ieee cuet sb members in one frame · ieee cuet sb members in one frame photo courtesy: salamat...
TRANSCRIPT
IEEE CUET SB Members in One Frame
Photo Courtesy: Salamat Ullah
Page 01
Prof. Dr. Mohammed Moshiul Hoque
Professor & Head, Dept. CSE
Chittagong University of Engineering & Technology
Prof. Dr. Mahmud Abdul Matin Bhuiyan
Professor, Dept. of EEE
Dean, Faculty of Electrical & Computer Engineering
Chittagong University of Engineering & Technology
Prof. Dr. Faruque-Uz-Zaman Chowdhury
Registrar,
Chittagong University of Engineering & Technology
“There’s no other substitution than hard work to overcome all the
hurdles along the path toward the success. And I know, you will make
it there. Really proud of IEEE CUET SB and best wishes for the coming
years.”
Prof. Dr. Mohammad Rafiqul Alam
Vice-Chancellor
Chittagong University of Engineering & Technology
Messages
My heartiest congratulations to IEEE CUET SB members for their
tremendous enthusiasm and also for their activities of IEEE CUET SB. I
truly believe that our SB members can take the activities of IEEE CUET
SB to a different level. Wishing you all the best.
All the best wishes to IEEE CUET SB. I believe that the student members
of the branch are very much hard working and capable of overcoming
all hurdles on the way to reach their academic and professional success.
I am very much impressed by the tremendous interest and enthusiasm of
the students by participating in all events organized by IEEE SB CUET. I
wish them all the best for the upcoming years.
Page 02
Prof. Dr. Quazi Delwar Hossain
Councilor, IEEE CUET SB
Chittagong University of Engineering & Technology
Our campus is very much delighted with the activities done by the
IEEE SB CUET and the interests of the students are quite impressive. I
wish them a very good luck and shining future.
Prof. Dr. Sajal Chandra Banik
Professor & Head, Dept. of Mechanical Engineering
Chittagong University of Engineering & Technology
I would like to encourage all the student member to participate in all
IEEE sponsored activities & wish all the good luck to IEEE SB CUET
for their retention & escalation of success.
Messages
Dr. Md Ahsanullah
Professor
Chittagong University of Engineering & Technology
IEEE CUET Student Branch is doing splendid activity to celebrate IEEE
Day 2016. Their enthusiasm reflects on their activities. I’m wishing
them a very best of luck.
Page 03
Mehdi Hasan Chowdhury
Mentor, IEEE SB CUET
Chittagong University of Engineering & Technology
Dr. Md. Azad Hossain
Co-councilor, IEEE SB CUET
Chittagong University of Engineering & Technology
I am very much delighted to see the student members of IEEE SB CUET
organizing different technical events and has reached a whole different level.
I wish them all the success for this great initiative that the branch has taken.
It is a great pleasure to witness the creative activities of IEEE SB CUET. I wish
them all the best for the upcoming events.
Page 04
Contents
1. IEEE CUET SB-EXECUTIVE BODY 06
2. Events Through 2016 09
3. Project Corner 13
4. Research Corner 14
5. Review Articles
16
Page 05
Bikash Kumar Bhowmick
Shubroto Bhowmick
Farzana Farid Nitol
IEEE CUET SB-EXECUTIVE BODY -
2016
E.M.K. Ikball Ahmed Abdur Noor Tushar
Arnab Basu Parash Chakma
Kanchon Kanti Podder
Md. Mushfiqur Rahman Shovon
Page 06
Page 07
Hasib-Al-Rashid
Avro Bhattacharya
Asif Siddique
Md. Asifur Rahman
Shafkat Islam
Md. Kamrul Hasan
Rodoshi Zakaria Urbi Md. Hasib Fakir
IEEE CUET SB-EXECUTIVE BODY -
2016
Kamrul Huda
Fazle Rabby
Sajan Das Atish Bhattacharjee
Page 08
Maisha Haque Sabrina Abedin Naznin Akther
Prabal Krishna Saha Tabassum Mahmud Adnan Basir Fahim Ruhi
Abir Sabbir Ahmed Shubho Nishako Chakma Antora Dev
Umme Kulsum Rubaya Absar Rahat Amin Saleha Fatema
IEEE CUET SB-EXECUTIVE BODY -
2016
IEEE Student Branch, CUET
organized “EEG SIGNAL
BASED ROBOT
CONTROLLING USING SVM”
On 8th of March 2016, IEEE SB CUET organized EEG Signal
based robot controlling using SVM. EEG signal has many
applications like biomedical, prosthesis control, robot control
and so on.
The purpose of this research is to analyze the EEG signal and
control a robot to move forward, backward, left and right
based on the variation in brain wave.
The first step is to classify the EEG signal using offline pattern recognition and the second step is to use online or real
time pattern recognition.
