{"title":"Reconfigurable encryption system: Encrypt digital data","authors":"M. J. Hossain, Md. Billal Hossain, K. M. Morshed","doi":"10.1109/ICCITECHN.2012.6509805","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509805","url":null,"abstract":"This paper presents a reconfigurable system that can encrypt digital data. The system provides the option of choosing one of familiar encryption methods DES, 3 DES and AES to the user. All these methods are symmetric type block cipher cryptography. DES takes 64 bit key to encrypt each 64 bits block of the entire message. AES on the contrary takes 128 bit key to encrypt each 128 bits block. Providing reconfigurability, the architecture enables the user to choose one of the existing techniques according to the level of security required. So the designed architecture is both flexible and reliable enough for the user to secure their privacy of conversation or e-commerce transaction. The architecture is designed using Verilog hardware description language, synthesized in Xilinx Synthesis Tool (XST) and Simulated by Verilogger Pro 6.5. It may be implemented in commercially available FPGAs.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122682667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling business processes for PLM services integration in PLM system","authors":"S. A. Hossain, S. E. Kadiri, A. Bouras","doi":"10.1109/ICCITECHN.2012.6509743","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509743","url":null,"abstract":"Business Process modeling plays the central role in the business management through systems engineering from the perspective of enterprise modeling. Every organization prior to adapting an enterprise solution for productivity and efficiency needs to analyze the current processes within the organization and identify the required process efficiency and quality along with the transformation needed. The Object Management Group (OMG) Product Life Cycle Management (PLM) Services 2.0 prescribes specifications based on information and computational model for engineering objects that facilitate life cycle management. Besides, this specification also provides high level scenarios for the independent model rather than specific domain. For an efficient enterprise solution using PLM system, through PLM services, there is an emergent need for business process modelling since PLM system does not cover all the business processes and which converge towards the OMG PLM Services 2.0 specification with the required business change managements. This paper highlights key modeling issues for the business processes from the perspective of OMG PLM Services 2.0 using a case study in industrial context, and proposes a methodology for the transformation of BPM towards PLM Services. The proposed methodology satisfies the business process constraints for the PLM services.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120935444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A high embedding capacity image steganography using stream builder and parity checker","authors":"Md. Olioul Islam","doi":"10.1109/ICCITECHN.2012.6509735","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509735","url":null,"abstract":"Steganography is one of the arts and sciences of securing or hiding secret information in some cover media. In the present study, a new steganography technique is developed to hide large data in Bitmap image using stream builder and parity checker. This method uses the concept of odd and even parity for embedding and extracting of secret message. This method is an improvement of Least Significant Bit (LSB) method for hiding information in images. The proposed method can hide large data in a single Bitmap image retaining the advantages and discarding the disadvantages of the LSB method.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"304 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132746124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A tracking based BEM algorithm for OFDMA channel estimation in high Doppler spread","authors":"M. Rabbi","doi":"10.1109/ICCITECHN.2012.6509705","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509705","url":null,"abstract":"In this paper, we investigate the Channel Impulse Response (CIR) estimation in an Orthogonal Frequency Division Multiple Access (OFDMA) uplink using a tracking based Basis Expansion Modeling (BEM) algorithm. By introducing a new tracking term in the BEM coefficients that gives the rate of change of the coefficients, the algorithm is particularly suitable for high mobility application. Specifically, the algorithm estimates the BEM coefficients for each OFDMA block in an iterative manner based on using a new objective function that takes into consideration first order variations in the coefficients of the current and adjacent blocks.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125364517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless power transfer: An application to cell phone battery recharging","authors":"Md. Atiqur Rahman Khan, Abir Ahmed, M. R. Islam","doi":"10.1109/ICCITECHN.2012.6509769","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509769","url":null,"abstract":"A simple prototype wireless power transfer (WPT) system has been proposed and practically implemented to explore the possibility of cell phone battery recharging using WPT technique. In the proposed system, radio frequency approach has been utilized employing a FM transmitter and receiver. Our preliminary experimental results demonstrate that the cell phone battery can be recharged wirelessly by FM transmission and reception technique for which at least 1.25 mW signal strength is required at the receiver for the proposed system.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123414843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Proxy Mobile IPv6: A network-based mobility solution","authors":"Md. Shohrab Hossain, Mohammed Atiquzzaman","doi":"10.1109/ICCITECHN.2012.6509795","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509795","url":null,"abstract":"Terminal-based mobility protocols require mobile devices to participate in mobility signaling that consumes lots of processing power and memory. Network-based mobility protocol, such as, Proxy Mobile IPv6, solves this problem by excluding low-end mobile devices from signaling requirement. In this paper, we have explained Proxy Mobile IPv6 architecture along with its detailed signaling diagram. We have identified the major advantages and limitations of this protocol. We have also performed the signaling cost analysis of its key mobility entities to obtain the amount of overhead on them. Results show interesting relationships among various network parameters, such as, network size, mobility rate, traffic rate. Our critical analysis can help researchers better understand the strengths and weaknesses of this protocol and our signaling analysis can be used by network engineers to estimate the resource requirements of its entities in actual deployment.