SlideShare a Scribd company logo
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 08 - 12
______________________________________________________________________________________
8
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Authentic Patient Data and Optimization Process through Cryptographic
Image or Sound computations as Key using Genetic Algorithm in Body Area
Network
Pradeep Kumar
Ph.D. Student, Enrollment Number: 120481
Mody University of Science and Technology, Lakshmangarh, Sikar-332311, Rajasthan, India
I. Introduction
Internet of Things (IoT), helping interconnected sensors (i.e., wireless body area network (WBAN), can treat in real time
monitoring of patient health status and manage patients and treatment. Likewise, IoT will play a helping role in the next-
generation healthcare establishment. Although IoT-based patient health status monitoring has become very popular,
monitoring patients remotely outside of hospital settings requires augmenting the capabilities of IoT with other resources for
health data storage and processing. In this paper, we propose an IoT-based authentication and optimization process through
image key management using a genetic algorithm in body area network. Recent advances in wireless communications
technologies formedical/fitness applications. Particular, it analyzes the following related developments may cover the
following topics:
• Status of M2M standardization, market and development in general and specifically for medical applications
• Development and standardization of the Wireless Body Area Network (WBAN) and Medical Body Area Network
(WMBAN), including their markets profits.
• Underlying technologies:
o
Bluetooth o
ZigBee
o
Wi-Fi low-power consumption technology o Z-Wave
o Self-powered wireless sensors
II. Image Processing
Mathematically, an image can be considered as a function of 2 variables, f(x, y), where x and y are spatial coordinates and
the value of the function at given pair of coordinates (x, y) is called the intensity value.
The programming counterpart of such a function could be a one or two-dimensional array. Code Snippet 1 and Code
Snippet 2 show how to traverse and use 1-D and 2-D arrays programmatically. Both of them essentially can represent an
image as shown in Figure 1.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 08 - 12
______________________________________________________________________________________
9
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Figure: Values in the grid represent the grayscale intensities of the image on the right.
(A)Intensity values are shown in a grid of the same dimension as image (B) Image as seen on a monitor
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 08 - 12
______________________________________________________________________________________
10
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
The ‘for’ loop in Code Snippet 1 and 2 can be visualized as shown in Figure 2.
Figure: Array traversal in a ‘for’ loop. Note that rows are being accessed one after the other. This isknown as'Row Major
Traversal’. The graphic suggests that in the current iteration, x = 4 and y = 3 both starting from 0.
III Sound Programming:
Use of the audioread(filename,y,Fs) function of Matlab and it converts an audio file to a matrix. Value of that matrix
generated can be used for computational purposes. It possible to produce a specific sound like the sound of a guitar by
giving your own values to the matrix and then sounding it using the sound() function.
IV.Security optimization through key management using a genetic algorithm in body areanetwork:
A genetic algorithm is a randomized search and optimization technique guided by the principle of natural selection systems.
Three basic operators used in Genetic [2] algorithms contain selection, crossover, and mutation. The GA goes through the
following cycle: Evaluate, select, mate, and mutate until some stopping criteria are reached. Reproduction and crossover
together
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 08 - 12
______________________________________________________________________________________
11
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
give genetic algorithms most of their searching power.
C. Selection It is quantitative criterion based on fitness value to choose the chromosomes from a population which is going
to reproduce.
D. Crossover
In crossover operation, two chromosomes are taken and a new is generated by taking some attributes of the first
chromosome and the rest from the second chromosome. [2]
For example, the strings 11001111 to 01101110 could be crossed over after the third locus in each to produce the two
offspring 11001110 to 01101111.
Mutation
Mutation is used to maintain genetic diversity from one generation of the population to the next. It is similar to biological
mutation. GAs involves string-based modifications to the elements of a candidate solution. These include bit-reversal in bit-
