Wednesday, 9 July 2014

An Approach for Effective Diagnosis of Diseases

Abstract -
In this paper is based on Disease Analysis, as we can say that system is work  as a Artificial Doctor. General Doctor faced the problem about disease  analysis. Patients do not say their symptoms correctly to the doctor because  sometimes they forget to tell and sometimes they are not sincere about the  symptoms. There is one more problem faced by the general medicine doctor  that sometimes they forget to ask some symptoms to the patients, and if they  ask all then this is so time consuming for them to analysis a patient. In  proposed system, we analysis the disease according to the symptoms of patient  and gave the possibility of the diseases. It is like an assistant doctor with more  intelligently 

Keywords -  General Disease Diagnosis, Medical Diagnosis, medical  knowledge



Publication Details - 

Title
An Approach for Effective Diagnosis of Diseases 
Co-Author
Gaurav Shrivastava**
Publications
International Journal of Information & Computation Technology.
Date & Year
2014
Volume
Volume 4, Number 16 (2014)  Page No. 1711-1717 
ISSN No.
ISSN 0974-2239

Download Full Length Paper

Tuesday, 8 July 2014

Effective Diagnosis of Diseases through Symptoms Using Artificial Intelligence and Neural Network

Abstract -
In this Research paper is based on artificial intelligence. Artificial Intelligence means learn by knowledge. In this research mechanism for artificial doctor that based on knowledge based. This artificial doctor has the capability to give possibilities of all diseases on the basis of symptoms of patient. It’s like an assistant doctor with more intelligent’s. This mechanism asks the patient about the symptoms. On the basis of those symptoms it will suggest about the possibilities of diseases. This mechanism helps to doctor to identify the disease of the patient. It will also ask about the previous and family history. This mechanism gave the result by studying the previous treatment also, so it takes every possibility of diseases. And it will also alert the doctor for the medicine which cannot be given to the patient.

Keywords-
Artificial Neural Networks, General Disease Diagnosis, Medical Diagnosis, Medical Knowledge, Neural Networks

Publication Details- 


Title
Effective Diagnosis of Diseases through Symptoms Using Artificial Intelligence and Neural Network
Co-Author
Gaurav Shrivastava**
Publications
International Journal of Engineering Research and
Applications (IJERA)
Date & Year
Jul-Aug 2013
Volume
Vol. 3, Issue 4, Page No. 2229-2231
ISSN No.
ISSN: 2248-9622

Using Letters Frequency Analysis in Caesar Cipher with Double Columnar Transposition Technique

Abstract-
In this paper we have some modification in Caesar Cipher Technique. We have proposed a method to enhancing the Caesar cipher for more efficient and secure. We use Relative Frequency of Letters in Alphabets. We arrange the sequence of letter according to the frequency in increasing ordered. And then we have made use of a Modified Caesar cipher technique with double Columnar Transposition Technique.


Keywords-

Caesar Cipher, Double Columnar Transposition Technique, Frequency of Letters.

Publication Details-


Title
Using Letters Frequency Analysis in Caesar Cipher with Double Columnar Transposition Technique
Main Author
Gaurav Shrivastava*
Publications
International Journal Of Engineering Sciences & Research
Technology
Date & Year
01 June, 2013
Volume
Vol. 2 Issue 6 ,Page No. 1475-1478
ISSN No.
ISSN: 2277-9655


Download Full Length Paper

A Modified Version of Extended PlayFair Cipher (8X8)

ABSTRACT-
In this paper we have some modification in Playfair Cipher Substitution Technique. We have proposed a method to enhance the Playfair cipher for more secure and efficient cryptography. We use 8X8 Playfair cipher and  have made use of a Simple Columnar Transposition Technique with Multiple Rounds in 8X8 Playfair Cipher Substitution Technique and  arranged a special symbol by overall Character Frequency Analysis (CFA) .

Keywords- Playfair Cipher, Simple Columnar Transposition Technique,Special Symbols, CFA 

Publication Details -

Title 
A Modified Version of Extended PlayFair Cipher (8X8)
Main Author
Gaurav Shrivastava* 
Publications
International Journal of Engineering And Computer Science
Date & Year
1 May 2013 
Volume
Volume 2 Issue 4, Page No. 956 -961
ISSN No.
ISSN: 2319-7242

Download Full Length Paper



An Enhance Security of Play Fair Cipher Using a Simple Columnar Transposition Technique With Multiple Rounds (SCTTMR)

ABSTRACT-
In this paper, we have made use of a traditional Playfair cipher technique with Simple Columnar Transposition Technique with Multiple Rounds (SCTTMR). After applying SCTTMR we got the actual cipher. Our main focus is on the Playfair Cipher, its advantages and disadvantages. Finally, we have proposed methods to enhance the Playfair cipher for more secure and efficient cryptography which provide difficulty in identifying individual diagram.

