Nisar Ahmed Rana - Academia.edu (original) (raw)

Papers by Nisar Ahmed Rana

Research paper thumbnail of A Benchmark for Performance Evaluation and Security Assessment of Image Encryption Schemes

International Journal of Computer Network and Information Security, 2016

Digital images have become part of everyday life by demonstrating its usability in a variety of f... more Digital images have become part of everyday life by demonstrating its usability in a variety of fields from education to space research. Confidentiality and security of digital images have grown significantly with increasing trend of information interchange over the public channel. Cryptography can be used as a successful technique to prevent image data from unauthorized access. Keeping the nature of image data in mind, several encryption techniques are presented specifically for digital images, in literature during past few years. These cryptographic algorithms lack a benchmark for evaluation of their performance, cryptographic security and quality analysis of recovered images. In this study, we have designed and developed a benchmark based on all the parameters necessary for a good image encryption scheme. Extensive studies have been made to categories all the parameters used by different researchers to evaluate their algorithms and an optimum benchmark for evaluation is formulated. This benchmark is used to evaluate three image encryption schemes. The results of evaluation have highlighted the specific application areas for these image encryption schemes.

Research paper thumbnail of Radio Controlled Aircraft, Designing and Fabrication

The goal of the book is to guide through the designing, manufacturing and testing of an electrica... more The goal of the book is to guide through the designing, manufacturing and testing of an electrically powered Radio Controlled (RC) aircraft. The design of aircraft is optimized for internal payload system. A systematic process from conceptual design to fabrication and testing is thoroughly followed and explained. Aircraft configuration selection process is done by following a qualitative arguments approach including mission performance, payload storage, stability & control and fabrication. The designing and optimization has been carried out using AutoCAD, ANSYS and CFX software. The four implementation stages are followed to bring the design from concept to reality.

Research paper thumbnail of A Study of Insulin Delivery Systems

ABSTRACT Insulin delivery to diabetic patient using manual methods is a tedious job and requires ... more ABSTRACT Insulin delivery to diabetic patient using manual methods is a tedious job and requires significant efforts clinically. It doesn't ensure optimal performance and causes noncompliance to the prescribed drug and results in several medical complications. The insulin delivery system, often called as artificial pancreas, is a portable insulin delivery pump used to control blood glucose concentrations. An insulin pump is design and developed to deliver insulin in precise and accurate amount to the diabetic patient, in order to regulate the blood glucose concentrations. In this paper, theoretical analysis has been performed to regulate the blood glucose-insulin concentration on the basis of some mathematical models. These models includes an open loop control of insulin delivery, based on mathematical model of insulin curve and closed loop control based on modified Stolwijk and Hardy's dynamic model. These models are implemented and analyzed using MATLAB. Moreover some experiments have been carried out and the results are analyzed based on medical parameters. This paper elaborates the insulin delivery mechanism and developments which are discussed will enhance the quality of life of the diabetic.

Research paper thumbnail of A Benchmark for Performance Evaluation and Security Assessment of Image Encryption Schemes

I. J. Computer Network and Information Security, 2016

Digital images have become part of everyday life by demonstrating its usability in a variety of f... more Digital images have become part of everyday life by demonstrating its usability in a variety of fields from education to space research. Confidentiality and security of digital images have grown significantly with increasing trend of information interchange over the public channel. Cryptography can be used as a successful technique to prevent image data from unauthorized access. Keeping the nature of image data in mind, several encryption techniques are presented specifically for digital images, in literature during past few years. These cryptographic algorithms lack a benchmark for evaluation of their performance, cryptographic security and quality analysis of recovered images. In this study, we have designed and developed a benchmark based on all the parameters necessary for a good image encryption scheme. Extensive studies have been made to categories all the parameters used by different researchers to evaluate their algorithms and an optimum benchmark for evaluation is formulated. This benchmark is used to evaluate three image encryption schemes. The results of evaluation have highlighted the specific application areas for these image encryption schemes.