string GAs. This operator randomly flips some of the bits in a chromosome. For example, the string 01000100 might be
mutated in its second position to yield 00000100.
V. PROPOSED METHODOLOGY
In the proposed method GA will be used in the key generation process. The crossover and mutation operation is used along
with Pseudo-random number generators to make the key very complex. A number of rows in the array can be a population
for crossover and mutation purposes. For encryption, we have proposed AES. The symmetric key algorithm is proposed due
to its computation speed and less overhead in key management. The process of generating the key from the Genetic
Population has the following steps:
STEP 1: A pseudo-random binary sequence is generated with the help of a small image like part of the image of ECG sensor
image. Means any image can be used as a cryptographic security key. Another key like sound frequency of patient can be
used for a cryptographic key for algorithm or material of a mixture of various metal touches to the sensor can be used for
cryptographic security key just like biometric way. As Mathematically, an image can be considered as a function of 2
variables, f(x, y), where x and y are spatial coordinates and the value of the function at given pair of coordinates (x, y) is
called the intensity value. The programming counterpart of such a function could be a one or two-dimensional array. The
first row of this two-dimensional array can be used as key generated from the same image used for the cryptographic
purpose. For more criticality, a random number can be generated to choose the row from the array because the first-row idea
can be hacked. But in GA for population limits can be decided for population and for a number of digits through fitness
function from rows of the array from image processing. Two images can be used for intermixing of arrays to increase the
population at sending and receiving end for heterogenous environment.
STEP 2. Matrix from sound programming computation can be used as key if image is not available.
STEP 3: Fitness function like converting first row bit into a decimal number and the new decimal number generated by this
process can be divided by hundred or more as per optimality factor after experimentation to reduce the bit size to convert
this number back into binary and can be used as the population of cryptographic keys. For other fitness function, further new
expression can be used as per requirement of key size.
STEP 4: The generated string or population is divided into two halves.
STEP 5: On the selected string crossover operation is performed to achieve good randomness among the key.
STEP 6: After crossover operation, the bits of the string are swapped again to permute the bit values.
STEP 7: The same process is iterated two times.
Here the crossover and mutation are done two times to create more complexity and randomness in the key. This key will be
then used for the encryption process. Here AES will be used for encryption as it is one of the most efficient symmetric key
algorithms and its whole security lies in the key used.
VI. CONCLUSION
The BAN is an emerging technology that will alter people’s everyday experiences revolutionarily. Privacy and data security
in BANs is a significant area, and still, there is a number of challenges which need to be overcome. Image processing can
create an image as a data for cryptographic purposes. So, there is no limit to a number of images and so as to the number of
keys. Mathematical function on keys can help us to more growth in this field.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 08 - 12
______________________________________________________________________________________
12
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
VII. Reference:
[1] Pradeep Kumar, Anand Sharma,” Authentication Process in Body Area Network And Security Optimization Through Key
Management Using Genetic Algorithm In Body Area
Network”, ISSN (Online): 2347–4718, International Journal for Technological Research InEngineering Volume 4, Issue 9,
May-2017,
[2] Aarti Soni, Suyash Agrawal,” Using Genetic Algorithm for Symmetric key Generation in Image Encryption”, ISSN: 2278 –
1323, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 1, Issue 10,
December 2012
[3] Santanu Chatterjee, Ashok Kumar Das *, Jamuna Kanta Sing,” A novel and efficient user access control scheme for wireless
body area sensor networks”, Journal of King Saud
University– Computer and Information Sciences (2014) 26, 181–201
[4] Copyright © 2005-2007, Advanced Digital Imaging Solutions Laboratory (ADISL). http://www.adislindia.com
[5] Pradeep Kumar,” Right Patient Data And Optimization Process Through Cryptographic Image as Key Using Genetic Algorithm In
Body Area Network”, ISSN (Online): 2347–4718, International Journal for Technological Research In Engineering Volume 5,
Issue 9, May-2018