KEYWORDS- 
Playfair Cipher, Simple Columnar Transposition Technique, SCTTMR, Substitution Cipher.

Publication Details-
Main Author
Gaurav Shrivastava*
Publications
International Journal of Research in Commerce, IT & Management
Date & Year
Published 10 August 2012
Volume
Volume No. 2 (Issue 8), Page No. 75 - 78
ISSN No.
ISSN: 2231 - 1009

Download Full Length of Paper

Secure File Transmission Scheme Based on Hybrid Encryption Technique

ABSTRACT-
To enhance the security level of data transmission in Open Network, a hybrid encryption Technique based on AES, RSA and MD5 is proposed. The mechanism makes full use of advantage of AES RSA, MD5 because encryption speed of AES algorithm is faster than RSA algorithm for long Encrypting Plain Texts, and RSA algorithm Key distribute is very safely and easily. Under the dual protection with the AES algorithm and the RSA algorithm, the data transmission in the Open Network will be more secure. Mean while, it is clear that the procedure of the entire encryption is still simple and efficient as ever. Digital abstract Algorithm MD5 is adopted in this technique. It is an effective technique to overcome the problem of safe data transmission in network. This Technique maintained the confidentiality, Authentication and Integrity.

Keywords-
Double DES, RSA, Digital Abstract. Hybrid Encryption Technique

Publication Details-


Main Author
Gaurav Shrivastava*
Publications
IJMRA International Journal of Management, IT & Engineering
Date & Year
Published 1 January 2012
Volume
Volume. 2 (Issue 1), Page No. 224 - 238
ISSN No.
ISSN :  2249-0558


Download Full Length Paper

An Intregrated Encryption Scheme ised in Bluetooth Commmunication Mechnism

ABSTRACT-
To improve the security level of data Transmission in Bluetooth communication, A Integrated Encryption Scheme algorithm based on IDEA, RSA and MD5 is proposed. The currently hybrid encryption algorithm uses DES and RSA Algorithm, DES use for Encryption of Data and RSA use for Encryption of Key. Hybrid encryption algorithm employed by the Bluetooth to protect the confidentiality of data during transport between two or more devices [2]. In proposed Integrated Encryption Scheme algorithm mechanism makes a full use of advantage of IDEA Algorithm of Data Encryption because it’s faster than RSA Algorithm for long plain text and RSA Algorithm distributed key safely and easily. Digital abstract Algorithm MD5 is adopted in this mechanism. This Mechanism realizes the confidentiality, Completeness, Authentication and Integrity.

Keywords-
Authentication, IDEA, Integrity, MD5, RSA, Data Transmission.

Publication Details-


Main Author
Gaurav Shrivastava*
Publications
VSRD International Journal of Computer Science and Information Technology
Date & Year
Published 6 November 2011
Volume
Volume. 1 (8), Page No. 567-572
ISSN No.
ISSN: 2231-2471


Download Full Length Paper

Analysis of Cryptosystem using DES with RSA

ABSTRACT-
The Data Encryption Standard (DES) is the most common Secret Key Cryptography scheme. DES was designed by IBM in the 1970 and adopted by the National Bureau of Standards (NBS). This paper proposes a new scheme to enhance the security of cryptosystem. DES is widely used throughout the world for information security. DES so far has been stronger than other cryptosystems in the security. But, due to the advancement in the hardware technique, DES may be attacked by parallel processing. Thus a new scheme to strengthen the DES is needed to protect the cryptosystem. This new scheme will use Triple DES Three Times with RSA Algorithm. This will provide 504 bit key length. This results in enhancing the security level along with an increase in File size which is the major drawback in this scheme. In future we are trying that security level is increased but file size remain constant.


Keywords- Cryptography, Cryptanalysis, Data Encryption Standard, DES, RSA, Triple DES, Key Length.

Publication Details-


Main Author
Gaurav Shrivastava*
Publications
VSRD International Journal of Computer Science and Information Technology
Date & Year
Published 1 October 2011
Volume
Volume.1 (7), Page No 465-470
ISSN No.
ISSN: 2231-2471

Download Full Length Paper