Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989155
Yue Li, Guangshun Shi
With the popularity and continuous development of smartphones and other mobile devices, the area of the fingerprint sensors is continuously reduced, resulting in a continuous reduction in the size of the fingerprint. In the process of fingerprint registration, the complete fingerprint image is merged by acquiring a set of small fingerprint images. In the comparison process, the partial fingerprint image is compared to the full image. The traditional fingerprint matching method is mostly based on the minutiae and singular points. Since partial fingerprint contains limited minutiae and most of them do not include any singular points, we proposed a local fingerprint matching algorithm based on ORB feature, which has a good effect on partial fingerprint matching. Also shows the experimental results on two public data sets (FVC2004 and sd04) and a private database.
{"title":"ORB-based Fingerprint Matching Algorithm for Mobile Devices","authors":"Yue Li, Guangshun Shi","doi":"10.1109/CCET48361.2019.8989155","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989155","url":null,"abstract":"With the popularity and continuous development of smartphones and other mobile devices, the area of the fingerprint sensors is continuously reduced, resulting in a continuous reduction in the size of the fingerprint. In the process of fingerprint registration, the complete fingerprint image is merged by acquiring a set of small fingerprint images. In the comparison process, the partial fingerprint image is compared to the full image. The traditional fingerprint matching method is mostly based on the minutiae and singular points. Since partial fingerprint contains limited minutiae and most of them do not include any singular points, we proposed a local fingerprint matching algorithm based on ORB feature, which has a good effect on partial fingerprint matching. Also shows the experimental results on two public data sets (FVC2004 and sd04) and a private database.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"7 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113989764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989329
Dan Liu, Jin Wan Park
Today, augmented reality has been applied to a variety of areas, including AR picture books. The incorporation of AR into picture books brings readers a new way of reading picture books and is gaining its popularity among readers. However, as the most important feature of AR picture books, virtual contents have not been properly used, and there is severe chaos in terms of the presentation. The virtual contents and the narrative of picture books are disjointed, which affects the reading experience of the readers. In this paper, with the purpose of providing better reading experience of AR picture books to readers, the design form of virtual content in AR picture book is described, the features of reading reflected through the incorporation of the forms of virtual contents and narratives of picture books are pointed out, and the ways that virtual contents are integrated with narratives of picture books in terms of design and presentation are discussed.
{"title":"A Study on the Design and Presentation of Virtual Contents in AR Picture Books","authors":"Dan Liu, Jin Wan Park","doi":"10.1109/CCET48361.2019.8989329","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989329","url":null,"abstract":"Today, augmented reality has been applied to a variety of areas, including AR picture books. The incorporation of AR into picture books brings readers a new way of reading picture books and is gaining its popularity among readers. However, as the most important feature of AR picture books, virtual contents have not been properly used, and there is severe chaos in terms of the presentation. The virtual contents and the narrative of picture books are disjointed, which affects the reading experience of the readers. In this paper, with the purpose of providing better reading experience of AR picture books to readers, the design form of virtual content in AR picture book is described, the features of reading reflected through the incorporation of the forms of virtual contents and narratives of picture books are pointed out, and the ways that virtual contents are integrated with narratives of picture books in terms of design and presentation are discussed.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132045814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dynamic tracking and nondestructive status monitoring of costly asset still are issues in traditional manual asset management, and there is no feasible solution to solve. In this paper, a novel network-accessible and localizable power monitor is designed to solve these issues. Firstly, the hardware framework design of monitor is discussed. Secondly, micro-control unit, power supply voltage regulator circuit, power metering module, WiFi module and LoRa module are addressed in detail. Finally, according to whether the asset equipment is connected to alternating current or not, software flow is divided into two algorithms to realize the dynamic tracking and status monitoring.
