Ajay Bhushan | Galgotias College of Engineering and Technology Greater Noida (original) (raw)

Uploads

Books by Ajay Bhushan

Research paper thumbnail of IoT-Based Buffalo Health Monitoring System

Ensuring the health and well-being of dairy buffaloes is crucial for farms, but manual monitoring... more Ensuring the health and well-being of dairy buffaloes is crucial for farms, but manual monitoring is challenging, especially in large herds. To address this, we introduce an innovative IoT-based system designed for buffalo health monitoring. This system consists of essential components. Special sensors and devices are attached to buffaloes to collect vital health data continuously. This data is sent to a cloud-based system, acting as a central hub for secure data storage and real-time access. Farm managers and employees can use a user-friendly application to monitor the buffalo's health and receive alerts for any issues. The key feature lies in the data analysis algorithms. These algorithms process the data, spotting patterns and early signs of diseases, enabling swift intervention. This system brings multiple benefits. It frees up farm employees from intensive monitoring, ensuring early disease detection for timely treatment. It also enhances farm productivity by reducing disease risks and optimizing resource usage. The IoT-based buffalo health monitoring system thus represents a significant advancement in agriculture. It eases the burden of monitoring, improves animal welfare, and contributes to more sustainable and efficient farming practices.

Research paper thumbnail of Protecting the Environment through Sustainable Development Goals (SDG

Research paper thumbnail of Harmful Effects of Ionizing Radiation

Human population throughout the world is surrounded by an invisible continuously increasing web o... more Human population throughout the world is surrounded by an invisible continuously increasing web of radiation, originating from both natural and non-natural sources. Radiation is of two types: ionizing and non-ionizing depending upon their energy. The exposure to radiation has increased many folds in the recent years with the invention and launch of many electromagnetic devices. Exposure to ionizing radiations has been found to cause severe abnormalities in human beings such as DNA damage, cancer, infertility, electro-hypersensitivity, etc. which however is of different intensity depending upon the age group of human beings, with children and fetus being the maximum sufferers because of immature immune system and also various other cells in their body are still at the stage of division and differentiation. Present study has been aimed to investigate a generalized preliminary idea of various health related complications caused by ionizing radiations to human beings with special emphasis to fetus and children.

Research paper thumbnail of Title: Non-Ionizing Radiation And Human Health

We receive an unwanted exposure of non-ionizing radiations on a daily basis from variety of consu... more We receive an unwanted exposure of non-ionizing radiations on a daily basis from variety of consumer products. Common sources of exposure to non-ionizing radiation include mobile phones and towers, dryers, machinery used in hospitals, Photostat, etc. These radiation no doubt are of low magnitude and literally do no cause any side effect simultaneously to their exposure, but their continuous exposure for long times can definitely cause serious health complications not only to the present but also to the future generations.

Research paper thumbnail of Internet of Things (IoT) to Study the Wild Life: A Review

J. Biol. Chem. Chron. , 2020

Internet of Things (IOT) has emerged as an efficient technical support for the biological researc... more Internet of Things (IOT) has emerged as an efficient technical support for the biological researchers. Present study has been focused on four applications of IOT used for wildlife monitoring; location tracking, habitat, in situ observation, and behavioral studies. IOT based monitoring unit for wildlife studies mainly includes sensing, communication, software and relative hardware components.

Research paper thumbnail of Tordes A New Approach To Symmetric Key Encryption

Papers by Ajay Bhushan

Research paper thumbnail of Available online at: www.ijarcsse.com A Study of wireless Ad-Hoc Network attack and Routing Protocol attack

— Security is an essential requirement in wireless ad hoc network. Compared to wired networks, wi... more — Security is an essential requirement in wireless ad hoc network. Compared to wired networks, wireless ad hoc network are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad h oc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks and alsoVarious attacks on the routing protocol are described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge,

Research paper thumbnail of A Study on Minimization of 2G/3G Handover Failure

International Journal of Advanced Research in Computer Science, Apr 1, 2012

Abstract—One of the most interesting 3G networks feature is their integration with the 2G network... more Abstract—One of the most interesting 3G networks feature is their integration with the 2G networks. It provides seamless End to-End services. Current widely deployed 2G and 3G networks provide enabling interoperability. These mechanisms include Inter RAT idle ...