More Related Content

What's hot

Application of Matrices in real life
Application of Matrices in real lifeApplication of Matrices in real life
Application of Matrices in real life
Shayshab Azad
 
IRJET- Missing Data Imputation by Evidence Chain
IRJET- Missing Data Imputation by Evidence ChainIRJET- Missing Data Imputation by Evidence Chain
IRJET- Missing Data Imputation by Evidence Chain
IRJET Journal
 
A novel tool for stereo matching of images
A novel tool for stereo matching of imagesA novel tool for stereo matching of images
A novel tool for stereo matching of images
eSAT Journals
 
A novel tool for stereo matching of images
A novel tool for stereo matching of imagesA novel tool for stereo matching of images
A novel tool for stereo matching of images
eSAT Publishing House
 
Web Based Fuzzy Clustering Analysis
Web Based Fuzzy Clustering AnalysisWeb Based Fuzzy Clustering Analysis
Web Based Fuzzy Clustering Analysis
inventy
 
Review of different methods of protecting privacy using finger prints
Review of different methods of protecting privacy using finger printsReview of different methods of protecting privacy using finger prints
Review of different methods of protecting privacy using finger prints
IAEME Publication
 
IRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification AlgorithmsIRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification Algorithms
IRJET Journal
 
IRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms ComparisonIRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms Comparison
IRJET Journal
 
Matrix in software engineering
Matrix in software engineeringMatrix in software engineering
Matrix in software engineering
Daffodil International University
 
Data Science Machine
Data Science Machine Data Science Machine
Data Science Machine
Luis Taveras EMBA, MS
 
Variance rover system
Variance rover systemVariance rover system
Variance rover system
eSAT Journals
 
Variance rover system web analytics tool using data
Variance rover system web analytics tool using dataVariance rover system web analytics tool using data
Variance rover system web analytics tool using data
eSAT Publishing House
 
IRJET- Privacy Preservation using Apache Spark
IRJET- Privacy Preservation using Apache SparkIRJET- Privacy Preservation using Apache Spark
IRJET- Privacy Preservation using Apache Spark
IRJET Journal
 
ICCSA2014 - slides
ICCSA2014 - slidesICCSA2014 - slides
ICCSA2014 - slides
Gabriella Casalino
 

What's hot (14)

Application of Matrices in real life
Application of Matrices in real lifeApplication of Matrices in real life
Application of Matrices in real life
 
IRJET- Missing Data Imputation by Evidence Chain
IRJET- Missing Data Imputation by Evidence ChainIRJET- Missing Data Imputation by Evidence Chain
IRJET- Missing Data Imputation by Evidence Chain
 
A novel tool for stereo matching of images
A novel tool for stereo matching of imagesA novel tool for stereo matching of images
A novel tool for stereo matching of images
 
A novel tool for stereo matching of images
A novel tool for stereo matching of imagesA novel tool for stereo matching of images
A novel tool for stereo matching of images
 
Web Based Fuzzy Clustering Analysis
Web Based Fuzzy Clustering AnalysisWeb Based Fuzzy Clustering Analysis
Web Based Fuzzy Clustering Analysis
 
Review of different methods of protecting privacy using finger prints
Review of different methods of protecting privacy using finger printsReview of different methods of protecting privacy using finger prints
Review of different methods of protecting privacy using finger prints
 
IRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification AlgorithmsIRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification Algorithms
 
IRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms ComparisonIRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms Comparison
 
Matrix in software engineering
Matrix in software engineeringMatrix in software engineering
Matrix in software engineering
 
Data Science Machine
Data Science Machine Data Science Machine
Data Science Machine
 
Variance rover system
Variance rover systemVariance rover system
Variance rover system
 
Variance rover system web analytics tool using data
Variance rover system web analytics tool using dataVariance rover system web analytics tool using data
Variance rover system web analytics tool using data
 
IRJET- Privacy Preservation using Apache Spark
IRJET- Privacy Preservation using Apache SparkIRJET- Privacy Preservation using Apache Spark
IRJET- Privacy Preservation using Apache Spark
 
ICCSA2014 - slides
ICCSA2014 - slidesICCSA2014 - slides
ICCSA2014 - slides
 

Similar to Authentic Patient Data and Optimization Process through Cryptographic Image or Sound computations as Key using Genetic Algorithm in Body Area Network

Optimized Parameter of Wavelet Neural Network (WNN) using INGA
Optimized Parameter of Wavelet Neural Network (WNN) using INGAOptimized Parameter of Wavelet Neural Network (WNN) using INGA
Optimized Parameter of Wavelet Neural Network (WNN) using INGA
rahulmonikasharma
 
