chaos Control in a Tri-species DiscreteTime Model | Iranian Journal of Science | 2025 |
Qualitative Analysis of a novel HIV infection Model of Macrophage cells in Caputo Fractional Environment | Purnendu Sardar, Santosh Biswas, Krishna pada Das, Vikas Gupta, Ilyas Khan, Gamal M Ismail, S Saleem | International Journal of Biomathematics | 2025 |
A numerical approach to solve the system of fractional Fredholm-Volterra Integrodifferential equations using rationalized Haar wavelets | Ajay Kumar, Vikas Gupta, Saurabh Kumar | Mathematical Methods in the Applied Sciences | 2025 |
A polynomial-based operational matrix approach to solve fractional-order Bratutype problems | Saurabh Kumar, Vikas Gupta | Journal of Nonlinear, Complex and Data Science (JNCDS) | Accepted in 2025 |
LEVY PROCESSES WITH JUMPS GOVERNED BY LOWER INCOMPLETE GAMMA SUBORDINATOR AND ITS VARIATIONS | MEENA SANJAY BABULAL, SUNIL KUMAR GAUTTAM AND ADITYA MAHESHWARI | Theory of Probability and its Applications | 2025 |
Block quantum dynamical semigroups of completely positive definite kernels | Santanu Dey, Dimple Saini, Harsh Trivedi | Infinite Dimensional Analysis, Quantum Probability and Related Topics | Accepted in 2024 |
An Efficient Numerical Approach to Solve Fractional Coupled Boussinesq Equations | Saurabh Kumar, Vikas Gupta | Journal of Computational and Nonlinear Dynamics | 2024 |
Optimally accurate second-order numerical scheme on layer-resolving graded mesh for singularly-perturbed boundary turning point problems exhibiting power-of-type-1 and hybrid layers | V.D. Liseikin, Vikas Gupta, Sanjay K. Sahoo | International Journal of Computer Mathematics | 2024 |
Design and analysis of a post-quantum secure three party authenticated key agreement protocol based on ring learning with error for mobile device | Kumar, U., Garg, M. & Chaudhary, D | Journal of super Computing, Springer | 2024 |
Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication | Kumar, U., Garg, M. & Kaushik, G | Cluster Computing, Springer | 2024 |
Discriminant and integral basis of pure nonic fields | A. Jakhar and N. Sangwan | J. Ramanujan Math. Soc. | 2024 |
Boolean function classes with high nonlinearity | K. Saini and M. Garg | Adv. Math. Commun. | 2024 |
An efficient collocation technique based on operational matrix of fractional-order Lagrange polynomials for solving the space-time fractional-order partial differential equations | S. Kumar, V. Gupta and D. Zeidan | Appl. Numer. Math. | 2024 |
Toxin producing phytoplankton and viral infection are the biological factors for occurrence and controlled of planktonic bloom | K pada Das, A Sarkar, S Sarkar, V Gupta, GS Paliwal, I Khan, S Jana, R. Kishore | Nonlinear Studies | 2024 |
A study of plankton bloom in a phytoplankton-zooplankton model with viral infection | K pada Das, A Sarkar, S Sarkar, V Gupta, GS Paliwal, I Khan, S Jana, R. Kishore | Nonlinear Studies | 2024 |
Powers and roots of partial isometric covariant representations | D. Saini, H. Trivedi and S. Veerabathiran | Adv. Oper. Theory | 2024 |
Mathematical Study of planktonic bloom in a nutrient phytoplankton model with toxin producing spaces and viral infection | K pada Das, A Sarkar, S Sarkar, P Karmakar, R Kumar, V Gupta, GS Paliwal, I Khan, S Jana, R. Kishore | Nonlinear Studies | 2024 |
Compact subsets of $C_{\lambda , u}(X)$ | P. Kumar and P. Garg | Math. Slovaca | 2024 |
Cauchy dual and Wold-type decomposition for bi-regular covariant representations | Dimple Saini | Acta Sci. Math. (Szeged) | 2024 |
A characterization of invariant subspaces for isometric representations of product system over $\Bbb N_0^k$ | D. Saini, H. Trivedi and S. Veerabathiran | Complex Anal. Oper. Theory | 2024 |
Modified $C^0$ interior penalty analysis for fourth order Dirichlet boundary control problem and a posteriori error estimates | S. Chowdhury, D. Garg and R. Shokeen | Math. Comput. Simulation | 2024 |
Berger-Coburn-Lebow representation for pure isometric representations of product system over $\Bbb N_0^2$, | D. Saini, H. Trivedi and S. Veerabathiran | J. Math. Anal. Appl. | 2024 |
A robust higher-order finite difference technique for a time-fractional singularly perturbed problem | S. K. Sahoo, V. Gupta and S. Dubey | Math. Comput. Simulation | 2024 |