Research paper thumbnail of A Benchmark for Performance Evaluation and Security Assessment of Image Encryption Schemes

International Journal of Computer Network and Information Security, 2016

Digital images have become part of everyday life by demonstrating its usability in a variety of f... more Digital images have become part of everyday life by demonstrating its usability in a variety of fields from education to space research. Confidentiality and security of digital images have grown significantly with increasing trend of information interchange over the public channel. Cryptography can be used as a successful technique to prevent image data from unauthorized access. Keeping the nature of image data in mind, several encryption techniques are presented specifically for digital images, in literature during past few years. These cryptographic algorithms lack a benchmark for evaluation of their performance, cryptographic security and quality analysis of recovered images. In this study, we have designed and developed a benchmark based on all the parameters necessary for a good image encryption scheme. Extensive studies have been made to categories all the parameters used by different researchers to evaluate their algorithms and an optimum benchmark for evaluation is formulated. This benchmark is used to evaluate three image encryption schemes. The results of evaluation have highlighted the specific application areas for these image encryption schemes.

Research paper thumbnail of Radio Controlled Aircraft, Designing and Fabrication

The goal of the book is to guide through the designing, manufacturing and testing of an electrica... more The goal of the book is to guide through the designing, manufacturing and testing of an electrically powered Radio Controlled (RC) aircraft. The design of aircraft is optimized for internal payload system. A systematic process from conceptual design to fabrication and testing is thoroughly followed and explained. Aircraft configuration selection process is done by following a qualitative arguments approach including mission performance, payload storage, stability & control and fabrication. The designing and optimization has been carried out using AutoCAD, ANSYS and CFX software. The four implementation stages are followed to bring the design from concept to reality.

Research paper thumbnail of A Study of Insulin Delivery Systems

ABSTRACT Insulin delivery to diabetic patient using manual methods is a tedious job and requires ... more ABSTRACT Insulin delivery to diabetic patient using manual methods is a tedious job and requires significant efforts clinically. It doesn't ensure optimal performance and causes noncompliance to the prescribed drug and results in several medical complications. The insulin delivery system, often called as artificial pancreas, is a portable insulin delivery pump used to control blood glucose concentrations. An insulin pump is design and developed to deliver insulin in precise and accurate amount to the diabetic patient, in order to regulate the blood glucose concentrations. In this paper, theoretical analysis has been performed to regulate the blood glucose-insulin concentration on the basis of some mathematical models. These models includes an open loop control of insulin delivery, based on mathematical model of insulin curve and closed loop control based on modified Stolwijk and Hardy's dynamic model. These models are implemented and analyzed using MATLAB. Moreover some experiments have been carried out and the results are analyzed based on medical parameters. This paper elaborates the insulin delivery mechanism and developments which are discussed will enhance the quality of life of the diabetic.

Research paper thumbnail of A Benchmark for Performance Evaluation and Security Assessment of Image Encryption Schemes

I. J. Computer Network and Information Security, 2016

Digital images have become part of everyday life by demonstrating its usability in a variety of f... more Digital images have become part of everyday life by demonstrating its usability in a variety of fields from education to space research. Confidentiality and security of digital images have grown significantly with increasing trend of information interchange over the public channel. Cryptography can be used as a successful technique to prevent image data from unauthorized access. Keeping the nature of image data in mind, several encryption techniques are presented specifically for digital images, in literature during past few years. These cryptographic algorithms lack a benchmark for evaluation of their performance, cryptographic security and quality analysis of recovered images. In this study, we have designed and developed a benchmark based on all the parameters necessary for a good image encryption scheme. Extensive studies have been made to categories all the parameters used by different researchers to evaluate their algorithms and an optimum benchmark for evaluation is formulated. This benchmark is used to evaluate three image encryption schemes. The results of evaluation have highlighted the specific application areas for these image encryption schemes.