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123777254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel architecture for nanometer scale low power VLSI design","authors":"P. Barua","doi":"10.1109/ICCITECHN.2012.6509711","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509711","url":null,"abstract":"Power consumption is one of the major threads in CMOS technology. International technology road-map for semiconductors (ITRS) [1] reports that leakage power dissipation may come to dominate total power consumption. Although Leakage power was negligible at 0.18μ technology and above, in nano scale technology, but when the technology is decreases these leakage powers are the top most concern for VLSI circuit designer. As the technology feature size shrink static power consumption dominant the dynamic power exponentially and this static power consumption is known as a sub-threshold leakage. Sub-threshold leakage is a leakage that is arises by creating a weak inversion channel between drain to source. However, tunneling current through gate oxide insulator, channel punch through current and gate current due to hot-carrier injection are also responsible for semiconductor power consumption. Although gate-oxide thickness will be reduced as the technology decreases in nano scale, but this reduction causes sub-threshold leakage. So, there were several method was proposed to tackle the leakage. However, every proposed method has some trade-offs between power, delay and area, in this paper novel common vdd and gnd technique is proposed to overcome the semiconductor leakage and this technique has excellent tradeoffs between power, delay and area, moreover this method will be new weapon for low power VLSI circuit designer.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126200175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of decode and forward MIMO relaying for wireless uplink","authors":"M. Kamruzzaman","doi":"10.1109/ICCITECHN.2012.6509777","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509777","url":null,"abstract":"In this paper, performance of relay assisted wireless link is evaluated in the presence of rayleigh fading where mobile handset is equipped with single transmit antenna, relay is equipped with multiple transmit and receive antennas, and destination has multiple receive antennas. Data are modulated using QPSK or 16 QAM or 64 QAM modulator at handset and send to relay which combined and decode the incoming signal using Maximum Likelihood decoding and further encode the symbols using STBC, and the encoded data are split into n streams which are simultaneously transmitted using n transmit antennas of relay. It is observed that relay with 2 transmit antennas and 2,3,4,5 and 6 receive antennas provides 13 dB, 11 dB, 9 dB, 6 dB and 5 dB gains respectively compared to direct link at 10−5. And there are around 1.5 dB to 6 dB gains for increasing number of receiving antennas of relay from 2 to 3 or 3 to 4 but there are very little gains for increasing number of receiving antennas of relay from 4 to 5 or 5 to 6.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128317371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multilayer network-supporting universal electronic cash transaction framework","authors":"M. I. H. Chowdhury, F. Alam","doi":"10.1109/ICCITECHN.2012.6509731","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509731","url":null,"abstract":"Bangladesh has achieved a tremendous growth in the telecommunication sector recently in spite of various deficiencies regarding socio-economic infrastructure. Following a number of years of huge development in this sector, each and every parts of Bangladesh is now under cellular coverage and the teledensity is expected to reach at maximum satisfactory level soon. This success motivates us towards a more reliable & transparent economic infrastructure through the use of cellular services and intelligent software systems. This paper proposes multilayer network-supported framework which completely eliminates the need and use of paper notes for all kinds of economic transactions. However, the proposed framework is not a threat at all to the present financial institutions and their fundamental mechanisms. Rather, it would be more transparent and free of corruptions as reliable and efficient monitoring of transactions will be possible by respective authorities. This proposed framework will handle all kinds of transactions by electronic means e.g. Push Pull services offering Short Message Service(SMS), road-side booths containing a web interface. Under this distributed system, each and every entity of the entire economic infrastructure will makes it flexible, robust, secure and lawful. The satisfactory experimental results on a small case scenario supports its potential possibilities in real-world implementation.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115314851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. M. Ismail, A B M Saadmaan Rahman, Farha Tamanna Islam
{"title":"Low power design of Johnson Counter using clock gating","authors":"S. M. Ismail, A B M Saadmaan Rahman, Farha Tamanna Islam","doi":"10.1109/ICCITECHN.2012.6509803","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509803","url":null,"abstract":"Power dissipation minimization is one of the prime concerns in recent VLSI design. As chip size is shrinking and many other micro-electronics reliabilities are developing gradually, low power design of any system has become priority. Computer system consists of sequential circuits mostly and that is why efficient low power design of various sequential circuits is very important. In this paper, we have proposed a low power design scheme of Johnson Counter using clock gating system. Doing some power analysis in SPICE, it is considered that our proposed system has lower power dissipation and simpler interconnections compared to the conventional design.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123968966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}