Positive Solutions of Quasilinear Elliptic Equations with Fuchsian Potentials in Wolff Class | R.Kr. Giri & Y. Pinchover | Milan J. Math. | 2023 |
Collocation method with Lagrange polynomials for variable-order time-fractional advection-diffusion problems | S. Kumar and V. Gupta | Math. Methods Appl. Sci. | 2023 |
Second-order nonlinearity of a Boolean function class with low spectra | K. Saini and M. Garg | in {\it Advances in mathematical modelling, applied analysis and computation}, 100–109, Lect. Notes Netw. Syst., 666, Springer. | 2023 |
A study of the fractional tumour-immune unhealthy diet model using the pseudo-operational matrix method | S. Kumar and V. Gupta | in Computational methods for biological models, 137–148, Stud. Comput. Intell., 1109, Springer. | 2023 |
Parameter robust higher-order finite difference method for convection-diffusion problem with time delay | S. K. Sahoo and V. Gupta | Numer. Methods Partial Differential Equations | 2023 |
Beurling quotient subspaces for covariant representations of product systems | A. Rohilla, H. Trivedi and S. Veerabathiran | Ann. Funct. Anal. | 2023 |
An almost second-order robust computational technique for singularly perturbed parabolic turning point problem with an interior layer | S. K. Sahoo and V. Gupta | Math. Comput. Simulation | 2023 |
Irreducibility criteria for factorial modules | A. Jakhar and N. Sangwan | Comm. Algebra | 2023 |
A robust uniformly convergent finite difference scheme for the time-fractional singularly perturbed convection-diffusion problem | S. K. Sahoo and V. Gupta | Comput. Math. Appl. | 2023 |
Delegating signing rights in a multivariate proxy signature scheme | Sumit Kumar Debnath, Tanmay Choudhury, Pantelimon Stănică, Kunal Dey, and Nibedita Kundu | Adv. Math. Commun. | 2023 |
Generalized filter fans $X$ and the Baireness of $C_ k ( X)$ | P. Kumar and P. Garg | Topology Appl. | 2023 |
An approach based on fractional-order Lagrange polynomials for the numerical approximation of fractional order non-linear Volterra-Fredholm integro-differential equations | S. Kumar and V. Gupta | J. Appl. Math. Comput. | 2022 |
Regular covariant representations and their Wold-type decomposition | A. Rohilla, S. Veerabathiran and H. Trivedi | J. Math. Anal. Appl. | 2023 |
A Construction of Post Quantum Secure and Signal Leakage Resistant Authenticated Key Agreement Protocol for Mobile Communication | Uddeshaya Kumar, Manish Garg, Saru Kumari, and Dharminder | Transactions on Emerging Telecommunications Technologies, Wiley. | 2022 |
An efficient operational matrix technique to solve the fractional order non-local boundary value problems | S. Kumar, V. Gupta and J. F. G\’omez-Aguilar, | J. Math. Chem | 2022 |
A mesh adaptation algorithm using new monitor and estimator function for discontinuous and layered solution | P. Mishra, V. Gupta and R. K. Dubey, | Numer. Algebra Control Optim. | 2022 |
Higher order robust numerical computation for singularly perturbed problem involving discontinuous convective and source term | Sahoo SK, Gupta V. | Math. Methods Appl. Sci. | 2022 |
Primal hybrid method for quasilinear parabolic problems | R Shokeen, A Patel, A K Pani | Journal of Scientific Computing | 2022 |
A note on an enhanced dynamic authentication scheme for mobile satellite communication systems | Uddeshaya Kumar and Manish Garg | International Journal of Satellite Communications and Networking | 2022 |
On the Higher-Order Nonlinearity of a Boolean Bent Function class (Constructed via Niho power functions) | Kezia Saini and Manish Garg | Cryptography and Communications Discrete Structures, Boolean Functions and Sequences, Springer Nature | 2022 |
Rokhlin property for group actions on Hilbert C*-modules, | S. Dey, H. Osaka and H. Trivedi | Southeast Asian Bull. Math. | 2022 |
A Post Eriori Error Analysis of a distributed Optimal Control Problem Governed by von Karman Equations | Neela Nataraj, Sudipto Chowdhury, Asha Dond, Devika Shylaja. | ESAIM: M2AN | 2022 |
CCAKESC: Chaotic map based Construction of a new Authenticated Key Exchange Protocol for Satellite Communication | Uddeshaya Kumar and Manish Garg | International Journal of Satellite Communications and Networking, Wiley | 2021 |
