Pub Date : 2017-02-01DOI: 10.1109/ECACE.2017.7912996
S. M. Salam, M. J. Uddin, Saif Hannan
In modern days, residential and commercial users use various types of loads most of which produce huge harmonics. Though most of the people are using more energy efficient power equipment's due to high costing of electric power consumption, but they have a little concern on power quality. A comprehensive study is required to find out the evaluation of the effects of the nonlinear loads of different combination on the overall power quality of a distributed network. There are different indices for power quality that would be maintained in utilities to ensure harmless operation of the power supply network including generators, transmission lines and transformers. In this paper, our focus is to develop an integrated load model that can dynamically adopt different types of loads so that we can conclude theoretically on the power quality parameters on any combination of load.
{"title":"A new approach to develop a template based load model that can dynamically adopt different types of non-linear loads","authors":"S. M. Salam, M. J. Uddin, Saif Hannan","doi":"10.1109/ECACE.2017.7912996","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912996","url":null,"abstract":"In modern days, residential and commercial users use various types of loads most of which produce huge harmonics. Though most of the people are using more energy efficient power equipment's due to high costing of electric power consumption, but they have a little concern on power quality. A comprehensive study is required to find out the evaluation of the effects of the nonlinear loads of different combination on the overall power quality of a distributed network. There are different indices for power quality that would be maintained in utilities to ensure harmless operation of the power supply network including generators, transmission lines and transformers. In this paper, our focus is to develop an integrated load model that can dynamically adopt different types of loads so that we can conclude theoretically on the power quality parameters on any combination of load.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134408172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ECACE.2017.7912938
B. Pal, Mahit Kumar Paul
Dataset with imbalanced class distribution used to abate classification performance for most of the standard classifier learning algorithms. Moreover, some application area consists of scarcity of labeled training data where clustering is most prominent way to support classification process. Gaussian Mixture Model (GMM) being able to approximate arbitrary probability distribution, is a dominant tool for classification in such cases by means of clustering. An ensemble approach is presented in this paper considering GMM as a weak learner to boost the GMMs in a semi supervised manner via Adaptive Boosting technique. This paper, firstly investigates how much K-means and GMM suffers from uneven class distribution in data. Later experiment on benchmark imbalanced datasets with different imbalance ratio and over sampled datasets using Synthetic Minority Over-sampling Technique (SMOTE) has been carried out for proposed approach. For each case cluster forest has been used as an attribute selection technique. Efficacy of the proposed Boosted GMM approach compared to standard clustering approaches like K means and GMM is exhibited from empirical analysis.
{"title":"A Gaussian mixture based boosted classification scheme for imbalanced and oversampled data","authors":"B. Pal, Mahit Kumar Paul","doi":"10.1109/ECACE.2017.7912938","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912938","url":null,"abstract":"Dataset with imbalanced class distribution used to abate classification performance for most of the standard classifier learning algorithms. Moreover, some application area consists of scarcity of labeled training data where clustering is most prominent way to support classification process. Gaussian Mixture Model (GMM) being able to approximate arbitrary probability distribution, is a dominant tool for classification in such cases by means of clustering. An ensemble approach is presented in this paper considering GMM as a weak learner to boost the GMMs in a semi supervised manner via Adaptive Boosting technique. This paper, firstly investigates how much K-means and GMM suffers from uneven class distribution in data. Later experiment on benchmark imbalanced datasets with different imbalance ratio and over sampled datasets using Synthetic Minority Over-sampling Technique (SMOTE) has been carried out for proposed approach. For each case cluster forest has been used as an attribute selection technique. Efficacy of the proposed Boosted GMM approach compared to standard clustering approaches like K means and GMM is exhibited from empirical analysis.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133114904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ECACE.2017.7912924
Saila Ishrat Annie, K. M. Salim, Zaima Tasneem, Mohammad Rejwan Uddin
This paper proposes the design of an efficient zero voltage switching parallel quasi resonant inverter for small scale industrial and domestic applications using solar energy as the dc input and induction heating technology. The resonant inverter is designed using PSIM software and the designed model is verified using the PROTEUS software which operates for a frequency around 20KHz under ZVS condition for different equivalent heating workpiece resistance. The resonant frequency can be varied over a range by altering the duty cycle values. The detail design of the resonant inverter using PSIM and PROTEUS along with the simulation results of ZVS condition and data analysis are presented in this paper.