Research paper thumbnail of Available online at: www.ijarcsse.com A Study on Minimization of 2G/3G Handover Failure Amit Kumar

amit.chaturvedi109 @ gmail.com Abstract — One of the most interesting 3G networks feature is thei... more amit.chaturvedi109 @ gmail.com Abstract — One of the most interesting 3G networks feature is their integration with the 2G networks. It provides seamless End to-End services. Current widely deployed 2G and 3G networks provide enabling interoperability. These mechanisms include Inter RAT idle mode reselection. Inter RAT dedicated mode reselection is used for PS (Packet Switching) services. The WLAN coverage on one hand provides an extra coverage in the low signal strength region. We perform the channel scanning with in the WLAN coverage area. To reduce the handover failure due to scanning delay.

Research paper thumbnail of Harmful Effects of Ionizing Radiation

International Journal for Research in Applied Science and Engineering Technology, 2019

Research paper thumbnail of Transform Operator Random Generator Delimiter Based Encryption Standard (TORDES)

Research paper thumbnail of Cryptanalysis with A Symmetric Key Algorithm TORDES

Research paper thumbnail of TORDES -- The new symmetric

The selective application of technology and related procedural safeguard is an important responsi... more The selective application of technology and related procedural safeguard is an important responsibility for cryptographic algorithm to its electronic data systems. This paper specifies the functionality of TORDES for encryption and decryption to protect the sensitive unclassified data. TORDES is made available within the context of a total security program consisting of physical security procedure.

Research paper thumbnail of Internet of Things (IoT) to Study the Wild Life: A Review

Journal of Biological and Chemical Chronicles, 2020

Research paper thumbnail of On observing the Animal ecology through Internet of Things (IoT)

Journal of Computer and Information Technology, 2019

Research paper thumbnail of A Study on Minimization of 3G/4G Handover Failure

International Journal of Scientific Research in Science, Engineering and Technology, 2019

One of the better thought-provoking features of Fourth Generation networks is their assimilation ... more One of the better thought-provoking features of Fourth Generation networks is their assimilation with Third Generation networks. It supports seamless End to-End services. At present extensively deployed Third Generation and Fourth Generation networks provide enabling interoperability. The particular mechanisms have Inter RAT idle mode reselection. Inter RAT dedicated mode reselection is used for Packet Switching services. The WLAN coverage on one hand contribute an further coverage in the low signal strength sector. We achieved the channel scanning with in the WLAN coverage area. To decrease the handover failure by reason of scanning delay.

Research paper thumbnail of Tordes a New Symmetric Key Algorithm

Journal of university of anbar for pure science : Vol.6:NO.2 : 2012, 2012

Research paper thumbnail of Tordes : A New Approach To Symmetric Key Encryption

Research paper thumbnail of A Study of TORDES with other Symmetric Key Algorithms

International Journal of Advanced Research in Computer Science and Software Engineering, Dec 1, 2012

Research paper thumbnail of Component of Symmetric key Algorithm TORDES with its Functionality

International Journal of Computational Engineering & Management, Sep 1, 2012

Research paper thumbnail of IoT-Based Buffalo Health Monitoring System

Ensuring the health and well-being of dairy buffaloes is crucial for farms, but manual monitoring... more Ensuring the health and well-being of dairy buffaloes is crucial for farms, but manual monitoring is challenging, especially in large herds. To address this, we introduce an innovative IoT-based system designed for buffalo health monitoring. This system consists of essential components. Special sensors and devices are attached to buffaloes to collect vital health data continuously. This data is sent to a cloud-based system, acting as a central hub for secure data storage and real-time access. Farm managers and employees can use a user-friendly application to monitor the buffalo's health and receive alerts for any issues. The key feature lies in the data analysis algorithms. These algorithms process the data, spotting patterns and early signs of diseases, enabling swift intervention. This system brings multiple benefits. It frees up farm employees from intensive monitoring, ensuring early disease detection for timely treatment. It also enhances farm productivity by reducing disease risks and optimizing resource usage. The IoT-based buffalo health monitoring system thus represents a significant advancement in agriculture. It eases the burden of monitoring, improves animal welfare, and contributes to more sustainable and efficient farming practices.