IRJET- Note to Coin Converter
IRJET- Note to Coin ConverterIRJET- Note to Coin Converter
IRJET- Note to Coin Converter
IRJET Journal
 
Framework on Retrieval of Hypermedia Data using Data mining Technique
Framework on Retrieval of Hypermedia Data using Data mining TechniqueFramework on Retrieval of Hypermedia Data using Data mining Technique
Framework on Retrieval of Hypermedia Data using Data mining Technique
rahulmonikasharma
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
AM Publications,India
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
eSAT Journals
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
eSAT Publishing House
 
IRJET - Smart Vet Locator for Hybrid Pets
IRJET -  	  Smart Vet Locator for Hybrid PetsIRJET -  	  Smart Vet Locator for Hybrid Pets
IRJET - Smart Vet Locator for Hybrid Pets
IRJET Journal
 
FPGA Implementation for Image Edge Detection using Xilinx System Generator
FPGA Implementation for Image Edge Detection using Xilinx System GeneratorFPGA Implementation for Image Edge Detection using Xilinx System Generator
FPGA Implementation for Image Edge Detection using Xilinx System Generator
rahulmonikasharma
 
A Study of An Optical Mouse to Customize Ii for Implementation of Wireless Dr...
A Study of An Optical Mouse to Customize Ii for Implementation of Wireless Dr...A Study of An Optical Mouse to Customize Ii for Implementation of Wireless Dr...
A Study of An Optical Mouse to Customize Ii for Implementation of Wireless Dr...
rahulmonikasharma
 
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry PiIRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET Journal
 
High Speed Unified Field Crypto processor for Security Applications using Ver...
High Speed Unified Field Crypto processor for Security Applications using Ver...High Speed Unified Field Crypto processor for Security Applications using Ver...
High Speed Unified Field Crypto processor for Security Applications using Ver...
rahulmonikasharma
 
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNA Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
rahulmonikasharma
 
Object Detection using Deep Learning with Hierarchical Multi Swarm Optimization
Object Detection using Deep Learning with Hierarchical Multi Swarm OptimizationObject Detection using Deep Learning with Hierarchical Multi Swarm Optimization
Object Detection using Deep Learning with Hierarchical Multi Swarm Optimization
rahulmonikasharma
 
Reversible Data Hiding Methods : A Survey
Reversible Data Hiding Methods : A SurveyReversible Data Hiding Methods : A Survey
Reversible Data Hiding Methods : A Survey
rahulmonikasharma
 
Implementation of Knowledge-Based Expert System Using Probabilistic Network M...
Implementation of Knowledge-Based Expert System Using Probabilistic Network M...Implementation of Knowledge-Based Expert System Using Probabilistic Network M...
Implementation of Knowledge-Based Expert System Using Probabilistic Network M...
rahulmonikasharma
 
IRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep LearningIRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep Learning
IRJET Journal
 
Face Recognition in the Scrambled Domain Using MK-RDA
Face Recognition in the Scrambled Domain Using MK-RDAFace Recognition in the Scrambled Domain Using MK-RDA
Face Recognition in the Scrambled Domain Using MK-RDA
rahulmonikasharma
 
IRJET-Handwritten Digit Classification using Machine Learning Models
IRJET-Handwritten Digit Classification using Machine Learning ModelsIRJET-Handwritten Digit Classification using Machine Learning Models
IRJET-Handwritten Digit Classification using Machine Learning Models
IRJET Journal
 
Image processing based girth monitoring and recording system for rubber plant...
Image processing based girth monitoring and recording system for rubber plant...Image processing based girth monitoring and recording system for rubber plant...
Image processing based girth monitoring and recording system for rubber plant...
sipij
 
Real-Time Vehicle Classification and Counting Via Low-Cost Collaborative Sensing
Real-Time Vehicle Classification and Counting Via Low-Cost Collaborative SensingReal-Time Vehicle Classification and Counting Via Low-Cost Collaborative Sensing
Real-Time Vehicle Classification and Counting Via Low-Cost Collaborative Sensing
rahulmonikasharma
 

Similar to Authentic Patient Data and Optimization Process through Cryptographic Image or Sound computations as Key using Genetic Algorithm in Body Area Network (20)