{"title":"A Novel Network-Accessible and Localizable Power Monitor","authors":"Tinghui Lu, Jinhui Yin, Qiyou Lv, Yiliang Wu, Xuliang Luo, Zhifeng Lin","doi":"10.1109/CCET48361.2019.8988955","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8988955","url":null,"abstract":"Dynamic tracking and nondestructive status monitoring of costly asset still are issues in traditional manual asset management, and there is no feasible solution to solve. In this paper, a novel network-accessible and localizable power monitor is designed to solve these issues. Firstly, the hardware framework design of monitor is discussed. Secondly, micro-control unit, power supply voltage regulator circuit, power metering module, WiFi module and LoRa module are addressed in detail. Finally, according to whether the asset equipment is connected to alternating current or not, software flow is divided into two algorithms to realize the dynamic tracking and status monitoring.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134096012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989354
Changliu Niu, Hui Chang
At present, positioning is widely used in daily life. Outdoor positioning has been developed very mature and can meet the needs of users. However, indoor positioning cannot be realized because the signal cannot reach the satellite positioning mode. Therefore, this paper proposes to combine the inertial positioning method with the common mobile device "mobile phone" in life, and to improve the three parts of the traditional pedestrian dead reckoning algorithm (PDR) , such as step frequency detection, step length measurement and direction detection, in view of the disadvantages such as low positioning accuracy and large error when using the PDR algorithm of pedestrian track calculation. On the basis of the traditional PDR algorithm, in view of the inaccuracy of the zero detection method to judge the step frequency data, the paper proposes to use the combination of kalman filter algorithm and dynamic threshold value to judge the number of steps. For step size measurement, based on the traditional empirical method, users' walking state can be distinguished and step size value can be determined dynamically. Finally, the method of region division is used to solve the problem of particle penetrating the wall, and the track error is adjusted to make the track more accurate. Experimental results show that the algorithm eliminates the positioning inaccuracy caused by excessive error, enhances the positioning stability and accuracy, and the route track is smoother, and the positioning accuracy reaches about 1 meter.
{"title":"Research on Indoor Positioning on Inertial Navigation","authors":"Changliu Niu, Hui Chang","doi":"10.1109/CCET48361.2019.8989354","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989354","url":null,"abstract":"At present, positioning is widely used in daily life. Outdoor positioning has been developed very mature and can meet the needs of users. However, indoor positioning cannot be realized because the signal cannot reach the satellite positioning mode. Therefore, this paper proposes to combine the inertial positioning method with the common mobile device \"mobile phone\" in life, and to improve the three parts of the traditional pedestrian dead reckoning algorithm (PDR) , such as step frequency detection, step length measurement and direction detection, in view of the disadvantages such as low positioning accuracy and large error when using the PDR algorithm of pedestrian track calculation. On the basis of the traditional PDR algorithm, in view of the inaccuracy of the zero detection method to judge the step frequency data, the paper proposes to use the combination of kalman filter algorithm and dynamic threshold value to judge the number of steps. For step size measurement, based on the traditional empirical method, users' walking state can be distinguished and step size value can be determined dynamically. Finally, the method of region division is used to solve the problem of particle penetrating the wall, and the track error is adjusted to make the track more accurate. Experimental results show that the algorithm eliminates the positioning inaccuracy caused by excessive error, enhances the positioning stability and accuracy, and the route track is smoother, and the positioning accuracy reaches about 1 meter.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114467856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8988996
Kyaw Zaw Ye, Z. Htet, Toe Wai Htun, Moe Kyaw Thu, Htay Hlaing Soe, Hein Khant Aung, Pyae Sone Ko Ko
Studied and analysed the problems of data evaluation and development of data science. Developed basic concept and algorithm for dataset management system. Realized and implemented web application for myanmar population dataset management system. In this paper we implemented, coded and tested on real data and during the implementing and testing phase related to basic concept of data science.
{"title":"Development of Basic Concept and Algorithm for Myanmar Population Dataset Management System","authors":"Kyaw Zaw Ye, Z. Htet, Toe Wai Htun, Moe Kyaw Thu, Htay Hlaing Soe, Hein Khant Aung, Pyae Sone Ko Ko","doi":"10.1109/CCET48361.2019.8988996","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8988996","url":null,"abstract":"Studied and analysed the problems of data evaluation and development of data science. Developed basic concept and algorithm for dataset management system. Realized and implemented web application for myanmar population dataset management system. In this paper we implemented, coded and tested on real data and during the implementing and testing phase related to basic concept of data science.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127719835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989091
Xuejun Zhong, Zhu Yuan, Yu Hu, Ping Xie
Today, the information data of the world presents explosive growth and the existing storage systems can no longer adapt the requirements of storing massive data. Disk array is composed of a large number of independent disks, which are combined into a huge disk group and provide more I/O parallelism. Therefore, we often adopt the way, adding new disks to disk array for resolving the insufficient storage capacity, which is also called as RAID scaling. Since RAID was proposed, different levels of RAID storage systems have been put forward for different data storage requirements. Compared with other RAID storage systems, RAID storage system based on STAR-Code has better data fault tolerance and higher data recovery ability, which can tolerate three disks fault simultaneously. In this paper, we put forward RS3 approach based on STAR-Code for RAID scaling. Compared with Round-Robin and Semi-RR approach, this approach reduces the data migration by 64.3%~89.5% and decreases the migration time by 66.1%~90.8%.
