Pub Date : 2012-12-01DOI: 10.1109/ICCITECHN.2012.6509767
A. Andalib, A. Salekin, Mohammad Raihanul Islam, Md. Abdulla-Al-Shami
In this paper we have proposed a novel method to detect the defects in woven fabric based on the abrupt changes in the intensity of fabric image due to the defects and have constructed a classification model to properly identify the defects. We have also improved an existing method based on histogram processing for the classifier. In classification model we have implemented Artificial Neural Network (ANN). Both of our newly proposed method and improved technique have outperformed the existing methods. We have implemented K-validation to estimate the performance of our classification model. Additionally we have analyzed the performance of our classification model for different experimental parameters. Finally we have presented a comparative analysis of these techniques.
{"title":"Novel approaches for detecting fabric fault using Artificial Neural Network with K-fold validation","authors":"A. Andalib, A. Salekin, Mohammad Raihanul Islam, Md. Abdulla-Al-Shami","doi":"10.1109/ICCITECHN.2012.6509767","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509767","url":null,"abstract":"In this paper we have proposed a novel method to detect the defects in woven fabric based on the abrupt changes in the intensity of fabric image due to the defects and have constructed a classification model to properly identify the defects. We have also improved an existing method based on histogram processing for the classifier. In classification model we have implemented Artificial Neural Network (ANN). Both of our newly proposed method and improved technique have outperformed the existing methods. We have implemented K-validation to estimate the performance of our classification model. Additionally we have analyzed the performance of our classification model for different experimental parameters. Finally we have presented a comparative analysis of these techniques.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123650255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICCITECHN.2012.6509702
S. I. Khan, A. S. M. L. Hoque
Distributed processing is an efficient way to improve performance of a database management system significantly. Distribution of data involves fragmentation, replication and allocation process. Previous research works provided fragmentation solution based on empirical data which are not applicable at the initial stage of a distributed database. In this paper we have presented a fragmentation technique that can be applied at the initial stage when no experimental data are present as well as in later stages of a distributed database system for partitioning the relations. Scalability of our proposed technique also investigated for different situation those may arise in practical cases of a distributed database. Experimental results show that our technique can solve initial fragmentation problem of distributed database system properly also compete with other non initial fragmentation techniques quite good in later stages.
{"title":"Scalability and performance analysis of CRUD matrix based fragmentation technique for distributed database","authors":"S. I. Khan, A. S. M. L. Hoque","doi":"10.1109/ICCITECHN.2012.6509702","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509702","url":null,"abstract":"Distributed processing is an efficient way to improve performance of a database management system significantly. Distribution of data involves fragmentation, replication and allocation process. Previous research works provided fragmentation solution based on empirical data which are not applicable at the initial stage of a distributed database. In this paper we have presented a fragmentation technique that can be applied at the initial stage when no experimental data are present as well as in later stages of a distributed database system for partitioning the relations. Scalability of our proposed technique also investigated for different situation those may arise in practical cases of a distributed database. Experimental results show that our technique can solve initial fragmentation problem of distributed database system properly also compete with other non initial fragmentation techniques quite good in later stages.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123680645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICCITECHN.2012.6509743
S. A. Hossain, S. E. Kadiri, A. Bouras
Business Process modeling plays the central role in the business management through systems engineering from the perspective of enterprise modeling. Every organization prior to adapting an enterprise solution for productivity and efficiency needs to analyze the current processes within the organization and identify the required process efficiency and quality along with the transformation needed. The Object Management Group (OMG) Product Life Cycle Management (PLM) Services 2.0 prescribes specifications based on information and computational model for engineering objects that facilitate life cycle management. Besides, this specification also provides high level scenarios for the independent model rather than specific domain. For an efficient enterprise solution using PLM system, through PLM services, there is an emergent need for business process modelling since PLM system does not cover all the business processes and which converge towards the OMG PLM Services 2.0 specification with the required business change managements. This paper highlights key modeling issues for the business processes from the perspective of OMG PLM Services 2.0 using a case study in industrial context, and proposes a methodology for the transformation of BPM towards PLM Services. The proposed methodology satisfies the business process constraints for the PLM services.
