Rashmin Tanna - Academia.edu (original) (raw)

Rashmin Tanna

I am a student for lifetime for machine learning, IoT embedded system and wearable sensors.I am a professor of electronics and communication in Gujarat government.

less

Uploads

Papers by Rashmin Tanna

Research paper thumbnail of Design and implementation of a new encryption algorithm in MATLAB for multimedia files

Transmission of digital content has increases tremendously these days. Privacy and security of th... more Transmission of digital content has increases tremendously these days. Privacy and security of the transmitted data has become an important concern in multimedia applications because multimedia data has been an essential part of our lives, from instant messaging applications to social media. For security of the data we use different techniques like cryptography, steganography, and scrambling. Cryptography is one of the main techniques used for information security which includes many forms like digital signatures, authentication etc. and performs system security, confidentiality, data integrity and other functions. This paper works on dual layer security systems using (Elliptic-Curve cryptography) ECC and (Modified Advanced Encryption Standard) MAES called EMAES on Multimedia files (Text, Audio, and Video). Using this approach, unauthorized viewing of the multimedia file can be prevented. Also, this algorithm provides a high level of security and efficiency as compared to existing ones. Comparison of results with other algorithms using parameters like SSIM, FSIM, PSNR and execution time shows that all these parameters are improved 20% or more. The implementation is carried out in MATLAB 2018a.

Research paper thumbnail of Design and implementation of a new encryption algorithm in MATLAB for multimedia files

Vidhyayana

Transmission of digital content has increases tremendously these days. Privacy and security of th... more Transmission of digital content has increases tremendously these days. Privacy and security of the transmitted data has become an important concern in multimedia applications because multimedia data has been an essential part of our lives, from instant messaging applications to social media. For security of the data we use different techniques like cryptography, steganography, and scrambling. Cryptography is one of the main techniques used for information security which includes many forms like digital signatures, authentication etc. and performs system security, confidentiality, data integrity and other functions. This paper works on dual layer security systems using (Elliptic-Curve cryptography) ECC and (Modified Advanced Encryption Standard) MAES called EMAES on Multimedia files (Text, Audio, and Video). Using this approach, unauthorized viewing of the multimedia file can be prevented. Also, this algorithm provides a high level of security and efficiency as compared to existing o...

Research paper thumbnail of Classification of lower limb rehabilitation exercises with multiple and individual inertial measurement units

Indonesian Journal of Electrical Engineering and Computer Science

Straight leg raise rehabilitation exercises (for both lying and seated position) for lower limb i... more Straight leg raise rehabilitation exercises (for both lying and seated position) for lower limb injuries play a critical role in terms of stress on joints after the injury. The primary objective of the paper is to find how accurately and efficiently a single and a two IMU sensor-based system could classify SSLR (Seated straight leg raise) and LSLR (Lying straight leg raise) exercises using machine learning. Inertial Measurement Units (IMUs) that include accelerometer and gyroscope were calibrated and tested, individual and combined, for classified seating as well as lying exercise and for different demanded personalities. Individual IMUs achieved about 96 % accuracy in binary classification. However, the combined (two) IMUs achieved about 96.8 % accuracy. The merits of the proposed IMU based sensor system are that it is easy to install, cost effective and very useful for telemedical operations in pandemic situations like COVID19. On the basis of these results, it could be concluded ...

Research paper thumbnail of Design and implementation of a new encryption algorithm in MATLAB for multimedia files

Transmission of digital content has increases tremendously these days. Privacy and security of th... more Transmission of digital content has increases tremendously these days. Privacy and security of the transmitted data has become an important concern in multimedia applications because multimedia data has been an essential part of our lives, from instant messaging applications to social media. For security of the data we use different techniques like cryptography, steganography, and scrambling. Cryptography is one of the main techniques used for information security which includes many forms like digital signatures, authentication etc. and performs system security, confidentiality, data integrity and other functions. This paper works on dual layer security systems using (Elliptic-Curve cryptography) ECC and (Modified Advanced Encryption Standard) MAES called EMAES on Multimedia files (Text, Audio, and Video). Using this approach, unauthorized viewing of the multimedia file can be prevented. Also, this algorithm provides a high level of security and efficiency as compared to existing ones. Comparison of results with other algorithms using parameters like SSIM, FSIM, PSNR and execution time shows that all these parameters are improved 20% or more. The implementation is carried out in MATLAB 2018a.

Research paper thumbnail of Design and implementation of a new encryption algorithm in MATLAB for multimedia files

Vidhyayana

Transmission of digital content has increases tremendously these days. Privacy and security of th... more Transmission of digital content has increases tremendously these days. Privacy and security of the transmitted data has become an important concern in multimedia applications because multimedia data has been an essential part of our lives, from instant messaging applications to social media. For security of the data we use different techniques like cryptography, steganography, and scrambling. Cryptography is one of the main techniques used for information security which includes many forms like digital signatures, authentication etc. and performs system security, confidentiality, data integrity and other functions. This paper works on dual layer security systems using (Elliptic-Curve cryptography) ECC and (Modified Advanced Encryption Standard) MAES called EMAES on Multimedia files (Text, Audio, and Video). Using this approach, unauthorized viewing of the multimedia file can be prevented. Also, this algorithm provides a high level of security and efficiency as compared to existing o...

Research paper thumbnail of Classification of lower limb rehabilitation exercises with multiple and individual inertial measurement units

Indonesian Journal of Electrical Engineering and Computer Science

Straight leg raise rehabilitation exercises (for both lying and seated position) for lower limb i... more Straight leg raise rehabilitation exercises (for both lying and seated position) for lower limb injuries play a critical role in terms of stress on joints after the injury. The primary objective of the paper is to find how accurately and efficiently a single and a two IMU sensor-based system could classify SSLR (Seated straight leg raise) and LSLR (Lying straight leg raise) exercises using machine learning. Inertial Measurement Units (IMUs) that include accelerometer and gyroscope were calibrated and tested, individual and combined, for classified seating as well as lying exercise and for different demanded personalities. Individual IMUs achieved about 96 % accuracy in binary classification. However, the combined (two) IMUs achieved about 96.8 % accuracy. The merits of the proposed IMU based sensor system are that it is easy to install, cost effective and very useful for telemedical operations in pandemic situations like COVID19. On the basis of these results, it could be concluded ...

Log In