Optimized Parameter of Wavelet Neural Network (WNN) using INGA
Optimized Parameter of Wavelet Neural Network (WNN) using INGAOptimized Parameter of Wavelet Neural Network (WNN) using INGA
Optimized Parameter of Wavelet Neural Network (WNN) using INGA
 
IRJET- Note to Coin Converter
IRJET- Note to Coin ConverterIRJET- Note to Coin Converter
IRJET- Note to Coin Converter
 
Framework on Retrieval of Hypermedia Data using Data mining Technique
Framework on Retrieval of Hypermedia Data using Data mining TechniqueFramework on Retrieval of Hypermedia Data using Data mining Technique
Framework on Retrieval of Hypermedia Data using Data mining Technique
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
IRJET - Smart Vet Locator for Hybrid Pets
IRJET -  	  Smart Vet Locator for Hybrid PetsIRJET -  	  Smart Vet Locator for Hybrid Pets
IRJET - Smart Vet Locator for Hybrid Pets
 
FPGA Implementation for Image Edge Detection using Xilinx System Generator
FPGA Implementation for Image Edge Detection using Xilinx System GeneratorFPGA Implementation for Image Edge Detection using Xilinx System Generator
FPGA Implementation for Image Edge Detection using Xilinx System Generator
 
A Study of An Optical Mouse to Customize Ii for Implementation of Wireless Dr...
A Study of An Optical Mouse to Customize Ii for Implementation of Wireless Dr...A Study of An Optical Mouse to Customize Ii for Implementation of Wireless Dr...
A Study of An Optical Mouse to Customize Ii for Implementation of Wireless Dr...
 
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry PiIRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
 
High Speed Unified Field Crypto processor for Security Applications using Ver...
High Speed Unified Field Crypto processor for Security Applications using Ver...High Speed Unified Field Crypto processor for Security Applications using Ver...
High Speed Unified Field Crypto processor for Security Applications using Ver...
 
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNA Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
 
Object Detection using Deep Learning with Hierarchical Multi Swarm Optimization
Object Detection using Deep Learning with Hierarchical Multi Swarm OptimizationObject Detection using Deep Learning with Hierarchical Multi Swarm Optimization
Object Detection using Deep Learning with Hierarchical Multi Swarm Optimization
 
Reversible Data Hiding Methods : A Survey
Reversible Data Hiding Methods : A SurveyReversible Data Hiding Methods : A Survey
Reversible Data Hiding Methods : A Survey
 
Implementation of Knowledge-Based Expert System Using Probabilistic Network M...
Implementation of Knowledge-Based Expert System Using Probabilistic Network M...Implementation of Knowledge-Based Expert System Using Probabilistic Network M...
Implementation of Knowledge-Based Expert System Using Probabilistic Network M...
 
IRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep LearningIRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep Learning
 
Face Recognition in the Scrambled Domain Using MK-RDA
Face Recognition in the Scrambled Domain Using MK-RDAFace Recognition in the Scrambled Domain Using MK-RDA
Face Recognition in the Scrambled Domain Using MK-RDA
 
IRJET-Handwritten Digit Classification using Machine Learning Models
IRJET-Handwritten Digit Classification using Machine Learning ModelsIRJET-Handwritten Digit Classification using Machine Learning Models
IRJET-Handwritten Digit Classification using Machine Learning Models
 
Image processing based girth monitoring and recording system for rubber plant...
Image processing based girth monitoring and recording system for rubber plant...Image processing based girth monitoring and recording system for rubber plant...
Image processing based girth monitoring and recording system for rubber plant...
 