{"title":"Modeling business processes for PLM services integration in PLM system","authors":"S. A. Hossain, S. E. Kadiri, A. Bouras","doi":"10.1109/ICCITECHN.2012.6509743","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509743","url":null,"abstract":"Business Process modeling plays the central role in the business management through systems engineering from the perspective of enterprise modeling. Every organization prior to adapting an enterprise solution for productivity and efficiency needs to analyze the current processes within the organization and identify the required process efficiency and quality along with the transformation needed. The Object Management Group (OMG) Product Life Cycle Management (PLM) Services 2.0 prescribes specifications based on information and computational model for engineering objects that facilitate life cycle management. Besides, this specification also provides high level scenarios for the independent model rather than specific domain. For an efficient enterprise solution using PLM system, through PLM services, there is an emergent need for business process modelling since PLM system does not cover all the business processes and which converge towards the OMG PLM Services 2.0 specification with the required business change managements. This paper highlights key modeling issues for the business processes from the perspective of OMG PLM Services 2.0 using a case study in industrial context, and proposes a methodology for the transformation of BPM towards PLM Services. The proposed methodology satisfies the business process constraints for the PLM services.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120935444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICCITECHN.2012.6509740
K. Mamun, M. N. Huda, M. Mace, M. Lutman, J. Stein, X. Liu, T. Aziz, R. Vaidyanathan, S. Wang
The trend of current brain computer interfaces (BCI) seek to establish bi-directional communication with the brain, for instance, recovering motor functions by externally controlling devices and directly stimulating the brain. This will greatly assist paralyzed individuals through bypassing the damaged brain region. The key process of this communication interface is to decode movements from neural signals and encode information into neural activity. The majority of decoding or pattern classification studies have focused on cortical areas for BCIs, but deep brain structures have also been involved in motor control. The subthalamic nucleus (STN) in the basal ganglia is involved in the preparation, execution and imagining of movements, and may be an alternative source for driving BCIs. This study therefore aimed to classify patterns of deep brain local field potentials (LFPs) related to execution of visually cued movements. LFPs were recorded bilaterally from the STN through deep brain stimulation electrodes implanted in patients with Parkinson's disease. The frequency dependent components of the LFPs were extracted using the wavelet packet transform. In each frequency component, signal features were extracted using an alternative approach called neural synchronization by analyzing Granger causality between the STN. Based on these extracted features, a new feature selection strategy, namely weighted sequential feature selection (WSFS) was developed to efficiently select the optimal feature subset. A support vector machine (SVM) classifier was implemented alongside this novel feature extraction and selection strategy, and evaluated using a cross-validation procedure. Using this optimised feature subset, average correct pattern classification accuracy of movement (left or right) reached 76.0±3.1%. The results obtained in this study are encouraging and suggest that the neural activity in the deep neural circuit (basal ganglia) can be used for controlling BCIs.
{"title":"Pattern classification of deep brain local field potentials for brain computer interfaces","authors":"K. Mamun, M. N. Huda, M. Mace, M. Lutman, J. Stein, X. Liu, T. Aziz, R. Vaidyanathan, S. Wang","doi":"10.1109/ICCITECHN.2012.6509740","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509740","url":null,"abstract":"The trend of current brain computer interfaces (BCI) seek to establish bi-directional communication with the brain, for instance, recovering motor functions by externally controlling devices and directly stimulating the brain. This will greatly assist paralyzed individuals through bypassing the damaged brain region. The key process of this communication interface is to decode movements from neural signals and encode information into neural activity. The majority of decoding or pattern classification studies have focused on cortical areas for BCIs, but deep brain structures have also been involved in motor control. The subthalamic nucleus (STN) in the basal ganglia is involved in the preparation, execution and imagining of movements, and may be an alternative source for driving BCIs. This study therefore aimed to classify patterns of deep brain local field potentials (LFPs) related to execution of visually cued movements. LFPs were recorded bilaterally from the STN through deep brain stimulation electrodes implanted in patients with Parkinson's disease. The frequency dependent components of the LFPs were extracted using the wavelet packet transform. In each frequency component, signal features were extracted using an alternative approach called neural synchronization by analyzing Granger causality between the STN. Based on these extracted features, a new feature selection strategy, namely weighted sequential feature selection (WSFS) was developed to efficiently select the optimal feature subset. A support vector machine (SVM) classifier was implemented alongside this novel feature extraction and selection strategy, and evaluated using a cross-validation procedure. Using this optimised feature subset, average correct pattern classification accuracy of movement (left or right) reached 76.0±3.1%. The results obtained in this study are encouraging and suggest that the neural activity in the deep neural circuit (basal ganglia) can be used for controlling BCIs.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125810345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICCITECHN.2012.6509729
Farzana Khanam, S. Mitra, Md. Selim Hossain, D. Karmokar
This paper contains a multiband low profile Modified Inverted-FL (IFL) strip antenna for 5.2/5.8 GHz WLAN and 5.5 GHz WiMAX operations in a laptop computer. The simulation results are analyzed by means of Numerical Electromagnetic Code-2 (4NEC2) software. This antenna covers −10 dB return loss bandwidth of 900 MHz (5150 MHz ∼6050 MHz). The antenna provides very high peak gains with lower gain variation in its operating bands. The antenna has suitable omnidirectional radiation characteristics. The dimension of the antenna is 16×18.5 mm2, which is very compact in size. So, this low profile antenna is promising to be embedded within the different portable devices employing WiMAX and WLAN applications.
