Artificial neural synchronization using nature inspired whale optimization

A Sarkar, MZ Khan, MM Singh, A Noorwali… - IEEE …, 2021 - ieeexplore.ieee.org
In this article, a whale optimization-based neural synchronization has been proposed for the
development of the key exchange protocol. At the time of exchange of sensitive information …

Deep learning guided double hidden layer neural synchronization through mutual learning

A Sarkar - Neural Processing Letters, 2021 - Springer
In this paper, a Double Hidden Layer Neural Networks synchronization mechanism using
Generative Adversarial Network (GAN) and mutual learning is used for the development of …

Newer post-COVID perspective: Teledental encryption by de-multiplexed perceptrons

J Dey, A Sarkar, S Karforma - International Journal of Information …, 2021 - Springer
This paper presents an efficient mechanism for secured encryption of intraoral information in
the emerging field of Teledental. Due to global rapid surge in the (Coronavirus Disease) …

Pivotal “New Normal” Telemedicine: secured psychiatric homeopathy medicine transmission in Post-COVID

J Dey - International Journal of Information Technology, 2021 - Springer
Abstract In this Post-COVID-19 “New Normal” era, the importance of Telemedicine is
immense. In telemedicine, the patients' sensitive medical data security is the matter of …

Wireless COVID-19 telehealth: Leukocytes encryption guided by amino acid matrix

J Dey, S Mukherjee - Wireless Personal Communications, 2021 - Springer
In this era of wireless COVID-19 telehealth, visiting hospital for regular follow-ups could
invite coronavirus in someone's body. Opting for proactive E-health services is the best …

Musically modified substitution-box for clinical signals ciphering in wireless telecare medical communicating systems

A Sarkar, J Dey, S Karforma - Wireless Personal Communications, 2021 - Springer
Telecare medical communication system (TMCS) is an essential component in today's fast
moving era. Patients are privileged to have wireless online medical facilities from their …

Episode of COVID-19 telepsychiatry session key origination upon swarm-based metaheuristic and neural perceptron blend

J Dey, A Sarkar, B Chowdhury, S Karforma - SN Computer Science, 2021 - Springer
Current pandemic has immensely disrupted the entire world in the field of medical science.
The novel corona virus has not only brought physical sufferings but also huge psychiatric …

[PDF][PDF] Recurrence relation and DNA sequence: A state-of-art technique for secret sharing

A Bhowmik, S Karforma, J Dey - International Journal of …, 2021 - researchgate.net
During the transmission over the Internet, protection of data and information is an important
issue. Efficient cryptographic techniques are used for protection but everything depends on …

Chaos-based mutual synchronization of three-layer tree parity machine: a session key exchange protocol over public channel

A Sarkar - Arabian Journal for Science and Engineering, 2021 - Springer
In this paper, a chaos-based triple-layer tree parity machine (TLTPM)-guided neural
synchronization has been proposed for the development of the public key exchange …

Neural cryptography using optimal structure of neural networks

A Sarkar - Applied Intelligence, 2021 - Springer
The asymmetric cryptography method is typically used to transfer the key via an insecure
channel while creating a key between two parties. However, since the methods using this …