Real-Time Vehicle Classification and Counting Via Low-Cost Collaborative Sensing
Real-Time Vehicle Classification and Counting Via Low-Cost Collaborative SensingReal-Time Vehicle Classification and Counting Via Low-Cost Collaborative Sensing
Real-Time Vehicle Classification and Counting Via Low-Cost Collaborative Sensing
 

More from rahulmonikasharma

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
rahulmonikasharma
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
rahulmonikasharma
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
rahulmonikasharma
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
rahulmonikasharma
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
rahulmonikasharma
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
rahulmonikasharma
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
rahulmonikasharma
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
rahulmonikasharma
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
rahulmonikasharma
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
rahulmonikasharma
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
rahulmonikasharma
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
rahulmonikasharma
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
rahulmonikasharma
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
rahulmonikasharma
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
rahulmonikasharma
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
rahulmonikasharma
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
rahulmonikasharma
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
rahulmonikasharma
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
rahulmonikasharma
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
rahulmonikasharma
 

More from rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
 

Recently uploaded

BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 

Recently uploaded (20)

BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 

Authentic Patient Data and Optimization Process through Cryptographic Image or Sound computations as Key using Genetic Algorithm in Body Area Network

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 08 - 12 ______________________________________________________________________________________ 8 IJRITCC | June 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Authentic Patient Data and Optimization Process through Cryptographic Image or Sound computations as Key using Genetic Algorithm in Body Area Network Pradeep Kumar Ph.D. Student, Enrollment Number: 120481 Mody University of Science and Technology, Lakshmangarh, Sikar-332311, Rajasthan, India I. Introduction Internet of Things (IoT), helping interconnected sensors (i.e., wireless body area network (WBAN), can treat in real time monitoring of patient health status and manage patients and treatment. Likewise, IoT will play a helping role in the next- generation healthcare establishment. Although IoT-based patient health status monitoring has become very popular, monitoring patients remotely outside of hospital settings requires augmenting the capabilities of IoT with other resources for health data storage and processing. In this paper, we propose an IoT-based authentication and optimization process through image key management using a genetic algorithm in body area network. Recent advances in wireless communications technologies formedical/fitness applications. Particular, it analyzes the following related developments may cover the following topics: • Status of M2M standardization, market and development in general and specifically for medical applications • Development and standardization of the Wireless Body Area Network (WBAN) and Medical Body Area Network (WMBAN), including their markets profits. • Underlying technologies: o Bluetooth o ZigBee o Wi-Fi low-power consumption technology o Z-Wave o Self-powered wireless sensors II. Image Processing Mathematically, an image can be considered as a function of 2 variables, f(x, y), where x and y are spatial coordinates and the value of the function at given pair of coordinates (x, y) is called the intensity value. The programming counterpart of such a function could be a one or two-dimensional array. Code Snippet 1 and Code Snippet 2 show how to traverse and use 1-D and 2-D arrays programmatically. Both of them essentially can represent an image as shown in Figure 1.
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 08 - 12 ______________________________________________________________________________________ 9 IJRITCC | June 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Figure: Values in the grid represent the grayscale intensities of the image on the right. (A)Intensity values are shown in a grid of the same dimension as image (B) Image as seen on a monitor
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 08 - 12 ______________________________________________________________________________________ 10 IJRITCC | June 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ The ‘for’ loop in Code Snippet 1 and 2 can be visualized as shown in Figure 2. Figure: Array traversal in a ‘for’ loop. Note that rows are being accessed one after the other. This isknown as'Row Major Traversal’. The graphic suggests that in the current iteration, x = 4 and y = 3 both starting from 0. III Sound Programming: Use of the audioread(filename,y,Fs) function of Matlab and it converts an audio file to a matrix. Value of that matrix generated can be used for computational purposes. It possible to produce a specific sound like the sound of a guitar by giving your own values to the matrix and then sounding it using the sound() function. IV.Security optimization through key management using a genetic algorithm in body areanetwork: A genetic algorithm is a randomized search and optimization technique guided by the principle of natural selection systems. Three basic operators used in Genetic [2] algorithms contain selection, crossover, and mutation. The GA goes through the following cycle: Evaluate, select, mate, and mutate until some stopping criteria are reached. Reproduction and crossover together