{"title":"Multiband low profile Modified Inverted-FL strip antenna for 5.2/5.8 GHz WLAN and 5.5 GHz WiMAX applications in laptop computer","authors":"Farzana Khanam, S. Mitra, Md. Selim Hossain, D. Karmokar","doi":"10.1109/ICCITECHN.2012.6509729","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509729","url":null,"abstract":"This paper contains a multiband low profile Modified Inverted-FL (IFL) strip antenna for 5.2/5.8 GHz WLAN and 5.5 GHz WiMAX operations in a laptop computer. The simulation results are analyzed by means of Numerical Electromagnetic Code-2 (4NEC2) software. This antenna covers −10 dB return loss bandwidth of 900 MHz (5150 MHz ∼6050 MHz). The antenna provides very high peak gains with lower gain variation in its operating bands. The antenna has suitable omnidirectional radiation characteristics. The dimension of the antenna is 16×18.5 mm2, which is very compact in size. So, this low profile antenna is promising to be embedded within the different portable devices employing WiMAX and WLAN applications.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126155789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICCITECHN.2012.6509750
M. A. Motin, Md. Imran Hasan, Md. Asaduz-Zaman
The main motto of this paper is to design the effective shape of a microstrip patch antenna which can provide lower return losses, better gain and performance for K-band (18 GHz to 26 GHz), Ku-band (12 GHz to 18 GHz) and X-band (2 GHz to 12 GHz) applications. Attempts have been made to optimize the antenna performance by using a single slot in different position in patch, by increasing the number of slots in vertical and horizontal direction and by using array technique. The simulation is performed by using GEMS simulator which is commercially available antenna simulator. The antenna is designed by using Taconic TLY-5 dielectric substrate with permittivity □r =2.2 and height, h=1.588 mm. Without using array technique we have got the return losses in the range of −20 db to −25 db at the frequencies around 19.5 GHz. The series feed array offers −13db return loss around 21GHz, −17.5 db return loss around 16 GHz and −7.25 db return loss around 11.5 GHz. Therefore, this antenna is suitable for K-band, Ku-band and X-band applications.
