Mangalayatan Publications
Mangalayatan Journal of Scientific and Industrial Research
×
Mangalayatan Campus
Volume - 2 | Issue - 2 [July - December 2025]

Year 2025 | Volume - 2 | Issue - 2 [July - December 2025]

Original Article | Homomorphic Encryption Integrated with Hill Cipher Method: Cloud Secure Data 2 (2) 1-12

Homomorphic Encryption Integrated with Hill Cipher Method: Cloud Secure Data 2 (2) 1-12

Author Name: Mohd Atif Kaleem, Prof. Udai Shankar, Dr. Javed Wasim

Paper id: 25301

Abstract:

Cloud computing has expanded very rapidly in commercial as well as research fields. Cloud computing has emerged as a widely adopted paradigm, enabling users to store vast amounts of data on remote cloud servers for extended access and utilization. Nevertheless, it introduces a range of significant security challenges, such as ensuring data protection, maintaining privacy, safeguarding confidentiality, preserving data integrity, and verifying authentication. Since data is stored and processed at off-site locations by both users and cloud service providers, maintaining its integrity and confidentiality becomes a fundamental challenge. Typically, cloud service providers store data in plaintext, requiring users to implement their own encryption mechanisms if enhanced security is desired. Moreover, such encrypted data must be decrypted each time it undergoes processing. This study explores the application of homomorphic encryption, specifically leveraging the Hill cipher algorithm, to enhance data security within cloud environments. The scheme combines classical Hill Cipher with additive Homomorphic Encryption in order to enable secure computation over encrypted data. Cloud is where data gets stored in encrypted form. The cipher key used for encrypting data is important. It focuses on the storage of data in encrypted form on the cloud using additive homomorphic encryption, which particularly fits small-to-medium-sized data where the efficiency in encryption matters the most.

Original Article | Synthesis and characterization of novel organotin (iv) derivatives of 3, 4 methylenedioxyphenylpropenoic acid against pathogenic microbes 2 (2) 13-19

Synthesis and characterization of novel organotin (iv) derivatives of 3, 4 methylenedioxyphenylpropenoic acid against pathogenic microbes 2 (2) 13-19

Author Name: Jyoti Kumari, Dinesh Kumar Sharma, Ravi Kant

Paper id: 25302

Abstract:

The present manuscript deals the synthesis of a novel organotin (IV) derivative of 3.4 methylenedioxyphenyl propenoic acid through modified method followed by their characterization with the help of sophisticated instrumentation and spectral analysis. The new compounds were also screened for their antimicrobial activity against pathogenic strains of bacteria and fungi at different concentrations to find out their efficacy against Antimicrobial Resistance (AMR). It was found that these compounds show remarkable antimicrobial activity and shows effective against Antimicrobial Resistance with different Structure-Activity Relationship.

Original Article | Quantum Zero-Knowledge Proof and Self-Sovereign Identity in Blockchain-Based Data Access Control Framework for Healthcare in Fog Computing Environment 2 (2) 20-34

Quantum Zero-Knowledge Proof and Self-Sovereign Identity in Blockchain-Based Data Access Control Framework for Healthcare in Fog Computing Environment 2 (2) 20-34

Author Name: Samadhan Palkar, Prof. (Dr.) Udai Shankar and Prof. (Dr.) Lingaraj Hadimani

Paper id: 25303

Abstract:

Data access control in healthcare systems has been completely transformed by the combination of blockchain technology and fog computing, which offers decentralized, safe, and effective solutions. But problems like privacy violations, scalability problems, and the requirement for strong identity management continue to exist. In this paper, a novel paradigm for blockchain-based data access management in fog computing settings is proposed, combining Self-Sovereign Identity (SSI) and Quantum Zero-Knowledge Proofs (QZKPs). While SSI gives patients authority over their digital identities, QZKPs improve privacy by facilitating verifiable but private proofs. Secure data exchange, emergency access, and regulatory compliance are some of the major issues in healthcare that are addressed by the suggested approach. Results from experiments show how effective the framework is in terms of latency, scalability, and privacy. Future developments in quantum-enhanced blockchain systems for healthcare are made possible by this research.

Original Article | AI for Heritage Preservation: Multi-Class Image Classification of Indian Temple Iconography 2 (2) 35-46

AI for Heritage Preservation: Multi-Class Image Classification of Indian Temple Iconography 2 (2) 35-46

Author Name: Vanishree Kavi Mahesh, Udai Shankar, Aprna Tripathi, Abhilash C B

Paper id: 25304

Abstract:

This study proposes classifying Hindu deities based on their distinct iconography with a multi-class recognition. A curated dataset of 500 high-resolution images from Ajanta, Ellora, and Hoysala temples was organized into three iconographic categories: Meditating Buddha, Dancing Shiva (Nataraja), and Other Sculptures. ResNet50 and EfficientNet architectures were used to train the models to distinguish the visual features including hand gestures (mudras), postures, and deity-specific artefacts. The best-performing model achieved 92% overall accuracy and was strong in identifying Meditating Buddha and Dancing Shiva, and errors occurred when distinguishing Standing Buddha and Other Sculptures. This approach demonstrates how large-scale digital archives can be developed with the aid of machine learning. With majority of the images classified by the machine in the archive, scholars can utilise their time to understand minute nuances and draw cultural and theological conclusions which is a valuable step in heritage preservation.

