{"title":"The mCard approach for Bangladesh: A smart phone based Credit/Debit/ATM card","authors":"Mohammad Salah Uddin, Nakul C. Das, A. Barua","doi":"10.1109/ICCITECHN.2014.6997374","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2014.6997374","url":null,"abstract":"Mobile payments are a natural evolution of e-payment schemes that will facilitate mobile commerce. A mobile payment or m-payment may be defined, as any payment where a mobile device is used to initiate, authorize and confirm an exchange of financial value in return for goods and services. Mobile devices may include mobile phones, PDAs, wireless tablets and any other device that connect to mobile telecommunication network and make it possible for payments. In Bangladesh, several private banks (Dutch-Bangla Ltd, Islami Bank Ltd, Trust Bank Ltd and Others) introduced mobile banking. The BRAC Bank-initiated mobile banking service, “bKash”, is at present the country's leading service-provider in mobile banking. This paper present a new m-payment system called “mCard” replacing existing Credit or Debit or ATM card and includes some feature of mobile banking (except money transfer to remote area).","PeriodicalId":113626,"journal":{"name":"16th Int'l Conf. Computer and Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114658632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power pre-emphasised OFDM for RSOA modulation in high speed WDM-PONs","authors":"P. Choudhury","doi":"10.1109/ICCITECHN.2014.6997386","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2014.6997386","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) technique is useful for limited bandwidth reflective semiconductor optical amplifier (RSOA) modulation to design high-speed passive optical networks (PONs). However, the capacity improvement of using conventional OFDM format is severely degraded over the fiber transmission due to the presence of RSOA chirp induced RF power fading. Therefore, we proposed a pre-emphasis OFDM for RSOA modulation to enhance the system performance against both RSOA low bandwidth and high chirp parameter. Experimental results showed that the transmission speed is reached up to 17.1 Gb/s at the bit error rate (BER) within forward error correction (FEC) limit over 25 Km fiber span by using commercially available RSOA of bandwidth <; 1 GHz.","PeriodicalId":113626,"journal":{"name":"16th Int'l Conf. Computer and Information Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123667922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical study of a loaded U-antenna for 3.5 GHz mobile WiMAX and 7.5 GHz military satellite communication applications","authors":"Md. Juwel Rana, Md Abu Shahab Mollah","doi":"10.1109/ICCITECHN.2014.6997364","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2014.6997364","url":null,"abstract":"This paper presents the numerical simulation of a low-profile dual frequency loaded U-antenna for 3.5 GHz WiMAX and 7.5 GHz military satellite communication applications. The antenna has a very compact size of 23.5×14 mm2 and provides a bandwidth of 340 MHz (3.4 GHz-3.74 GHz) and 570 MHz (7.23 GHz-7.8 GHz) in the two different resonant modes. The antenna provides maximum gain of 7.51 and 3.14 dBi respectively at S11 <; -10 dB. It also provides almost omnidirectional radiation characteristics and excellent impedance matching in the operating bandwidth.","PeriodicalId":113626,"journal":{"name":"16th Int'l Conf. Computer and Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129690778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new hierarchical interconnection network for future generation parallel computer","authors":"Md Rabiul Awal, M. M. Hafizur Rahman, M. Akhand","doi":"10.1109/ICCITECHN.2014.6997341","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2014.6997341","url":null,"abstract":"A Midimew connected Mesh Network (MMN) is a MInimal DIstance MEsh with Wrap-around links network of multiple basic modules, in which the basic modules are 2D-mesh networks that are hierarchically interconnected for higher-level networks. In this paper, we present the architecture of the MMN, addressing of node, routing of message, and evaluate the static network performance of MMN, TESH, mesh, and torus networks. It is shown that the MMN possesses several attractive features, including constant degree, small diameter, low cost, small average distance, moderate bisection width, and high fault tolerant performance than that of other conventional and hierarchical interconnection networks. It is also shown that with the same node degree, arc connectivity, bisection width, and wiring complexity, the diameter and average distance of the MMN is lower than that of the TESH network.","PeriodicalId":113626,"journal":{"name":"16th Int'l Conf. Computer and Information Technology","volume":"248 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128688039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A CSMA based intra cluster communication technique for saving cluster head energy","authors":"Amit Karmaker, M. Hasan","doi":"10.1109/ICCITECHN.2014.6997342","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2014.6997342","url":null,"abstract":"Wireless sensor network is one of the most promising technology in wireless network. To design a sensor network, improving the lifetime of sensor node is critical issue. For these reason researchers in these field pay great attention to Medium Access Control (MAC) protocol. As most of the nodes are placed in remote and hazardous area, so when the power is down it is difficult to recharge them or it is not possible to replace them. For these reason the main concern of researchers is how to utilize the medium in a power effective manner. With advance of these various MAC protocols are introduced and lots of recent works are going on. LEACH protocols are one of these protocols which introduce clustering technique. In this paper, we propose a method for intra cluster communication based on CSMA and an extended cluster head selection algorithm. Also figure out mathematical comparison between LEACH protocol and our proposed method. The protocol selection depends on the application requirements and hardware characteristics. LEACH is suitable for low traffic and small area. Here we also consider low traffic.","PeriodicalId":113626,"journal":{"name":"16th Int'l Conf. Computer and Information Technology","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127085819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shima Chakraborty, Md. Hasan Hafizur Rahman, M. Hanif Seddiqui