Hybrid method for two parameter singularly perturbed elliptic boundary value problems | Jha, Anuradha ; Kadalbajoo, Mohan Krishen | Comput. Math. Methods | 2021 |
Post-quantum secure inner product functional encryption using multivariate public key cryptography | Debnath, Sumit Kumar ; Mesnager, Sihem ; Dey, Kunal ; Kundu, Nibedita | Mediterr. J. Math. | 2021 |
Secure and efficient multiparty private set intersection cardinality | Debnath, Sumit Kumar ; Stănică, Pantelimon ; Kundu, Nibedita Choudhury, Tanmay | Adv. Math. Commun | 2021 |
Feasible private set intersection in quantum domain | Debnath, Sumit Kumar ; Dey, Kunal ; Kundu, Nibedita ; Choudhury, Tanmay | Quantum Inf. Process. | 2021 |
Learning with error based key agreement and authentication scheme for satellite communication | Uddeshaya Kumar, Manish Garg | International Journal of Satellite Communications and Networking | 2021 |
Doubly commuting invariant subspaces for representations of product systems of C*-correspondences | H. Trivedi and S. Veerabathiran | Annals of Functional Analysis | 2021 |
A mesh adaptation algorithm using new monitor and estimator function for discontinuous and layered solution | Kumar P., Gupta V., Dubey R.K. | Numerical Algebra, Control and Optimization | 2021 |
An application of variational iteration method for solving fuzzy time-fractional diffusion equations | Kumar S., Gupta V. | Neural Computing and Applications | 2021 |
Second-order parameter-uniform finite difference scheme for singularly perturbed parabolic problem with a boundary turning point | Sahoo SK, Gupta V. | Journal of Difference Equations and Applications | 2021 |
Robust higher order finite difference scheme for singularly perturbed turning point problem with two outflow boundary layers | Gupta V., Sahoo SK., Dubey R.K. | Computational and Applied Mathematics | 2021 |
Certain algebraic invariants of edge ideals of join of graphs | Kumar A., Kumar R., Sarkar R. | Journal of Algebra and its Applications | 2021 |
Regularity, Rees algebra, and Betti numbers of certain cover ideals. | Kumar, Ajay ; Kumar, Rajiv | Arch. Math. (Basel) | 2020 |
A study of chaos and its possible control in an eco-epidemiological model with alternative food source in predator and weak Allee effect in prey species | Nath, Binayak ; Kumar, Vikas ; Kumari, Nitu ; Das, Krishna Pada ; Maiti, Somnath | Nonlinear Stud. | 2020 |
An inventory model for deteriorating items with multivariate demand and trade credit | Kumar V., Sharma A., Kumar A., Gupta C.B. | Advances in Mathematics: Scientific Journal | 2020 |
Regularity of symbolic powers of edge ideals | Jayanthan A.V., Kumar R. | Journal of Pure and Applied Algebra | 2020 |
Plankton dynamics in nutrient-phytoplankton-zooplankton model with viral infection in phytoplankton | Nath, Binayak ; Roy, Prodip ; Sahani, Saroj Kumar ; Maiti, S. ; Das, Krishna pada | Nonlinear Stud. | 2020 |
Construction of lightweight authentication scheme for network applicants using smart cards | Dharminder D., Rana S., Kundu N., Mishra D. | Sadhana – Academy Proceedings in Engineering Sciences | 2020 |
1-out-of-2: post-quantum oblivious transfer protocols based on multivariate public key cryptography | Kundu N., Debnath S.K., Mishra D. | Sadhana – Academy Proceedings in Engineering Sciences | 2020 |
A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party | Mishra D., Dharminder D., Yadav P., Sreenivasa Rao Y., Vijayakumar P., Kumar N. | Journal of Information Security and Applications | 2020 |
Post-quantum digital signature scheme based on multivariate cubic problem | Kundu N., Debnath S.K., Mishra D., Choudhury T. | Journal of Information Security and Applications | 2020 |
Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM system | Rana S., Mishra D. | Multimedia Tools and Applications | 2020 |
Authenticated content distribution framework for digital rights management systems with smart card revocation | Mishra D., Rana S. | International Journal of Communication Systems | 2020 |
