BES Journal

Journal
2012
Strong Message Authentication and Confidentiality Checking Approach through Authentication Code Tied to Ciphertext
Sydul Islam Khan , Md. Alamgir Kabir , Anisur Rahman Md. Ismail Jabiullah and M. Lutfar Rahman
Message Authentication and confidentiality checking of the message are very much demanding issues in various aspects for current secured electronic transactions. A strong message authentication and confidentiality checking technique has been designed, developed and implemented using Java programming language. To do this, message is encrypted with a secret key K1 that produces message authentication code (MAC), concatenate it with the message and again encrypted them with another secret key K2 and again encrypted the output with key K1 that builds the ciphertext that is to be sent to the destination. In the receiving end, first perform decryption with the secret key K1 and then again decrypts the output with the secret key K2 that produces the message and the MAC of the message, and then decrypts the message only to produce message authentication code MAC’; and compare the new MAC’ with received message authentication code MAC that ensures the authentication of the message. Here, key values ensure the strong authentication and also confidentiality of the communicating message. It can be applied where higher-level security services of the communicating messages are needed.
Download
A Comparative Study on Different Routing Protocols of Ad-Hoc Network over user Datagram Protocol
Rahat Hossain Faisal , A. N. M. T. Islam , Md. Tarek Habib and Farruk Ahmed
It is a common goal in the research on future communication is to reduce the communication cost and time. To make the wireless communication cost effective researchers are looking forward for successful implementation of an infrastructure less network like Mobile Ad Hoc Network. But still it is a challenge to decide a most appropriate routing protocol for MANET. Due to the mobility of nodes, interference, multipath propagation and path loss there is no fixed topology in MANET. Since MANET does not use fixed infrastructure rather it always have to find suitable router and routing path for each communication, existing established routing protocol is not suitable for MANET to function properly. Different Routing protocols have been proposed to meet the challenges with MANETs. This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR and TORA over user datagram protocol, a Transport Layer Protocol. This paper considered packet delivery fractions, normalized routing overload, end to end delay and throughput as performance metrics.
Download
Improved Block Cipher-based Secured Message Transactions
Md. Monowar Hossain , Sydul Islam Khan , Md. Anisur Rahman , Md. Ismail Jabiullah and M. Lutfar Rahman
An improved encryption-decryption process based on enhanced cipher block chaining mode has been designed, developed and implemented for secured message transactions. For this, the plain text message is chopped into different blocks of equal lengths of n bits based on the length of the processing blocks. The 1st block of plaintext P1 is initially XORed with an initial vector (IV) and its output is encrypted with a shared secret key K which produces an intermediate cipher text C1’. The output C1’ is used as an initial vector (IV) for the second block of plaintext message P2. The cipher text C1’ is again encrypted with the initial vector (IV) that produces the final cipher text block C1 for the first block of the plain text message P1. The second block of plaintext message P2 is initially XORed with the intermediate cipher text C1’ produced in the first block encryption process. This encrypted result is again encrypted with a shared secret key K to produce an intermediate cipher text C2’ for the second block of plaintext message P2. The output cipher text C2’ is again encrypted with the cipher text C1 which is generated from the first block and to produce the cipher text C2 for the second block of plaintext P2. Continuing this process, all the cipher texts are produced from different blocks of plaintext. The final cipher text C is to be sent along with the initial vector IV and shared secret key K to the destination. In the receiving end, the decryption process is performed with the same initial vector (IV) and shared secret key received from the sender for retrieving the plaintext from the cipher text C. It can be applied where a higher-level security service of the communicating message is needed.
Download
Analysis of Mono-Static Radar Performance Under Active ECM
Mohammed Hossam-E-Haider
ECM plays a vital role in aerial combat which dictates the results of modern warfare. Without ECM, attacking aircrafts would never be able to mask their movements from the target/victim radar. The main goal of this paper is to analyse only the active ECM techniques and their effects on radar range. In this regard, self protection ECM and support ECM were considered and their effects on the cross-over range and the burn-through range were simulated using MATLAB. From the results their dependency on the jammer peak power is identified. Thereafter, the mathematical definition of the range reduction factor (RRF) is presented and the effects of ECM on RRF are thoroughly investigated. Generated results emphasize on the use of controlled active ECM for optimum effect on radar performance.