{"title":"Linked open data representation of historical heritage of Bangladesh","authors":"Shima Chakraborty, Md. Hasan Hafizur Rahman, M. Hanif Seddiqui","doi":"10.1109/ICCITECHN.2014.6997363","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2014.6997363","url":null,"abstract":"The historical heritage is a vast domain that generates distributed and heterogeneous data repositories in the existing World Wide Web (WWW). The integration of these heterogeneous data repositories and retrieving data from WWW using traditional search engine is a challenging task. In this regard, our research is to demonstrate the feasibility of semantic web technology for creating machine understandable description of entities associated with the creation and maintenance of historical heritage of Bangladesh. Moreover, our proposed approach uses the essence of semantic knowledge base composed of real historical heritage data that are interlinked with data from the Geo-Bangladesh, a machine understandable Linked Open Data (LOD) repository of geographic related data to the administrative structure of Bangladesh and retrieve specific information using semantic search tools like SPARQL. We perform a number of experiments with SPARQL to retrieve and inference specific information that shows usefulness of our proposed Linked Open Data on historical heritage of Bangladesh.","PeriodicalId":113626,"journal":{"name":"16th Int'l Conf. Computer and Information Technology","volume":"735 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129185106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of Turbo Coded Vertical Bell Laboratories Layered Space Time Multiple Input Multiple Output system","authors":"M. Kamruzzaman","doi":"10.1109/ICCITECHN.2014.6997298","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2014.6997298","url":null,"abstract":"In this paper, performance of a Turbo Code (TC) and Vertical Bell Laboratories Layered Space Time (VBLAST) encoded wireless link is evaluated in the presence of Rayleigh fading for Multiple-Input Multiple-Output (MIMO) system. Turbo encoded bits are modulated using QPSK or 16 QAM or 64 QAM modulator and modulated data are further encoded using VBLAST and then split into n streams which are simultaneously transmitted through n transmit antennas. Simulation results obtained show that coded MIMO system provides 17 to 25 dB coding gain for different combination of transmit and receive antennas at a BER of 10-3 compared to uncoded MIMO system. And there is around 2 to 8 dB gain for increasing number of transmitting antennas from 2 to 3 or 3 to 4. On the other hand, capacities for (2 Tx, 2 Rx), (3 Tx, 3 Rx) and (4 Tx, 4 Rx) are almost same from 0 dB to 10 dB but change significantly with increasing SNR from 10 dB.","PeriodicalId":113626,"journal":{"name":"16th Int'l Conf. Computer and Information Technology","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121101049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Radius particle swarm optimization for resource constrained project scheduling problem","authors":"Mana Anantathanvit, M. Munlin","doi":"10.1109/ICCITECHN.2014.6997330","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2014.6997330","url":null,"abstract":"The Resource-Constrained Project Scheduling Problem (RCPSP) is a classical well-known and NP-hard problem which includes the resource and precedence constraints that has been applied to many applications. This paper proposes the Radius Particle Swarm Optimization (RPSO) to solve the RCPSP. It extends the Particle Swarm Optimization (PSO) by regrouping the agent particles within the appropriate radius of the circle. It initializes the group of particles, calculate the fitness function, and find the best particle in that group. It is then applied to the RCPSP to find the best scheduling. The proposed method is tested against the PSPLIB standard datasets. The results show that the R-PSO gives better average makespan and standard deviation than traditional PSO.","PeriodicalId":113626,"journal":{"name":"16th Int'l Conf. Computer and Information Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114152821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information piracy and data incongruity prevention in WCMS to WCMS conversion procedure using precise information hiding and data integrity manager","authors":"Yeasin Ar Rahman, Khalid Ibn Zinnah","doi":"10.1109/ICCITECHN.2014.6997362","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2014.6997362","url":null,"abstract":"This paper addresses the rapidly increasing issue of sensitive user data theft and the data incongruity due to Web Content Management System (WCMS) structure and very complex WCMS to WCMS conversion procedure. After retaining the full picture of the situation, the paper approaches a solution for securely accessing, modifying and migrating WCMS database(DB) using a precise information hiding and data integrity manager named Data Security Processor Software Unit (DSPSU) without compromising the sensitive data to fraudsters.","PeriodicalId":113626,"journal":{"name":"16th Int'l Conf. Computer and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125774443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the impact of virtual environment in trust building: E-commerce perspective","authors":"S. A. Ahsan Rajon, Md. Mahbubur Rahman","doi":"10.1109/ICCITECHN.2014.6997329","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2014.6997329","url":null,"abstract":"Virtual Reality is an important aspect of the state-of-art technologies. The emerging trend to integrate the highest level of interactivity in the computer-oriented activities like web pages has introduced a new dimension in various aspects of computer-oriented services. Electronic commerce (e-commerce) is such a sector, which may be greatly facilitated with the touch of interactive virtual reality or virtual environment. This research mainly aims to develop a trust establishment model for electronic commerce activities. This paper focuses on the usability of virtual reality and virtual environments in establishing trust in electronic commerce and related issues. We perform an extensive analysis on the current electronic commerce infrastructure and evaluate the effectiveness of virtual environment from the point of view of customer relationship management, trust-worthiness and customer satisfaction. An effective framework of integrating virtual reality with e-commerce is also presented in this paper. This paper also investigates the applicability of virtual reality and virtual environment for trust management in online shopping. The prime contribution of this paper is, it proposes an effective trust-building model to enhance the customer-seller relationship in e-commerce and provides a robust framework for the same. A survey has also been conducted evaluating the acceptability of proposed framework. Comprehensive recommendations on e-commerce-trust formation model in developing countries and its prospects and constraints are provided in this paper too.","PeriodicalId":113626,"journal":{"name":"16th Int'l Conf. Computer and Information Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128742408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}