Efficient and Secure Attribute Based Access Control Architecture for Smart Healthcare | Rana S., Mishra D. | Journal of Medical Systems | 2020 |
SFVCC: Chaotic map-based security framework for vehicular cloud computing | Mishra D., Kumar V., Dharminder D., Rana S. | IET Intelligent Transport Systems | 2020 |
RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing | Kumar V., Ahmad M., Mishra D., Kumari S., Khan M.K. | Vehicular Communications | 2020 |
LCPPA: Lattice-based conditional privacy preserving authentication in vehicular communication | Dharminder D., Mishra D. | Transactions on Emerging Telecommunications Technologies | 2020 |
Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services: Authorized Access to Healthcare Services | Dharminder D., Mishra D., Li X. | Journal of Medical Systems | 2020 |
Pseudo-completeness of the compact-open topology on C(X) | Kumar P., Garg P. | Topology and its Applications | 2020 |
A Mesh Refinement Algorithm for Singularly Perturbed Boundary and Interior Layer Problems | Dubey R.K., Gupta V. | International Journal of Computational Methods | 2020 |
A secure authentication framework for WSN-based safety monitoring in coal mines | Ansari A.A., Gera P., Mishra B., Mishra D. | Sadhana – Academy Proceedings in Engineering Sciences | 2020 |
Morley FEM for a Distributed Optimal Control Problems Governed by von K`arm`an Equations | Sudipto Chowdhury, Neela Nataraj, Devika Shylaja | Computational Methods in Applied Mathematics | 2020 |
Bures Distance and Transition Probability for α -CPD-Kernels | Dey S., Trivedi H. | Complex Analysis and Operator Theory | 2019 |
Generating wandering subspaces for doubly commuting covariant representations | H. Trivedi and S. Veerabathiran | Integral Equations Operator Theory | 2019 |
Disappearance of limit cycle oscillations in a predator-prey model: Role of mortality due to predation of infected prey | Das K.P., Ghosh S., Maiti S. | International Journal of Dynamical Systems and Differential Equations | 2019 |
A priori error analysis of the stabilized Lagrange multiplier method for elliptic problems with natural norms | Acharya S.K., Patel A. | Journal of Applied Mathematics and Computing | 2019 |
A parameter-uniform higher order finite difference scheme for singularly perturbed time-dependent parabolic problem with two small parameters | Gupta V., Kadalbajoo M.K., Dubey R.K. | International Journal of Computer Mathematics | 2019 |
PSMECS: A provably secure ID-based communication in mobile edge computing | Dharminder D., Mishra D. | International Journal of Communication Systems | 2019 |
An authentication framework for roaming service in global mobility networks | Srinivas J., Mishra D., Mukhopadhyay S., Kumari S., Guleria V. | Information Technology and Control | 2019 |
Radial-basis-function-based finite difference operator splitting method for pricing American options | Kadalbajoo M.K., Kumar, A., Tripathi, L.P. | International Journal of Computer Mathematics | 2018 |
Provably secure biometric based authentication and key agreement protocol for wireless sensor networks | Srinivas, J., Mishra, D., Mukhopadhyay, S., Kumari, S. | Journal of Ambient Intelligence and Humanized Computing | 2018 |
Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks | Mishra, D., Vijayakumar, P., Sureshkumar, V., Amin, R., Islam, S.H., Gope, P. | Multimedia Tools and Applications | 2018 |
Privacy Preserving Password-Based Multi-server Authenticated Key Agreement Protocol Using Smart Card | Mishra, D., Dhal, S. | Wireless Personal Communications | 2018 |
A note on the higher-order nonlinearity of niho function | Garg M. | Fundamenta Informaticae | 2018 |
Higher order numerical approximation for time dependent singularly perturbed differential-difference convection-diffusion equations | Gupta, V., Kumar, M., Kumar, S | Numerical Methods for Partial Differential Equations | 2018 |
Existence of a weak solution for a class of fractional Laplacian equations | Raghavendra, V.; Kar, Rasmita | J. Aust. Math. Soc. | 2017 |
Risk-sensitive control of reflected diffusion processes on orthrant | Gauttam, Sunil Kumar ; Kumar, K. Suresh ; Pal, Chandan | Pure Appl. Funct. Anal. | 2017 |