{"title":"Design and optimization of a low cost multi band microstrip patch antenna for K-band, Ku-band and X-band applications","authors":"M. A. Motin, Md. Imran Hasan, Md. Asaduz-Zaman","doi":"10.1109/ICCITECHN.2012.6509750","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509750","url":null,"abstract":"The main motto of this paper is to design the effective shape of a microstrip patch antenna which can provide lower return losses, better gain and performance for K-band (18 GHz to 26 GHz), Ku-band (12 GHz to 18 GHz) and X-band (2 GHz to 12 GHz) applications. Attempts have been made to optimize the antenna performance by using a single slot in different position in patch, by increasing the number of slots in vertical and horizontal direction and by using array technique. The simulation is performed by using GEMS simulator which is commercially available antenna simulator. The antenna is designed by using Taconic TLY-5 dielectric substrate with permittivity □r =2.2 and height, h=1.588 mm. Without using array technique we have got the return losses in the range of −20 db to −25 db at the frequencies around 19.5 GHz. The series feed array offers −13db return loss around 21GHz, −17.5 db return loss around 16 GHz and −7.25 db return loss around 11.5 GHz. Therefore, this antenna is suitable for K-band, Ku-band and X-band applications.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115559059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICCITECHN.2012.6509762
S. Z. Ishraque, A. BanNa, O. Chae
Humans display emotions through facial expressions. Detecting and recognizing these expressions comes naturally to us. But recognizing expressions is not straight forward for machines. In recent years a lot of literatures surged concerning automatic facial expression recognition. While some of these efforts have generated very good results, room for improvement still remains. There are several ways facial expression recognition can be performed. In this work we are proposing an appearance based method for extracting a new type of image descriptor based on Gabor wavelet which can be used for creating a feature vector of an image. To achieve this goal we applied Gabor filter over the image and recorded the edge response at each pixel. For each pixel we take several responses on several orientations. Finally we encode the responses and create a feature vector from the generated codes. We also showed experimental results on standard database for facial expression recognition using our proposed method.
{"title":"Local Gabor directional pattern for facial expression recognition","authors":"S. Z. Ishraque, A. BanNa, O. Chae","doi":"10.1109/ICCITECHN.2012.6509762","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509762","url":null,"abstract":"Humans display emotions through facial expressions. Detecting and recognizing these expressions comes naturally to us. But recognizing expressions is not straight forward for machines. In recent years a lot of literatures surged concerning automatic facial expression recognition. While some of these efforts have generated very good results, room for improvement still remains. There are several ways facial expression recognition can be performed. In this work we are proposing an appearance based method for extracting a new type of image descriptor based on Gabor wavelet which can be used for creating a feature vector of an image. To achieve this goal we applied Gabor filter over the image and recorded the edge response at each pixel. For each pixel we take several responses on several orientations. Finally we encode the responses and create a feature vector from the generated codes. We also showed experimental results on standard database for facial expression recognition using our proposed method.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130555917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICCITECHN.2012.6509756
Sheikh S. Abdullah, M. Rahaman
The objective of this research is to classify or forecast the stock market from the general investor's point of view. There are three parts in this research. In the first part we performed a survey on most of the well known data mining indicators, implemented the algorithms and calculated the accuracy by applying them on historical data. Then we presented an indicator algorithm which has higher accuracy compare to existing algorithms and it also provides a decision point that helps the investor to understand the significance of the result of the indicator. Finally we applied association rules mining to group the selected (based on precision) indicator algorithms to come up with a model to increase the overall accuracy. However motivating fact is we achieved far better results from our suggested model than other comparable indicator algorithms or strategy. For our research we used the data of Dhaka Stock Exchange (DSE), capital market of Bangladesh.
{"title":"Stock market prediction model using TPWS and association rules mining","authors":"Sheikh S. Abdullah, M. Rahaman","doi":"10.1109/ICCITECHN.2012.6509756","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509756","url":null,"abstract":"The objective of this research is to classify or forecast the stock market from the general investor's point of view. There are three parts in this research. In the first part we performed a survey on most of the well known data mining indicators, implemented the algorithms and calculated the accuracy by applying them on historical data. Then we presented an indicator algorithm which has higher accuracy compare to existing algorithms and it also provides a decision point that helps the investor to understand the significance of the result of the indicator. Finally we applied association rules mining to group the selected (based on precision) indicator algorithms to come up with a model to increase the overall accuracy. However motivating fact is we achieved far better results from our suggested model than other comparable indicator algorithms or strategy. For our research we used the data of Dhaka Stock Exchange (DSE), capital market of Bangladesh.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130921374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICCITECHN.2012.6509805
M. J. Hossain, Md. Billal Hossain, K. M. Morshed
This paper presents a reconfigurable system that can encrypt digital data. The system provides the option of choosing one of familiar encryption methods DES, 3 DES and AES to the user. All these methods are symmetric type block cipher cryptography. DES takes 64 bit key to encrypt each 64 bits block of the entire message. AES on the contrary takes 128 bit key to encrypt each 128 bits block. Providing reconfigurability, the architecture enables the user to choose one of the existing techniques according to the level of security required. So the designed architecture is both flexible and reliable enough for the user to secure their privacy of conversation or e-commerce transaction. The architecture is designed using Verilog hardware description language, synthesized in Xilinx Synthesis Tool (XST) and Simulated by Verilogger Pro 6.5. It may be implemented in commercially available FPGAs.