{"title":"Frequency analysis of a ZVS parallel quasi resonant inverter for a solar based induction heating system","authors":"Saila Ishrat Annie, K. M. Salim, Zaima Tasneem, Mohammad Rejwan Uddin","doi":"10.1109/ECACE.2017.7912924","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912924","url":null,"abstract":"This paper proposes the design of an efficient zero voltage switching parallel quasi resonant inverter for small scale industrial and domestic applications using solar energy as the dc input and induction heating technology. The resonant inverter is designed using PSIM software and the designed model is verified using the PROTEUS software which operates for a frequency around 20KHz under ZVS condition for different equivalent heating workpiece resistance. The resonant frequency can be varied over a range by altering the duty cycle values. The detail design of the resonant inverter using PSIM and PROTEUS along with the simulation results of ZVS condition and data analysis are presented in this paper.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122859644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ECACE.2017.7912964
Jeenat Sultana, Tasnuva Ahmed
Mobile Adhoc Network (MANET) is comprised of mobile nodes where each mobile node acts as both router and terminal. While acting as a router a reliable routing protocol is chosen ensuring the packet to reach its destination and an agent is responsible for the transmission of packet while acting as a terminal. In this paper, we implemented secure packet transmission in mobile adhoc network (MANET) through Adhoc On Demand Multipath Distance Vector (AOMDV) routing protocol. AOMDV, a multipath extension of AODV (Adhoc On Demand Distance Vector) routing protocol, is more reliable than its parent protocol, though not completely restraint from attacks. To keep the packets secure in an adversary environment with multiple attackers is the main objective. Elliptic Curve Cryptography (ECC) has been chosen to secure the packets against blackhole attack. Elliptic Curve Cryptography provides security with smaller key size compared to other public-key encryption. We configured three different types of environment using NS-2.35 which is a discrete event network simulator; a secure environment without malicious activity, a hostile environment with blackhole attackers and with ECC implementation by the agent and analyzed their performance.
移动自组网(MANET)由多个移动节点组成,每个移动节点同时充当路由器和终端。当作为路由器时,选择可靠的路由协议以确保数据包到达目的地,代理作为终端时负责数据包的传输。在本文中,我们通过adhoc按需多路径距离矢量(AOMDV)路由协议实现了移动自组网(MANET)中的安全分组传输。AOMDV是AODV (Adhoc On Demand Distance Vector)路由协议的多路径扩展,它比它的父协议更可靠,尽管不能完全防止攻击。在有多个攻击者的敌对环境中保持数据包的安全是主要目标。选择椭圆曲线加密(ECC)来保护数据包免受黑洞攻击。与其他公钥加密相比,椭圆曲线加密以更小的密钥大小提供安全性。我们使用离散事件网络模拟器NS-2.35配置了三种不同类型的环境;在没有恶意活动的安全环境、有黑洞攻击者的敌对环境和代理实现ECC的环境下,分析了它们的性能。
{"title":"Securing AOMDV protocol in mobile adhoc network with elliptic curve cryptography","authors":"Jeenat Sultana, Tasnuva Ahmed","doi":"10.1109/ECACE.2017.7912964","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912964","url":null,"abstract":"Mobile Adhoc Network (MANET) is comprised of mobile nodes where each mobile node acts as both router and terminal. While acting as a router a reliable routing protocol is chosen ensuring the packet to reach its destination and an agent is responsible for the transmission of packet while acting as a terminal. In this paper, we implemented secure packet transmission in mobile adhoc network (MANET) through Adhoc On Demand Multipath Distance Vector (AOMDV) routing protocol. AOMDV, a multipath extension of AODV (Adhoc On Demand Distance Vector) routing protocol, is more reliable than its parent protocol, though not completely restraint from attacks. To keep the packets secure in an adversary environment with multiple attackers is the main objective. Elliptic Curve Cryptography (ECC) has been chosen to secure the packets against blackhole attack. Elliptic Curve Cryptography provides security with smaller key size compared to other public-key encryption. We configured three different types of environment using NS-2.35 which is a discrete event network simulator; a secure environment without malicious activity, a hostile environment with blackhole attackers and with ECC implementation by the agent and analyzed their performance.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124064415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ECACE.2017.7912997
Md. Ahasan Kabir, M. Mondal