Download
Design of a Solar Tracking System
Md. Taslim Arefin, Md. Fayzur Rahman, Golam Mowla Choudhury Md. H. Rahman and Md. M. Monjur
The transformation efficiency of solar energy into electrical energy depends upon the tilt angle of the solar panel. So the fixed-type solar panel cannot utilize the optimal solar energy, the transformation efficiency of solar energy is limited. Many different light source sensors, light intensity sensors, intelligent vision techniques, and CCD equipments were applied to compute the absorption time of the sun radiation over the whole day for measuring the volume of solar energy. In this paper, the main goal is to design and implement a solar tracking system so that the solar cells always face the sun over the whole day time. Using LDRs as sensing devices and making the motor move in the direction of more dominating voltage signal outputted by the LDR. Therefore rotating in the direction of maximum sunlight it will increase the efficiency to capture maximum solar power from the sun.
Download
Linearly Chirped Fiber Bragg Grating Based Temperature, Strain and Pressure Sensors
Sher Shermin Azmiri Khan
Fiber Bragg grating (FBG) sensors are one of the most exciting developments in the field of optical fiber sensors in recent years. Compared with conventional fiber-optic sensors, FBG sensors have an umber of distinguishing advantages. In this paper the basic characteristics and the fundamental properties of strain, temperature and pressure sensor based on linearly chirped FBG (LCFBG) are described. The change of applied strain with the temperature has also been studied to obtain zero shifts of Bragg wavelength for enhancing the performance of FBGs.
Download
Probe-Fed Rectangular Microstrip Patch Antenna Using Crystal Substrate for Wideband Applications
N. Akter and M. A. Matin
In this paper, a new microstrip rectangular patch antenna is proposed for wideband applications which can achieve a bandwidth of 2.2 GHz. The crystal ‘gallium arsenide’ is used as the dielectric substrate material of the proposed design. The radiation pattern and return loss obtained from simulation show a good impedance matching across the operating band.
Download
The Effect of Smoothing Coefficient (ξ) on the Performance Analysis of Alpha-beta-gamma (αβγ) Filter in Radar Tracking
Mohammed Hossam-E-Haider, Md. Saiduzzaman, Nazmul Rahim and Asif Al Faisal
The details of αβγ filter, a constant coefficient sophisticated smoothing and prediction tracking filter has been demonstrated. The filter is used in sampled data target trackers which can asymptotically track a constant acceleration target. As a polynomial predictor linear recursive filter it can reconstruct position, velocity and constant acceleration based on position measurements. An important sub-class of αβγ filter is critically damped filter. In this case, the gain coefficients of this filter are chosen on the basis of a smoothing coefficient (ξ). The effect of changing smoothing coefficient for the cases of fast and slow maneuvering targets with and without noise variation factor is observed. Tracker performance is assessed for aforementioned cases on the basis of minimizing the residual error. The optimum range of smoothing coefficient is proposed which results in higher accuracy in tracking.
Download
Nuclear PET Sensitivity Study using a 68-Ge Line Source
M. M. Ahasan, M. N. Khanam, A. S. Alaamer, M. J. Abedin, R. Khatun and S. Akter
An experimental study of sensitivity was carried out with a newly designed prototype nuclear PET camera having a transaxial field-of-view of 20cm. The goal is to see the scanner detection performance of coincidence events produced in positron-electron annihilation. Coincidence data were acquired in 2D mode using a 68-Ge line source with an activity of 0.4 MBq. The direct plane sensitivity measured as approximately 9% lower than the cross plane except a few end planes. The sensitivity observed in the end planes is anomalously low probably the line source did not extend fully into these planes. By summing counts from all planes, the overall absolute sensitivity was also measured as 8.2 ±0.4 cps/kBq at the centre, 8.7±0.4 cps/kBq at the 5cm off- axis and 9.5±0.4 cps/kBq at the 10cm off-axis. The sensitivity increases slightly as the source is moved off-axis.