Research paper thumbnail of Protecting the Environment through Sustainable Development Goals (SDG

Research paper thumbnail of Harmful Effects of Ionizing Radiation

Human population throughout the world is surrounded by an invisible continuously increasing web o... more Human population throughout the world is surrounded by an invisible continuously increasing web of radiation, originating from both natural and non-natural sources. Radiation is of two types: ionizing and non-ionizing depending upon their energy. The exposure to radiation has increased many folds in the recent years with the invention and launch of many electromagnetic devices. Exposure to ionizing radiations has been found to cause severe abnormalities in human beings such as DNA damage, cancer, infertility, electro-hypersensitivity, etc. which however is of different intensity depending upon the age group of human beings, with children and fetus being the maximum sufferers because of immature immune system and also various other cells in their body are still at the stage of division and differentiation. Present study has been aimed to investigate a generalized preliminary idea of various health related complications caused by ionizing radiations to human beings with special emphasis to fetus and children.

Research paper thumbnail of Title: Non-Ionizing Radiation And Human Health

We receive an unwanted exposure of non-ionizing radiations on a daily basis from variety of consu... more We receive an unwanted exposure of non-ionizing radiations on a daily basis from variety of consumer products. Common sources of exposure to non-ionizing radiation include mobile phones and towers, dryers, machinery used in hospitals, Photostat, etc. These radiation no doubt are of low magnitude and literally do no cause any side effect simultaneously to their exposure, but their continuous exposure for long times can definitely cause serious health complications not only to the present but also to the future generations.

Research paper thumbnail of Internet of Things (IoT) to Study the Wild Life: A Review

J. Biol. Chem. Chron. , 2020

Internet of Things (IOT) has emerged as an efficient technical support for the biological researc... more Internet of Things (IOT) has emerged as an efficient technical support for the biological researchers. Present study has been focused on four applications of IOT used for wildlife monitoring; location tracking, habitat, in situ observation, and behavioral studies. IOT based monitoring unit for wildlife studies mainly includes sensing, communication, software and relative hardware components.

Research paper thumbnail of Tordes A New Approach To Symmetric Key Encryption

Research paper thumbnail of Available online at: www.ijarcsse.com A Study of wireless Ad-Hoc Network attack and Routing Protocol attack

— Security is an essential requirement in wireless ad hoc network. Compared to wired networks, wi... more — Security is an essential requirement in wireless ad hoc network. Compared to wired networks, wireless ad hoc network are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad h oc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks and alsoVarious attacks on the routing protocol are described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge,

Research paper thumbnail of A Study on Minimization of 2G/3G Handover Failure

International Journal of Advanced Research in Computer Science, Apr 1, 2012

Abstract—One of the most interesting 3G networks feature is their integration with the 2G network... more Abstract—One of the most interesting 3G networks feature is their integration with the 2G networks. It provides seamless End to-End services. Current widely deployed 2G and 3G networks provide enabling interoperability. These mechanisms include Inter RAT idle ...

Research paper thumbnail of Available online at: www.ijarcsse.com A Study on Minimization of 2G/3G Handover Failure Amit Kumar

amit.chaturvedi109 @ gmail.com Abstract — One of the most interesting 3G networks feature is thei... more amit.chaturvedi109 @ gmail.com Abstract — One of the most interesting 3G networks feature is their integration with the 2G networks. It provides seamless End to-End services. Current widely deployed 2G and 3G networks provide enabling interoperability. These mechanisms include Inter RAT idle mode reselection. Inter RAT dedicated mode reselection is used for PS (Packet Switching) services. The WLAN coverage on one hand provides an extra coverage in the low signal strength region. We perform the channel scanning with in the WLAN coverage area. To reduce the handover failure due to scanning delay.

Research paper thumbnail of Harmful Effects of Ionizing Radiation

International Journal for Research in Applied Science and Engineering Technology, 2019

Research paper thumbnail of Transform Operator Random Generator Delimiter Based Encryption Standard (TORDES)

Research paper thumbnail of Cryptanalysis with A Symmetric Key Algorithm TORDES

Research paper thumbnail of TORDES -- The new symmetric

The selective application of technology and related procedural safeguard is an important responsi... more The selective application of technology and related procedural safeguard is an important responsibility for cryptographic algorithm to its electronic data systems. This paper specifies the functionality of TORDES for encryption and decryption to protect the sensitive unclassified data. TORDES is made available within the context of a total security program consisting of physical security procedure.