In the digital world, the size of images is an important challenge when dealing with the storage and transmission requirements. Compression is one of the fundamental techniques to address this problem. A number of transform based compression techniques are discussed in the literature and some are used in practice. In this paper, we propose an edge-based image transformation method which will be used with an entropy encoding technique to greatly reduce image size without loss in content. In the first stage of the proposed transform scheme, the intensity difference of neighboring pixels is calculated in the horizontal or vertical direction depending on the presence of a horizontal or vertical edge. In the second stage, the intensity differences are used to form two matrixes — one containing the absolute intensity difference and the other having the polarity of the differences. Next, Huffman or Arithmetic entropy coding is applied on the generated matrixes. The proposed edge-based transformation and entropy coding (ETEC) scheme is compared to the existing lossless compression techniques: Joint Photographic Experts Group Lossless (JPEG-LS) and Set Partitioning in Hierarchical Trees (SPIHT). Simulation results show that the proposed ETEC scheme can provide better compression compared to JPEG-LS and SPIHT algorithms for pixelated images that are used for data communication between a computer screen and a camera.
{"title":"Edge-based transformation and entropy coding for lossless image compression","authors":"Md. Ahasan Kabir, M. Mondal","doi":"10.1109/ECACE.2017.7912997","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912997","url":null,"abstract":"In the digital world, the size of images is an important challenge when dealing with the storage and transmission requirements. Compression is one of the fundamental techniques to address this problem. A number of transform based compression techniques are discussed in the literature and some are used in practice. In this paper, we propose an edge-based image transformation method which will be used with an entropy encoding technique to greatly reduce image size without loss in content. In the first stage of the proposed transform scheme, the intensity difference of neighboring pixels is calculated in the horizontal or vertical direction depending on the presence of a horizontal or vertical edge. In the second stage, the intensity differences are used to form two matrixes — one containing the absolute intensity difference and the other having the polarity of the differences. Next, Huffman or Arithmetic entropy coding is applied on the generated matrixes. The proposed edge-based transformation and entropy coding (ETEC) scheme is compared to the existing lossless compression techniques: Joint Photographic Experts Group Lossless (JPEG-LS) and Set Partitioning in Hierarchical Trees (SPIHT). Simulation results show that the proposed ETEC scheme can provide better compression compared to JPEG-LS and SPIHT algorithms for pixelated images that are used for data communication between a computer screen and a camera.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128769830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ECACE.2017.7912918
Md. Ibrahim Ibne Alam, Md. Farhad Hossain
Successful wireless communications in underwater with high throughput possess a great challenge still today. Due to the unique environment in underwater, medium access protocols (MAC) for terrestrial networks are not suitable for such environment. High attenuation of electromagnetic (EM) wave in water makes acoustic wave a more appropriate choice for communication in underwater. However, the low available bandwidth, high propagation delays and spatial-temporal uncertainty of the nodes make the MAC protocols with acoustic channel a vast area for research. In this paper, we propose a novel multi-channel MAC protocol for underwater sensor networks (UWSNs) employing both acoustic and EM waves. The proposed MAC protocol has a single EM based control channel which is used for managing the node data transmission times and confirmation messages. On the other hand, multiple acoustic channels are used as the data communication channels. In the proposed protocol, time division multiple access (TDMA) technique is used for control channel to prevent any collision between control signals of the nodes. Because of the nature of zero collision in the control channel, the whole MAC scheme remains in a collision-less state. Extensive simulations are carried out for evaluating the performance of the proposed MAC protocol demonstrating its validity.