Download
Design and Development of a Microcontroller Based Dedicated Counting Device for Mosquito Larvae and Pupae
Nusrat Jahan, M. G. S. Islam, M.M.Rashid, M. Aliuzzaman and F. Ahmed
A Custom designed Microcontroller based dedicated electronic counting device for mosquito larvae and pupae has been designed and developed for the Institute of Food and Radiation Biology (IFRB), BAEC. A dedicated mosquito detector comprised with a glass tube, LEDs and LDRs, has been designed and developed indigenously. When mosquito larvae/pupae are passed through the glass tube, by a pumping device, electrical pulses are generated from the detector. The electrical pulses are then amplified to the TTL level before the counting process. PIC 16F84 has been programmed intending to control overall counting procedure and to display the counting up to 999 mosquitoes through a 7 segment display unit. The device will be used to collect and count the desired numbers of mosquito pupae or larvae from larval colony for insect biotechnology research work. The microcontroller controlled counting device will replace manual time consuming process with better accuracy.
Download
Carrier Conduction Time Delay Model in Subthreshold Regime of Pocket Implanted Nano Scale n-MOSFET
Muhibul Haque Bhuyan, Fouzia Ferdous and Quazi D. M. Khosru
In this paper, an analytical carrier conduction time delay model in subthreshold regime of the symmetric pocket implanted nano-scaled n-MOSFET has been presented. The model is developed using the inversion layer charge and subthreshold drain current model for pocket implanted n-MOSFET. The model incorporates the linear pocket profiles symmetric both at the source and drain sides. The linear profiles are then converted into the effective doping concentration by mathematical integration along the channel. Electron current density per unit area is obtained from the conventional drift-diffusion equation in the subthreshold regime. Then inversion channel charge density per unit area is calculated for the pocket doped channel. Thus conduction time delay is found in the subthreshold regime. The simulation is carried out for different pocket profile and device parameters as well as for various bias voltages. The results show that the derived model can produce the conduction delay time in subthreshold regime that can be utilized to study and characterize the pocket implanted advanced ULSI devices.
Download
Improvement of Positioning Accuracy of WAAS
Mohammed Hossam-E-Haider and Shafkat Jamil Saadi
Satellite based augmentation system (SBAS) is a more accurate method of navigation than the GPS especially in case of precision approach. In various region of the world SBAS system is at the phase of implementation. It is must be mention that both WAAS and GPS or in other worlds satellite navigation is not liberated from error. In this paper the details of ionosphere and troposphere error, which are the most affective causes of error, have been discussed. Among GPS and WAAS the influence of ionosphere and troposphere is more on the earliest one. To overcome the ionosphere error of GPS, WAAS is a better method of navigation. But For future navigation method dual frequency ranging will play a vital role for standalone navigation as the ionosphere delay can be calculated by the user himself by using dual frequency. A brief discussion about L1, L2 and L5 frequency has been highlighted. It may be mentioned that the combination of any of these two frequencies makes dual frequency. In this paper it is also shown that how L1/L5 dual frequency is better than the other options.
Download
A Competitive Performance Analysis Between Virtual Access Point and Traditional Access Point in Terms of Number of Clients
Mohammad Ruhul Amin Biswas, Erfan Khaled Syfullah, Md. Zahirul Islam Mohammad Salek Parvez and Md. Mirza Golam Rashed
WiFi is becoming a very popular technology now a days as a means of broadband wireless access. Hotspots which are running on very typical Access Points are widely used in the whole world to fulfill the demand of modern civilization .A number of new ideas have already been developed to replace the traditional WiFi Access Points with new technologies. This paper presents a clear performance comparison between a traditional access point and a virtual access point in terms of data transfer rate with respect to number of clients. Experimental result shows that Virtual Access Point always provides a pretty better data rate for all cases of different numbers of users.
Download
Comparative Analysis of Wavelet Based Image Compression Techniques
Mahmudul Hasan , A.K.M Fazlul Haque , Moheuddin Ahmed and Mohammed Nadir Bin Ali
This paper presents the comparative analysis of different wavelet based image compression techniques. The existing techniques, WDR, ASWDR, STW, SPHIT, and EZW have been discussed and evaluated based on the parameters like PSNR, MSE, and BPP. Acceptable image quality has been extracted in terms of the performance parameter and coding technique. The result is extracted from the experiment empirically and shows that the EZW and STW technique performs better then WDR and other methods in terms of the parameters. The analysis has been tested and verified Using MATLAB.
Download
Search
Side Widget
You can put anything you want inside of these side widgets. They are easy to use, and feature the new Bootstrap 4 card containers!