Research paper thumbnail of Internet of Things (IoT) to Study the Wild Life: A Review

Journal of Biological and Chemical Chronicles, 2020

Research paper thumbnail of On observing the Animal ecology through Internet of Things (IoT)

Journal of Computer and Information Technology, 2019

Research paper thumbnail of A Study on Minimization of 3G/4G Handover Failure

International Journal of Scientific Research in Science, Engineering and Technology, 2019

One of the better thought-provoking features of Fourth Generation networks is their assimilation ... more One of the better thought-provoking features of Fourth Generation networks is their assimilation with Third Generation networks. It supports seamless End to-End services. At present extensively deployed Third Generation and Fourth Generation networks provide enabling interoperability. The particular mechanisms have Inter RAT idle mode reselection. Inter RAT dedicated mode reselection is used for Packet Switching services. The WLAN coverage on one hand contribute an further coverage in the low signal strength sector. We achieved the channel scanning with in the WLAN coverage area. To decrease the handover failure by reason of scanning delay.

Research paper thumbnail of Tordes a New Symmetric Key Algorithm

Journal of university of anbar for pure science : Vol.6:NO.2 : 2012, 2012

Research paper thumbnail of Tordes : A New Approach To Symmetric Key Encryption

Research paper thumbnail of A Study of TORDES with other Symmetric Key Algorithms

International Journal of Advanced Research in Computer Science and Software Engineering, Dec 1, 2012

Research paper thumbnail of Component of Symmetric key Algorithm TORDES with its Functionality

International Journal of Computational Engineering & Management, Sep 1, 2012

Research paper thumbnail of A Study on Minimization of 3G/4G Handover Failure

One of the better thought-provoking features of Fourth Generation networks is their assimilation ... more One of the better thought-provoking features of Fourth Generation networks is their assimilation with Third Generation networks. It supports seamless End to-End services. At present extensively deployed Third Generation and Fourth Generation networks provide enabling interoperability. The particular mechanisms have Inter RAT idle mode reselection. Inter RAT dedicated mode reselection is used for Packet Switching services. The WLAN coverage on one hand contribute an further coverage in the low signal strength sector. We achieved the channel scanning with in the WLAN coverage area. To decrease the handover failure by reason of scanning delay.

Research paper thumbnail of Protecting the Environment through Sustainable Development Goals (SDG)

Global environmental change is an old phenomenon running simultaneously with the origin of the Ea... more Global environmental change is an old phenomenon running simultaneously with the origin of the Earth. Since variations on this planet is an outcome of continuous and still going evolutionary changes, incorporating various mysterious biological, physical as well as a chemical phenomenon. The outcome and the additive effect of these changes are steady and bring about the change in the environment on the daily basis. The conditions which as a sum are responsible for this outcome of environmental change are particularly very difficult to ascertain and observe under normal laboratory conditions. Any considered factor which brings about the environmental change work entirely different under normal conditions as there are chances of its getting associated with various other environmental factors simultaneously. At present, the researches carried out throughout the globe have pointed out anthropogenic activities to be a major contributor in bringing about environmental degradation and thus change. Some of these human activities include industrialization, urbanization, stratospheric ozone depletion, deforestation, loss of biodiversity, acidification, pollution, and desertification, etc. Even though this global environmental degradation is an outcome of activities initiated and looked upon by only a few human masses, still the outcome effects are sometimes deleterious instantly or perhaps sub-chronic also to entirely all the masses surviving on this planet including the plants and other animals. To save life on this planet, it is extremely urgent and important that the anthropogenic factors affecting the environment adversely be checked and restricted at the global level. This work provides an insight into various efforts brought about to check the environmental degradation through anthropogenic activities and what is left to be done preliminary.