{"title":"A TDMA based EM controlled multi-channel MAC protocol for underwater sensor networks","authors":"Md. Ibrahim Ibne Alam, Md. Farhad Hossain","doi":"10.1109/ECACE.2017.7912918","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912918","url":null,"abstract":"Successful wireless communications in underwater with high throughput possess a great challenge still today. Due to the unique environment in underwater, medium access protocols (MAC) for terrestrial networks are not suitable for such environment. High attenuation of electromagnetic (EM) wave in water makes acoustic wave a more appropriate choice for communication in underwater. However, the low available bandwidth, high propagation delays and spatial-temporal uncertainty of the nodes make the MAC protocols with acoustic channel a vast area for research. In this paper, we propose a novel multi-channel MAC protocol for underwater sensor networks (UWSNs) employing both acoustic and EM waves. The proposed MAC protocol has a single EM based control channel which is used for managing the node data transmission times and confirmation messages. On the other hand, multiple acoustic channels are used as the data communication channels. In the proposed protocol, time division multiple access (TDMA) technique is used for control channel to prevent any collision between control signals of the nodes. Because of the nature of zero collision in the control channel, the whole MAC scheme remains in a collision-less state. Extensive simulations are carried out for evaluating the performance of the proposed MAC protocol demonstrating its validity.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114370613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ECACE.2017.7913023
Md. Shahriare Satu, Tania Akter, Md. Jamal Uddin
Protein localization prediction is computation approach to predict where a protein resides in a cell. Accurate localization of proteins is needed to provide physiological substance for their function and aberrant localization of protein causes pathogenesis of various human diseases. E.Cott and Yeast are unicellular organism and different proteins allocate in their cell. If those protein are dislocated, then these causes various infections that affected human body adversely. So, the objective of this work is to classify proteins into different cellular localization sites based on amino acid sequences of E.Coli bacterium and Yeast In this experiment, we collect dataset of E.Coli and Yeast from data repository and preprocessed it for further processing. Then we train our dataset with several data mining classification algorithms and artificial neural networks. After classifying both dataset, we compare accuracies among different classifiers and try to find best classifiers for Protein localization sites prediction of E.Coli and Yeast dataset.
{"title":"Performance analysis of classifying localization sites of protein using data mining techniques and artificial neural networks","authors":"Md. Shahriare Satu, Tania Akter, Md. Jamal Uddin","doi":"10.1109/ECACE.2017.7913023","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7913023","url":null,"abstract":"Protein localization prediction is computation approach to predict where a protein resides in a cell. Accurate localization of proteins is needed to provide physiological substance for their function and aberrant localization of protein causes pathogenesis of various human diseases. E.Cott and Yeast are unicellular organism and different proteins allocate in their cell. If those protein are dislocated, then these causes various infections that affected human body adversely. So, the objective of this work is to classify proteins into different cellular localization sites based on amino acid sequences of E.Coli bacterium and Yeast In this experiment, we collect dataset of E.Coli and Yeast from data repository and preprocessed it for further processing. Then we train our dataset with several data mining classification algorithms and artificial neural networks. After classifying both dataset, we compare accuracies among different classifiers and try to find best classifiers for Protein localization sites prediction of E.Coli and Yeast dataset.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114445414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ECACE.2017.7912978
Md. Imran Khan, Md. Ahasan Kabir, A. Hira
This paper proposes a compact (46×50×0.16 mm3) multiband patch antenna for Wi-Fi, WiMAX, WLAN and satellite applications. The antenna consists of three I shape, two L shape and one F shape patch. The length of the patches and the thickness of Fr-4 substrate are varied to find out the optimized dimensions at which antenna gives the best performance. The antenna has three significant frequency bands having bandwidth of 500MHz (2.10–2.60GHz), 2.80GHz (3.02–5.82GHz) and 2.50GHz (7.00–9.50GHz). The proposed antenna maintains same radiation characteristics for all of the supported frequency bands. For all frequencies the antenna input impedance is matched with 50 Ω feeder lines. The antenna is simulated using CST Microwave Studio software. The simulated VSWR, reflection coefficient, radiation patterns, directivity, half power beamwidth (HPBW), realized peak gains and radiation efficiency of the antenna are presented.