A password based authentication scheme for wireless multimedia systems | Doshi, N., Kumari, S., Mishra, D., Li, X., Choo, K.-K.R., Sangaiah, A.K. | Multimedia Tools and Applications | 2017 |
Stabilized Lagrange multiplier method for elliptic and parabolic interface problems | Patel A., Acharya S.K., | Applied Numerical Mathematics | 2017 |
A Self-Verifiable Password Based Authentication Scheme for Multi-Server Architecture Using Smart Card | Srinivas, J., Mukhopadhyay, S., Mishra, D. | Wireless Personal Communications | 2017 |
External Source of Infection and Nutritional Efficiency Control Chaos in a Predator-Prey Model with Disease in the Predator | Pada Das, K., Roy, P., Ghosh, S., Maiti, S. | Biophysical Reviews and Letters | 2017 |
A Mutual Authentication Framework for Wireless Medical Sensor Networks | Srinivas, J., Mishra, D., Mukhopadhyay, S. | Journal of Medical Systems | 2017 |
Rheological fluid motion in tube by metachronal waves of cilia | Maiti, S., Pandey, S.K. | Applied Mathematics and Mechanics (English Edition) | 2017 |
A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme | Chaturvedi, A., Mishra, D., Jangirala, S., Mukhopadhyay, S. | Journal of Information Security and Applications | 2017 |
Secure and efficient user authentication scheme for multi-gateway wireless sensor networks | Srinivas, J., Mukhopadhyay, S., Mishra, D. | Ad Hoc Networks | 2017 |
Improving Security of Lightweight Authentication Technique for Heterogeneous Wireless Sensor Networks | Mishra, B. ; Mishra, D. | Wireless Personal Communications | 2017 |
Parameter free hybrid numerical method for solving modified Burgers’ equations on a nonuniform mesh | Mohan K. Kadalbajoo and Ashish Awasthi | Asian-European Journal of Mathematics | 2017 |
Radial-basis-function-based finite difference operator splitting method for pricing American options | Mohan K. Kadalbajoo,Alpesh Kumar &Lok Pati Tripathi | International Journal of Computer Mathematics | 2017 |
An Error Analysis of a Finite Element Method with IMEX-Time Semidiscretizations for Some Partial Integro-differential Inequalities Arising in the Pricing of American Options | Mohan K. Kadalbajoo, Lok Pati Tripathi, and Alpesh Kumar | SIAM Journal on Numerical Analysis | 2017 |
Design of a password-based authenticated key exchange protocol for SIP | Mishra, D. | Multimedia Tools and Applications | 2016 |
A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography | Mishra, D., Das, A.K., Mukhopadhyay, S., Wazid, M. | Wireless Personal Communications | 2016 |
Primal hybrid method for parabolic problems | Acharya S.K., Patel A. | Applied Numerical Mathematics | 2016 |
Design of a secure smart card-based multi-server authentication scheme | Chaturvedi, A., Das, A.K., Mishra, D., Mukhopadhyay, S. | Journal of Information Security and Applications | 2016 |
Local maximum principle satisfying high-order non-oscillatory schemes | Dubey, R.K., Biswas, B., Gupta, V. | International Journal for Numerical Methods in Fluids | 2016 |
Qualitative analysis and numerical solution of burgers’ equation via B-spline collocation with implicit euler method on piecewise uniform mesh | Gupta, V., Kadalbajoo, M.K. | Journal of Numerical Mathematics | 2016 |
H-p spectral element methods for three dimensional elliptic problems on non-smooth domains, Part-III: Error estimates, preconditioners, computational techniques and numerical results | Dutt, P., Husain, A., Vasudeva Murthy, A.S., Upadhyay, C.S. | Computers and Mathematics with Applications | 2016 |
Least-squares spectral element method for three dimensional Stokes equations | Mohapatra, S., Husain, A. | Applied Numerical Mathematics | 2016 |
Design and Analysis of a Provably Secure Multi-server Authentication Scheme | Mishra, D. | Wireless Personal Communications | 2016 |
Research Center
Centre for Mathematical & Financial Computing (C-MFC)
Welcome to the newly formed interdisciplinary Centre for Mathematical & Financial Computing (C-MFC) at The LNM Institute of Information Technology, Jaipur. The centre is supported by DST-FIST grant received by the Department of Mathematics. The centre has been established as a physical centre at the Research, Innovation, and Entrepreneurship Park (RIEP) at the LNMIIT Jaipur.
