Neeraj Kumar

Learn More
An Algorithm is considered computationally secure if it can not be broken with standard resources, either current or future. In this paper we have introduced a new block cipher algorithm named X-MODDES. It is unique independent approach which uses several computational steps along with string of operators and randomized delimiter selections by using some(More)
In mobile ad-hoc network (MANET) environment, main task is to determine a suitable route among source and destination node such that delivery of the message can be guaranteed. The route should be picked in such a way so that whole nodes in the path are trustworthy, non malicious, non-selfish and with less hop count. Selfish nodes may not follow the(More)
The Distributed Web caching system provides fast retrievals of web pages but still limited by the delays incurred by servers. As these systems are affected by low robustness due to highly congested servers. As in real time, servers get disconnected frequently providing tradeoff to service. Robust Distributed Web Caching (RDWC) handles robustness but fails(More)
Smart Grid Network (SGN) is one of the innovative trends towards efficient and intelligent use of the conventional and non conventional resources of energy with respect to electric power generation, transmission and distribution. However, with the ever growing dependence and demand of modern life and industry on electricity, there arises a need of an(More)
Vehicular Ad Hoc Networks (VANETs) are special type of decentralized wireless networks among the various mobile nodes. In VANET decision of forwarding the data packets from one node to other node is dynamic and based on the network connectivity. So efficient, optimized and secure techniques are required for secure transmission of data packets and tracking(More)
Implantable medical devices (IMDs) are man-made devices, which can be implanted in the human body to improve the functioning of various organs. The IMDs monitor and treat physiological condition of the human being (for example, monitoring of blood glucose level by insulin pump). The advancement of information and communication technology (ICT) enhances the(More)
A counterfeit drug is a medication or pharmaceutical product which is manufactured and made available on the market to deceptively represent its origin, authenticity and effectiveness, etc., and causes serious threats to the health of a patient. Counterfeited medicines have an adverse effect on the public health and cause revenue loss to the legitimate(More)
Mobile Ad Hoc Network (MANET) is a dynamic wireless network without any pre-existing infrastructure and each node therefore operate in a self-organized and decentralized manner, acting as a router. Multipath routing in MANETis a challenging problem. In this paper, an attempt has been made to compare the accomplishment of conspicuous on-demand routing(More)
-Most of the CAD software, which are available currently, works only on the operating system (generally windows) for which they are designed. Alternatively, the commercial CAD software is dependent upon the operating system. If CAD software is designed such that it is Independent of the operating system, then such CAD software will be much beneficial for(More)