{"title":"A simple multiband patch antenna for application in wireless communication","authors":"Md. Imran Khan, Md. Ahasan Kabir, A. Hira","doi":"10.1109/ECACE.2017.7912978","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912978","url":null,"abstract":"This paper proposes a compact (46×50×0.16 mm3) multiband patch antenna for Wi-Fi, WiMAX, WLAN and satellite applications. The antenna consists of three I shape, two L shape and one F shape patch. The length of the patches and the thickness of Fr-4 substrate are varied to find out the optimized dimensions at which antenna gives the best performance. The antenna has three significant frequency bands having bandwidth of 500MHz (2.10–2.60GHz), 2.80GHz (3.02–5.82GHz) and 2.50GHz (7.00–9.50GHz). The proposed antenna maintains same radiation characteristics for all of the supported frequency bands. For all frequencies the antenna input impedance is matched with 50 Ω feeder lines. The antenna is simulated using CST Microwave Studio software. The simulated VSWR, reflection coefficient, radiation patterns, directivity, half power beamwidth (HPBW), realized peak gains and radiation efficiency of the antenna are presented.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127159750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ECACE.2017.7913010
Nure Alam Md. Risalat, M. T. Hasan, Md. Shahadat Hossain, M. Rahman
Radio Frequency Identification (RFID) Technology is growing popular in wireless communications. It can be used easily for security purposes using authentication protocol. In the literature, researchers proposed different types of RFID based authentication protocols to ensure security and privacy. RFID technology is used in IoT (Internet of things) for real time authentication like access control in offices, homeland security, and transportation and also in defense and sensitive medical organizations. In this paper we proposed a hash based mutual authentication protocol that can dynamically update secret key value between tag and the reader. This protocol is secure and immune to different kinds of attacks.
{"title":"Advanced real time RFID mutual authentication protocol using dynamically updated secret value through encryption and decryption process","authors":"Nure Alam Md. Risalat, M. T. Hasan, Md. Shahadat Hossain, M. Rahman","doi":"10.1109/ECACE.2017.7913010","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7913010","url":null,"abstract":"Radio Frequency Identification (RFID) Technology is growing popular in wireless communications. It can be used easily for security purposes using authentication protocol. In the literature, researchers proposed different types of RFID based authentication protocols to ensure security and privacy. RFID technology is used in IoT (Internet of things) for real time authentication like access control in offices, homeland security, and transportation and also in defense and sensitive medical organizations. In this paper we proposed a hash based mutual authentication protocol that can dynamically update secret key value between tag and the reader. This protocol is secure and immune to different kinds of attacks.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128057350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ECACE.2017.7912990
Fatema Akhter, Md. Selim Al Mamun
The pseudo random binary sequence plays an important role in cryptography and network security system. This paper proposes a new approach to pseudo random binary sequence over finite field and evaluates some important properties of the newly generated sequence. The sequence is generated by applying a primitive polynomial over finite field, trace function and modified mobius function. Then period, autocorrelation, cross-correlation and linear complexity properties of the generated sequence have been presented in this paper. Finally, the proposed sequence is analyzed on various bit length of odd characteristics of field and compared with some existing works. The comparison results show the superiority of the proposed approach over existing works in terms of its properties.
{"title":"Pseudo random binary sequence: A new approach over finite field and its properties","authors":"Fatema Akhter, Md. Selim Al Mamun","doi":"10.1109/ECACE.2017.7912990","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912990","url":null,"abstract":"The pseudo random binary sequence plays an important role in cryptography and network security system. This paper proposes a new approach to pseudo random binary sequence over finite field and evaluates some important properties of the newly generated sequence. The sequence is generated by applying a primitive polynomial over finite field, trace function and modified mobius function. Then period, autocorrelation, cross-correlation and linear complexity properties of the generated sequence have been presented in this paper. Finally, the proposed sequence is analyzed on various bit length of odd characteristics of field and compared with some existing works. The comparison results show the superiority of the proposed approach over existing works in terms of its properties.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128118099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}