Vision Statement:
The key vision of the Centre for Mathematical & Financial Computing is to be the leading research centre of international repute.
Sponsored Research Projects
Name of the Investigator | Title of the project and duration | Amount sanctioned | Funding Agency |
Dr. Akhlaq Husain(PI) with Dr. Ajit Patel and Dr. Vikas Gupta(Co-PIs) | Least square non-conforming h-p Spectral Element Methods for three dimensional elliptic problems on non-linear smooth domains using parallel computers(2014-16, 3 years) | 13,62,000/- | Science and Engineering Research Board (SERB), DST, Government of India |
Dr. Dheerendra Mishra | Design and Analysis of Content Distribution Framework for Digital Rights Management Systems Based on Cryptographic Primitives, 2016-19, 3 years | 15,07,809/- | Science and Engineering Research Board (SERB), DST, Government of India |
Dr. Vikas Gupta | Fund for Improvement of S&T Infrastructure in Universities and Higher Education Institutes (FIST), 2018-23, 5 years | 58,00,000/- | DST, Govt. of India |
Dr. Harsh Trivedi | Decompositions of completely contractive covariant representations, 2022-25, 3 years | 600000/- | Science and Engineering Research Board (SERB), DST, Government of India |
Dr. Dishari Chaudhuri | The Twisted Derivation Problem on Algebras and Its Applications, 2023-26, 3 years | 17,65,000/- | Science and Engineering Research Board (SERB), DST, Government of India |
Conferences and Workshops funded by various funding agencies
- National Workshop on Undergraduate mathematics (NWUM 2025), February 10-11, 2025, LNMIIT Jaipur (Funded by LNMIIT Jaipur).
- National Workshop cum FDP on Deep Learning in Scientific Computing (DLSC-2025), 24-28 March 2025, jointly organized by Centre for Mathematical and Financial Computing (CMFC), Department of Mathematics, and Centre for Machine Learning and Big Data Analytics (CMLBDA) at LNMIIT; in association with Indian Society for Mathematical Modeling and Computer Simulation (ISMMACS) held at LNMIIT Jaipur (Funded by LNMIIT Jaipur).
- National Workshop on Topology and Functional Analysis (NWTFA-2019), March 11-15, 2019, LNMIIT Jaipur (Funded by LNMIIT Jaipur)
- National Instructional workshop on Cryptography (NIWC-2017), July 05-07, 2017, LNMIIT Jaipur, india. (Funded by CRSI and LNMIIT Jaipur).
- Advance level workshop on Diffusion and subdiffusion problems: Theory Numerics and Applications (WDSDPTNA-2017), Jan. 31—Feb. 5, 2017, LNMIIT Jaipur, India. (Funded by NPDE-TCA (DST), LNMIIT Jaipur)
- National Workshop on Cryptography (NWC-2015), Dec. 14-20, 2015. LNMIIT Jaipur, India (Funded by NBHM, IBM)
- Undergraduate Level Training (UG-2015) under the auspices of National Program on Differential Equations: Theory Computation and Applications (NPDE-TCA), IIT Bombay, May 18-June 06, 2015, LNMIIT Jaipur, India. (Funded by NPDE-TCA (DST), LNMIIT Jaipur)
- Workshop on GPU Computing August 09-10, 2014 (Funded by LNMIIT Jaipur)
- Conference on Partial Differential Equations (CPDE-2014), December 10-11, 2014, LNMIIT Jaipur, India. (Funded by NBHM, LNMIIT Jaipur)
- Advanced level Workshop on Hyperbolic PDEs: Theory, Numerics & Applications (HPTNA-2014), December 01-09, 2014, LNMIIT Jaipur, India. (Funded by NBHM, DST, New Delhi & LNMIIT Jaipur)
- Workshop on Elliptic Equations: Variational Formulation and Numerics, EEVFN, 09 – 21 December 2013; (Funded by NBHM and LNMIIT Jaipur