Research paper thumbnail of Artificial Intelligence Approach for Identification of Diseases through Gene Mapping

International Journal of Advanced Research in Biological Sciences, 2019

Biotechnology and information technology have been in a continuous and nearly parallel phase of d... more Biotechnology and information technology have been in a continuous and nearly parallel phase of development since last few
decades. With time these two fields, with information technology having more emphasis, have started integrating each other at
very many places, the outcome too is definitely good. Artificial intelligence has also emerged as a very advanced field related to
information technology and finding varied space in biotechnology, hopefully the hybrid will arrive as a promising combination in
resolving many issues of biotechnology. Present work highlights a preliminary insight of combination of artificial intelligence in
identification of diseases at the genetic level.

Research paper thumbnail of A Study on Minimization of 3G/4G Handover Failure

International Journal of Scientific Research in Science, Engineering and Technology, 2019

One of the better thought-provoking features of Fourth Generation networks is their assimilation ... more One of the better thought-provoking features of Fourth Generation networks is their assimilation with Third
Generation networks. It supports seamless End to-End services. At present extensively deployed Third
Generation and Fourth Generation networks provide enabling interoperability. The particular mechanisms
have Inter RAT idle mode reselection. Inter RAT dedicated mode reselection is used for Packet Switching
services. The WLAN coverage on one hand contribute an further coverage in the low signal strength sector.
We achieved the channel scanning with in the WLAN coverage area. To decrease the handover failure by
reason of scanning delay.

Research paper thumbnail of Harmful Effects of Ionizing Radiation

International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2019

Human population throughout the world is surrounded by an invisible continuously increasing web o... more Human population throughout the world is surrounded by an invisible continuously increasing web of radiation,
originating from both natural and non-natural sources. Radiation is of two types: ionizing and non-ionizing depending upon
their energy. The exposure to radiation has increased many folds in the recent years with the invention and launch of many
electromagnetic devices.
Exposure to ionizing radiations has been found to cause severe abnormalities in human beings such as DNA damage, cancer,
infertility, electro-hypersensitivity, etc. which however is of different intensity depending upon the age group of human beings,
with children and fetus being the maximum sufferers because of immature immune system and also various other cells in their
body are still at the stage of division and differentiation. Present study has been aimed to investigate a generalized preliminary
idea of various health related complications caused by ionizing radiations to human beings with special emphasis to fetus and
children.

Research paper thumbnail of S.: A web proxy server with an intelligent prefetcher for dynamic pages using association rules

Research paper thumbnail of Transform Operator Random Generator Delimiter Based Encryption Standard

Mahamaya Technical University, Dec 2012

The selective application of technology and related procedural safeguard is an important responsi... more The selective application of technology and related procedural safeguard is an important responsibility for cryptographic algorithm to its electronic data systems. This work specifies the
functionality of TORDES fro encryption and decryption to protect the sensitive unclassified data. TORDES is made available within the context of a total security program consisting of physical security procedure.
In the absence of generally acknowledged metrics in the public area that could be used to compute and spell out cryptographic strength, a small operational group agreed to look at the
possibility of developing an approach to cryptographic metrics The purpose of this dissertation is to report the results of the limited exploratory effort by the above operational group that investigated the practicality of developing metrics for use in specifying the strength of cryptographic algorithms. This work is only deals with a small sample of selected symmetric cipher block encryption algorithms. The selective application of technological and related procedural safeguard is an important
responsibility of every cryptographic algorithm in providing adequate security to its electronic data systems. This work specifies TORDES including its primary component, cryptographic
engines, MODDES, DES, TDES, AES to compare in terms of memory required and encryption, decryption time.
In today's epoch, most of the means of secure data and code storage and distribution rely on using cryptographic Schemes, such as certificates or encryption keys. This dissertation is devoted to the security and attack aspects of cryptographic techniques with new symmetric key algorithm TORDES. This algorithm is proposed to achieve the different goals of security i.e., Availability, Confidentiality and Integrity. We will also discuss the security threats in this algorithm. Security is a very complex and vast topic. There is such a tool available in market which easily crack the conventional cryptographic data. It is necessary to design such a Algorithm which approach a different from these algorithms. TORDES is the one of best direction in this approach.
The proposed system is successfully tested on text. The performance and security provided by proposed system is better than other secret key algorithm for the message of fixed size. The main advantage of proposed system is that it is not fully dependent on the key and for the same plain text it produces different modified secure codes

Research paper thumbnail of Transform Operator Random Generator Delimiter Based Encryption Standard (TORDES)