{"title":"An Approach for RAID Scaling Based on STAR-Code","authors":"Xuejun Zhong, Zhu Yuan, Yu Hu, Ping Xie","doi":"10.1109/CCET48361.2019.8989091","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989091","url":null,"abstract":"Today, the information data of the world presents explosive growth and the existing storage systems can no longer adapt the requirements of storing massive data. Disk array is composed of a large number of independent disks, which are combined into a huge disk group and provide more I/O parallelism. Therefore, we often adopt the way, adding new disks to disk array for resolving the insufficient storage capacity, which is also called as RAID scaling. Since RAID was proposed, different levels of RAID storage systems have been put forward for different data storage requirements. Compared with other RAID storage systems, RAID storage system based on STAR-Code has better data fault tolerance and higher data recovery ability, which can tolerate three disks fault simultaneously. In this paper, we put forward RS3 approach based on STAR-Code for RAID scaling. Compared with Round-Robin and Semi-RR approach, this approach reduces the data migration by 64.3%~89.5% and decreases the migration time by 66.1%~90.8%.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127568262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989308
Guangxi Chen, Fangfang Lv, Yijun Zhan, Yong Huang
In order to solve the problem of low accuracy of the driver's seat-belt identification and neglecting co-pilot, a method of driver's seat-belt identification based on deep convolutional channel modeling is improved. Firstly, the characteristic parameters of redundant channels are reduced by means of deep convolutional feature channel compression. Then, the feature weight of the deep convolutional channel is re-calibrated to improve the attention weight of the feature of the safety belt and suppress the expression of the interference feature. Finally, the central loss function is used to assist feature training of the model, so as to reduce the difference of feature distribution within the class and make the learned features easier to be classified and recognized. The experimental results show that, compared with other algorithms, the improved deep convolution driver seat belt identification model in this paper improves the recognition accuracy, recall rate, and F value by 6.9%, 4.32 and 5.5% respectively, and greatly improves the accuracy and practicability.
{"title":"Seatbelt Recognition Method Based on Convolutional Attention Mechanism","authors":"Guangxi Chen, Fangfang Lv, Yijun Zhan, Yong Huang","doi":"10.1109/CCET48361.2019.8989308","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989308","url":null,"abstract":"In order to solve the problem of low accuracy of the driver's seat-belt identification and neglecting co-pilot, a method of driver's seat-belt identification based on deep convolutional channel modeling is improved. Firstly, the characteristic parameters of redundant channels are reduced by means of deep convolutional feature channel compression. Then, the feature weight of the deep convolutional channel is re-calibrated to improve the attention weight of the feature of the safety belt and suppress the expression of the interference feature. Finally, the central loss function is used to assist feature training of the model, so as to reduce the difference of feature distribution within the class and make the learned features easier to be classified and recognized. The experimental results show that, compared with other algorithms, the improved deep convolution driver seat belt identification model in this paper improves the recognition accuracy, recall rate, and F value by 6.9%, 4.32 and 5.5% respectively, and greatly improves the accuracy and practicability.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131033093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8988946
Jinghui Chen, Chen Dong, Fan Zhang, Guorong He
As the core component of the electronic devices, the integrated circuit (IC) must be taken seriously with its security. The pre-silicon detection methods do not require gold chips, are not affected by process noise and are suitable for the safe detection of a very large scale integration (VLSI). Therefore, more and more researchers are paying attention to the pre-silicon detection method. In this paper, we propose a machine-learning-based hardware-Trojans detection method in gate-level. First, by the analysis of the Trojan circuits, we put forward new Trojan-net features. After that, we use the scoring mechanism of the eXtreme Gradient Boosting (XGBoost) to set up a new effective feature set of 49 out of 56 features. Finally, the hardware-Trojan classifier was trained based on the effective feature set. The experimental results show that the proposed method can obtain the average Recall of 89.84%, the average F-measure of 87.75% and the average Accuracy of 99.83%. Furthermore, through the comparison experiments, it is proved that the features proposed in this paper can further improve the performance of detection.