本文提出了一种可重构的数字数据加密系统。系统为用户提供了常用加密方式DES、3des和AES三种加密方式中的一种选择。这些方法都是对称型分组密码。DES使用64位密钥对整个消息的每个64位块进行加密。相反,AES采用128位密钥对每个128位块进行加密。该体系结构提供了可重构性,使用户能够根据所需的安全级别选择一种现有技术。因此,所设计的体系结构具有足够的灵活性和可靠性,可以保护用户的会话隐私或电子商务交易隐私。该体系结构采用Verilog硬件描述语言进行设计,在Xilinx Synthesis Tool (XST)中进行合成,并用Verilogger Pro 6.5进行仿真。它可以在商用fpga中实现。
{"title":"Reconfigurable encryption system: Encrypt digital data","authors":"M. J. Hossain, Md. Billal Hossain, K. M. Morshed","doi":"10.1109/ICCITECHN.2012.6509805","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509805","url":null,"abstract":"This paper presents a reconfigurable system that can encrypt digital data. The system provides the option of choosing one of familiar encryption methods DES, 3 DES and AES to the user. All these methods are symmetric type block cipher cryptography. DES takes 64 bit key to encrypt each 64 bits block of the entire message. AES on the contrary takes 128 bit key to encrypt each 128 bits block. Providing reconfigurability, the architecture enables the user to choose one of the existing techniques according to the level of security required. So the designed architecture is both flexible and reliable enough for the user to secure their privacy of conversation or e-commerce transaction. The architecture is designed using Verilog hardware description language, synthesized in Xilinx Synthesis Tool (XST) and Simulated by Verilogger Pro 6.5. It may be implemented in commercially available FPGAs.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122682667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICCITECHN.2012.6509781
Sk. Imran Hossain, Md. Fahim Chowdhury, Md. Amer Muntaq Ganim, M. S. Sadi
In present world, Bangla is one of the most spoken languages. But, in the arena of electronic devices, tools for Bangla writing are inadequate. Also, there are limitations for typing Bangla faster in an efficient way because of the lack of proper layout. After forty-one years of the liberation war, an optimal and widely accepted Bangla keyboard layout has not yet been obtained. And in present days, smart-phones and tabs are being used profoundly where soft keyboard is the most essential input method. In Bangla soft keyboard, the arrangement of letters should be in such a way that paves the way towards an easy and efficient text input method. Our primary evaluation shows a significant improvement in typing speed, ease of learning and reduction in error rates. Hence we propose an efficient Fixed Bangla Keyboard Layout where Bangla alphabets are mapped phonetically on the standard QWERTY keyboard and a Bangla text-to-image replacement technique for non-Bangla supported smartphones. In this paper we present a soft keyboard implemented on Android platform using this layout with text-to-image conversion support.
{"title":"Implementation of an efficient bangla soft keyboard with text-to-image replacement support","authors":"Sk. Imran Hossain, Md. Fahim Chowdhury, Md. Amer Muntaq Ganim, M. S. Sadi","doi":"10.1109/ICCITECHN.2012.6509781","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509781","url":null,"abstract":"In present world, Bangla is one of the most spoken languages. But, in the arena of electronic devices, tools for Bangla writing are inadequate. Also, there are limitations for typing Bangla faster in an efficient way because of the lack of proper layout. After forty-one years of the liberation war, an optimal and widely accepted Bangla keyboard layout has not yet been obtained. And in present days, smart-phones and tabs are being used profoundly where soft keyboard is the most essential input method. In Bangla soft keyboard, the arrangement of letters should be in such a way that paves the way towards an easy and efficient text input method. Our primary evaluation shows a significant improvement in typing speed, ease of learning and reduction in error rates. Hence we propose an efficient Fixed Bangla Keyboard Layout where Bangla alphabets are mapped phonetically on the standard QWERTY keyboard and a Bangla text-to-image replacement technique for non-Bangla supported smartphones. In this paper we present a soft keyboard implemented on Android platform using this layout with text-to-image conversion support.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":"96 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120882153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}