Original Article | An Efficient Hybrid Machine Learning Approach for Phishing Detection using Semantic and Feature-based Optimization 2 (2) 47-54

An Efficient Hybrid Machine Learning Approach for Phishing Detection using Semantic and Feature-based Optimization 2 (2) 47-54

Author Name: Suyog Vilas Patil, Dr. Vijay Pal Singh

Paper id: 25305

Abstract:

Phishing continues to be a major cyber threat targeting individuals and organisations by stealing sensi tive information such as passwords and financial details. Traditional signature-based approaches fail to detect new and obfuscated phishing techniques. This paper presents a lightweight hybrid machine learn ing model that combines supervised and heuristic components enhanced with semantic analysis. The system integrates lexical, content-based, and technical attributes to identify phishing websites and emails effectively. Natural Language Processing (NLP) techniques, including transformer-based em beddings, are used for extracting textual semantics, while feature optimisation is achieved using a sim plified clustering-based selection method. Experimental results on benchmark phishing datasets demon strate an overall accuracy of 97.1%, precision of 96.8%, recall of 97.3%, and a False Positive Rate (FPR) of only 2.0%. The proposed framework offers improved adaptability, low computation time, and potential for real-time deployment in institutional and enterprise-level environments.

Original Article | Prevalence of Fatigue and poor Quality of Life in Hemodialysis Patients: hospital – based, cross-sectional study 2 (2) 55-68

Prevalence of Fatigue and poor Quality of Life in Hemodialysis Patients: hospital – based, cross-sectional study 2 (2) 55-68

Author Name: Dr. Prerna Khati, Dr. Shivraj Singh Tyagi, Dr. Helen Mariadoss, Dr. Rohit Dhanuka, Dr. Ajit Singh, Dr. Vivek Gaurav

Paper id: 25306

Abstract:

Background: Fatigue and poor quality of life (QoL) are important burdens of hemodialysis (HD) patients, but definitive data on these issues in developing countries is scarce Aim: Identify the prevalence of fatigue and its association with QoL in patients with HD in North Bengal. Methods: Cross-sectional study carried out in Dr. Chhang’s Super-specialty Hospital, Siliguri with 165 HD patients and convenience sampling technique was used. Tool used for data collection were Standardized: Fatigue Severity Scale (FSS) to assess the level of fatigue and SF-36 questionnaire for (QoL). Statistical analysis involved frequency, percentage, mean and standard deviation, chi-square and Pearson correlation Findings: The results showed that there is a high prevalence of fatigue among patients (79.39% of patients were reported as having severe fatigue (Mean=5.84±0.25) and 9.70% of the patients reported clinically significant fatigue). Energy/fatigue domains were most affected by QoL (Mean=38.39±7.16). There was a significant negative relationship between fatigue and overall QoL (r = -0.47, p=0.001). The severity of fatigue was significantly correlated with marital status (χ²=97.13, p=0.00001), dialysis duration (χ²=26.18, p=0.0002), and intradialytic physical complaints (χ²=52.68, p=0.00001). Conclusion: fatigue is prevalent and negatively correlated with QoL in this population. Factors that relate to treatment and psychosocial factors also play a central role in determining the level of fatigue. These findings demonstrate the necessity of the incorporation of systematic fatigue evaluation and management guidelines into the routine HD care to enhance patient outcomes and overall well - being.

Original Article | A Deep Reinforcement Learning Approach for Proactive Cardiovascular Risk Prediction in IoT-Enabled Cloud Systems 2 (2) 69-83

A Deep Reinforcement Learning Approach for Proactive Cardiovascular Risk Prediction in IoT-Enabled Cloud Systems 2 (2) 69-83

Author Name: Rohit S. Raut , Aasheesh Raizada

Paper id: 25307

Abstract:

In recent years, cardiovascular diseases (CVDs) have emerged as a leading cause of mortality worldwide, necessitating advanced and proactive health monitoring systems. This paper presents the design and implementation of an IoT-based cardiovascular health monitoring system that leverages cloud computing and artificial intelligence for real-time analysis. The system integrates IoT-enabled wearable sensors to continuously capture vital signs, such as heart rate, blood pressure, transmitting the data to a cloud-based infrastructure for processing. A novel Deep Deterministic Policy Gradient (DDPG)-enabled model is employed to predict potential cardiovascular anomalies, providing personalized insights and early warnings to patients. The DDPG model enhances the system's decision-making by enabling continuous learning and adaptation to individual health patterns, leading to more accurate predictions and recommendations. The cloud architecture ensures scalability, data security, and real-time access to health data, that leads to low-latency responses for critical alerts. The proposed system's performance is evaluated through simulations and real-world testing, demonstrating its efficacy in early detection of cardiovascular events, reduced false alarms, and improved patient outcomes. This proactive monitoring solution represents a significant step forward in leveraging IoT, AI, and cloud computing for personalized healthcare and disease prevention.

Original Article | Novel Multiparticulate Sublingual Approach for Rapid Delivery of Rizatriptan Benzoate2 (2) 84-94
Original Article | Phytotherapeutic Approaches to Letrozole-Induced Polycystic Ovary Syndrome in Female Rats2 (2) 95-110