{"title":"A Hardware-Trojans Detection Approach Based on eXtreme Gradient Boosting","authors":"Jinghui Chen, Chen Dong, Fan Zhang, Guorong He","doi":"10.1109/CCET48361.2019.8988946","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8988946","url":null,"abstract":"As the core component of the electronic devices, the integrated circuit (IC) must be taken seriously with its security. The pre-silicon detection methods do not require gold chips, are not affected by process noise and are suitable for the safe detection of a very large scale integration (VLSI). Therefore, more and more researchers are paying attention to the pre-silicon detection method. In this paper, we propose a machine-learning-based hardware-Trojans detection method in gate-level. First, by the analysis of the Trojan circuits, we put forward new Trojan-net features. After that, we use the scoring mechanism of the eXtreme Gradient Boosting (XGBoost) to set up a new effective feature set of 49 out of 56 features. Finally, the hardware-Trojan classifier was trained based on the effective feature set. The experimental results show that the proposed method can obtain the average Recall of 89.84%, the average F-measure of 87.75% and the average Accuracy of 99.83%. Furthermore, through the comparison experiments, it is proved that the features proposed in this paper can further improve the performance of detection.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130303215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/ccet48361.2019.8989010
{"title":"CCET 2019 Cover Page","authors":"","doi":"10.1109/ccet48361.2019.8989010","DOIUrl":"https://doi.org/10.1109/ccet48361.2019.8989010","url":null,"abstract":"","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128451429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989202
Syed Jahanzeb Hussain Pirzada, A. Murtaza, M. N. Hasan, Tongge Xu, Jianwei Liu
The advancements in communication technology have evolved the algorithms used for communication security. Recently, the Authenticated Encryption (AE) algorithms are employed for providing security services for data communication. The Advanced Encryption Standard in Counter mode (AES-CTR) with Cipher-block Chaining Message authentication code (AES-CCM) algorithm is used for providing the data security for various applications. But the AES-CCM algorithm provides limited throughput for data communication. Therefore, in this work, new architecture is proposed for increase in throughput for provision of data security for communication application. The proposed algorithm uses the AES-CTR algorithm with the Cipher-based Message Authentication Code (CMAC) algorithm for providing AE. The proposed AE algorithm is implemented on FPGA and it’s compared with the FPGA implementation of AES-CCM algorithm. The comparison results of the proposed algorithm and the AES-CCM algorithm shows that the proposed algorithm provides improvement in the consumption of the area, processing time, and throughput. The implementation of proposed AES-CMAC AE algorithm on FPGA provides a throughput of 4.30 Gbps.
随着通信技术的进步,用于通信安全的算法也在不断发展。近年来,为了为数据通信提供安全服务,采用了AE (Authenticated Encryption)算法。采用计数器模式高级加密标准AES-CTR (Advanced Encryption Standard in Counter)和密文块链消息认证码AES-CCM算法,为各种应用提供数据安全保障。但是AES-CCM算法对数据通信的吞吐能力有限。因此,本文提出了一种新的架构,以提高吞吐量,为通信应用提供数据安全。该算法采用AES-CTR算法和基于密码的消息认证码(CMAC)算法提供AE。提出的声发射算法在FPGA上实现,并与AES-CCM算法的FPGA实现进行了比较。将该算法与AES-CCM算法进行比较,结果表明该算法在面积消耗、处理时间和吞吐量方面都有改善。提出的AES-CMAC AE算法在FPGA上的实现提供了4.30 Gbps的吞吐量。
{"title":"The Implementation of AES-CMAC Authenticated Encryption Algorithm on FPGA","authors":"Syed Jahanzeb Hussain Pirzada, A. Murtaza, M. N. Hasan, Tongge Xu, Jianwei Liu","doi":"10.1109/CCET48361.2019.8989202","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989202","url":null,"abstract":"The advancements in communication technology have evolved the algorithms used for communication security. Recently, the Authenticated Encryption (AE) algorithms are employed for providing security services for data communication. The Advanced Encryption Standard in Counter mode (AES-CTR) with Cipher-block Chaining Message authentication code (AES-CCM) algorithm is used for providing the data security for various applications. But the AES-CCM algorithm provides limited throughput for data communication. Therefore, in this work, new architecture is proposed for increase in throughput for provision of data security for communication application. The proposed algorithm uses the AES-CTR algorithm with the Cipher-based Message Authentication Code (CMAC) algorithm for providing AE. The proposed AE algorithm is implemented on FPGA and it’s compared with the FPGA implementation of AES-CCM algorithm. The comparison results of the proposed algorithm and the AES-CCM algorithm shows that the proposed algorithm provides improvement in the consumption of the area, processing time, and throughput. The implementation of proposed AES-CMAC AE algorithm on FPGA provides a throughput of 4.30 Gbps.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115892296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}