scispace - formally typeset
Search or ask a question
Journal Article

Secured e-mail system using base 128 encoding scheme

Senthilkumar M1
01 Jan 2016-The Journal of pharmacy technology (International Journal of Pharmacy and Technology)-Vol. 8, Iss: 4, pp 21797-21806
About: This article is published in The Journal of pharmacy technology.The article was published on 2016-01-01 and is currently open access. It has received 38 citations till now. The article focuses on the topics: Base (topology).
Citations
More filters
Proceedings ArticleDOI
20 Apr 2017
TL;DR: In this paper, the estimations of Pearson's concrete compressive strength coefficient and Spearman's rank relationship coefficient and in addition their factual hugeness for various arrangements of information depicting provincial records of the financial advancement are compared.
Abstract: Spearman's rank relationship coefficient is a nonparametric (dispersion free) rank measurement. Spearman's coefficient is not a measure of the direct relationship between two factors, as a few ”analysts” proclaim. Pearson's relationship coefficient is the covariance of the two factors separated by the result of their standard deviations. The possibility of the paper is to look at the estimations of Pearson's concrete compressive strength coefficient and Spearman's rank relationship coefficient and in addition their factual hugeness for various arrangements of information depicting provincial records of the financial advancement. In this, the Spearman correlation coefficient is based on the ranked values for each variable rather than the raw data. Spearman correlation is often used to evaluate relationships involving ordinal variables. The Pearson and Spearman's method is compared with the rank coefficient in the concrete compressive strength.

57 citations

Proceedings ArticleDOI
01 Apr 2017
TL;DR: A new variant of RSA has been proposed called Memory Efficient Multi Key (MEMK) generation scheme, which reuses the RSA scheme with a Diophantine form of the nonlinear equation for memory efficiency and performs well.
Abstract: A new variant of RSA has been proposed called Memory Efficient Multi Key (MEMK) generation scheme. For sensitive data, our scheme will aid in exchanging the information between cloud to IoT and IoT to IoT devices. When cryptography belongs to the asymmetric type, then it has public and private keys. For memory efficiency, our scheme reuses the RSA scheme with a Diophantine form of the nonlinear equation. Moreover, our scheme performance comparatively performs well and this mainly due to the use of RSA public key alone. Due to this, our MEMK does not require multiplicative inverse function or Extended Euclid's algorithm. Finally, we have made an experimental result on various phases of MEMK PKC such as key generation, encryption, and decryption by varying the N-bit modulo bits from 1K to 10K.

52 citations

Proceedings ArticleDOI
01 Apr 2017
TL;DR: This work is going to implement boxplot method and control chart methods for Lung cancer dataset with the help of boxplot, which can easily make relations between samples and find the outliers.
Abstract: In statistical analysis, we have a collection of data, with the use of these data, we have to do analysis based on our requirements. With the collection of data using Statistical analysis, we deal collection, analysis, presentation and organizing the data. With the help of statistical analysis, we can find underlying patterns, relationships, and trends between data samples. The R system for statistical computing is an environment for data analysis and graphics. Here we are going to implement boxplot method and control chart methods for Lung cancer dataset. With the help of boxplot, we can easily make relations between samples and we can find the outliers.

43 citations

Proceedings ArticleDOI
01 Mar 2017
TL;DR: This informational collection is utilized to anticipate the odds of an event of heart assault for a patient and the total number of attributes is brought into a small figure so that the patient may be able to choose which property can be considered and which characteristic can be disregarded.
Abstract: This informational collection is utilized to anticipate the odds of an event of heart assault for a patient. In the season of cutting edge smartphones contributing 12 attributes is not feasible. We play out the product metric examination on the given informational collection. In view of the investigation of information we try to bring the total number of attributes into a small figure and in the end, we may be able to choose which property can be considered and which characteristic can be disregarded.

43 citations

Proceedings ArticleDOI
01 Apr 2017
TL;DR: This paper aims to propose an encryption algorithm used for secure communication by taking into account the limitations of IoT devices, which have a minimal amount of processing capabilities.
Abstract: IoT devices are everywhere. Shortly, every “thing” is going to be connected and interact with each other. What are these things? They can be your microwaves, heaters, air conditioners or even your refrigerators. It assessed that there would be 50 billion connected IoT devices by 2020 which is about 7 IoT gadgets for every individual on the planet. IoT devices are low powered devices which have a minimal amount of processing capabilities. With ever increasing number of IoT devices, there is a subsequent need for secure communication among them. In this paper, we aim to propose an encryption algorithm used for secure communication by taking into account the limitations of IoT devices.

38 citations