  • 4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 08 - 12 ______________________________________________________________________________________ 11 IJRITCC | June 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ give genetic algorithms most of their searching power. C. Selection It is quantitative criterion based on fitness value to choose the chromosomes from a population which is going to reproduce. D. Crossover In crossover operation, two chromosomes are taken and a new is generated by taking some attributes of the first chromosome and the rest from the second chromosome. [2] For example, the strings 11001111 to 01101110 could be crossed over after the third locus in each to produce the two offspring 11001110 to 01101111. Mutation Mutation is used to maintain genetic diversity from one generation of the population to the next. It is similar to biological mutation. GAs involves string-based modifications to the elements of a candidate solution. These include bit-reversal in bit- string GAs. This operator randomly flips some of the bits in a chromosome. For example, the string 01000100 might be mutated in its second position to yield 00000100. V. PROPOSED METHODOLOGY In the proposed method GA will be used in the key generation process. The crossover and mutation operation is used along with Pseudo-random number generators to make the key very complex. A number of rows in the array can be a population for crossover and mutation purposes. For encryption, we have proposed AES. The symmetric key algorithm is proposed due to its computation speed and less overhead in key management. The process of generating the key from the Genetic Population has the following steps: STEP 1: A pseudo-random binary sequence is generated with the help of a small image like part of the image of ECG sensor image. Means any image can be used as a cryptographic security key. Another key like sound frequency of patient can be used for a cryptographic key for algorithm or material of a mixture of various metal touches to the sensor can be used for cryptographic security key just like biometric way. As Mathematically, an image can be considered as a function of 2 variables, f(x, y), where x and y are spatial coordinates and the value of the function at given pair of coordinates (x, y) is called the intensity value. The programming counterpart of such a function could be a one or two-dimensional array. The first row of this two-dimensional array can be used as key generated from the same image used for the cryptographic purpose. For more criticality, a random number can be generated to choose the row from the array because the first-row idea can be hacked. But in GA for population limits can be decided for population and for a number of digits through fitness function from rows of the array from image processing. Two images can be used for intermixing of arrays to increase the population at sending and receiving end for heterogenous environment. STEP 2. Matrix from sound programming computation can be used as key if image is not available. STEP 3: Fitness function like converting first row bit into a decimal number and the new decimal number generated by this process can be divided by hundred or more as per optimality factor after experimentation to reduce the bit size to convert this number back into binary and can be used as the population of cryptographic keys. For other fitness function, further new expression can be used as per requirement of key size. STEP 4: The generated string or population is divided into two halves. STEP 5: On the selected string crossover operation is performed to achieve good randomness among the key. STEP 6: After crossover operation, the bits of the string are swapped again to permute the bit values. STEP 7: The same process is iterated two times. Here the crossover and mutation are done two times to create more complexity and randomness in the key. This key will be then used for the encryption process. Here AES will be used for encryption as it is one of the most efficient symmetric key algorithms and its whole security lies in the key used. VI. CONCLUSION The BAN is an emerging technology that will alter people’s everyday experiences revolutionarily. Privacy and data security in BANs is a significant area, and still, there is a number of challenges which need to be overcome. Image processing can create an image as a data for cryptographic purposes. So, there is no limit to a number of images and so as to the number of keys. Mathematical function on keys can help us to more growth in this field.
  • 5. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 08 - 12 ______________________________________________________________________________________ 12 IJRITCC | June 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ VII. Reference: [1] Pradeep Kumar, Anand Sharma,” Authentication Process in Body Area Network And Security Optimization Through Key Management Using Genetic Algorithm In Body Area Network”, ISSN (Online): 2347–4718, International Journal for Technological Research InEngineering Volume 4, Issue 9, May-2017, [2] Aarti Soni, Suyash Agrawal,” Using Genetic Algorithm for Symmetric key Generation in Image Encryption”, ISSN: 2278 – 1323, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 1, Issue 10, December 2012 [3] Santanu Chatterjee, Ashok Kumar Das *, Jamuna Kanta Sing,” A novel and efficient user access control scheme for wireless body area sensor networks”, Journal of King Saud University– Computer and Information Sciences (2014) 26, 181–201 [4] Copyright © 2005-2007, Advanced Digital Imaging Solutions Laboratory (ADISL). http://www.adislindia.com [5] Pradeep Kumar,” Right Patient Data And Optimization Process Through Cryptographic Image as Key Using Genetic Algorithm In Body Area Network”, ISSN (Online): 2347–4718, International Journal for Technological Research In Engineering Volume 5, Issue 9, May-2018