Machine Learning Algorithm Chosen: Support Vector Machine (SVM)
Signal Processing Platform: Wavelet analysis, Empirical Mode Decomposition (EMD)
Data from EEG headset successfully received in Smartphone and PC.
MARCH '16
Activity Throughout 2016
Page 09
June '16
July '16
On June 8, IEEE SB CUET organized “Presentation
Skill Development Program” at Mechanical
Seminar Room of Chittagong University of
Engineering & Technology. This was the first
session of two phase program of skill
development. The total number of participants
was 40 and the main speaker of that program was
Safayet Arefin Fahim, who was the champion of
‘Banglalink Grand master IDEA contest’.
The councilor of IEEE SB CUET, Prof Dr. Quazi Delwar Hossain, Head of the Dept. of ETE, made the inauguration of the program. In the main part of event, Safayet Arefin Fahim started with his experience throughout the total competition then made his speech on process of poster presentation and how to boost an idea on the larger scale of competition. In the concluding part of the program, Parash Chakma, the program coordinator of IEEE SB CUET & winner of “Huawei- Seeds for the Future” competition shared his experience in Idea competition & showed some preparation demo for an idea competition.
Page 10
"GRE: Key to Funded
Admission in USA"
In collaboration with GRE Center Chittagong, IEEE SB
CUET organized the program “GRE: Key to Funded
Admission in USA” with a view to motivate students for
higher studies. Our honorable Vice-chancellor Prof. Dr.
Rafiqul Alam made the inaugural speech. He mentioned
the process and aim of higher studies in a brief.
Dr. Quazi Delwar Hossain , the instructor of the program shared a few words with participants. In the main
part of the program, three instructors from GRE Center made their session. They enlightened the participants
with the total examination process of GRE. Then they made a Q&A. session with a PHD student in USA over
SKYPE. And the participants cheerfully took part in this session. This program was concluded by the founder of
GRE Center Chittagong Sourav Mustafa , another PhD student studying in USA.
Presentation Skill
Development (Enhancement Session
1: ‘IDEA Competition’)
IEEE SB CUET organized
“Online Workshop on PCB
Design”
With 15 online participants (all of them are IEEE members)
IEEE SB CUET arranged “Online Workshop on PCB Design” at
Simulation Lab, ECE building CUET on 28th of July. The
founder & CEO of Planeter Ltd Bangladesh Rini Ehsan Khusbu
conducted the workshop online. This session was started
with the basic of PCB design.
She conducted the session with great care and made this session
helpful by giving task to compile on spot. It was an hour long
workshop for beginners.
Then Nursadul Mamun(Lecturer, Department of ETE) took his part in the session and described the process to get
started as a researcher and the final goal of a researcher. The most of the part of his speech was inspirational and
motivated. He also explained how a person can develop their presentation skill.
In the last part of the session, Prof. Dr. Asaduzzaman(Department of CSE) drew the attention of the participants by
describing the bright future in networking research. He briefly explained the every promising sectors on his part of
research talk. The Student Branch of IEEE SB CUET Kanchon Kanti Podder concluded the program by giving souvenir
to the speakers.
Presentation Skill
Development (Enhancement Session 1:
‘Research Experience) On 25th of July, IEEE SB CUET organized Presentation Skill
Development (enhancement Session 1: ‘Research Experience)”
at WEST GALLERY, CUET. In the inauguration, Dr. Sajal Chandra
Banik (Head, Dept. of ME) discussed the various field of research
in ROBOTICS arena. In his total time of speech, he delivered the
useful details on ROBOTICS research. He also presented his PhD
research on ROBOTICS to inspire the participants. Md. Shah Jalal
Misuk (Lecturer, Dept. of URP) described about presentation skill
development of beginners.
Page 11
IEEE Student Branch CUET will organize a
workshop on “Robotic Vision”
On 25th August, 2016, IEEE CUET Student Branch
organized a workshop on “ROBOTIC VISION”. Robotic
vision is a kind of Artificial intelligence to provide
designed robots or systems a vision power to observe
environment and take decisions independently. Using
Camera or some passives devices (ex. Ultrasonic
sensors) provides a detail of the surrounding and
processes the information which can be useful in
autonomous robots as well as security purposes.
The total participants were over seventy. This
workshop was taken by Rini Ehsan Khusboo. The
participants were provided certificate after the
workshop.
July '16
Page 12
Project Corner
TRAFFIC UPDATE-THE TIME SAVER
Mohammed Shahriar Arefin
Currently I am working on a project to make an android app which will provide it’s users real time
information about traffic condition of an area or route. We know that traffic jam is a daily
occurrence in our life. It can be caused either by huge traffic or natural hazards. Road blockages due
to development works are also responsible for traffic jam. It kills our valuable time. Sometimes, it is
possible to avoid jam by taking alternative routes to reach a destination but we don’t know whether
the routes we are using are affected or not.
But this problem can be solved by the app in which real time information can be seen. The
information about traffic conditions will be provided by the registered users of the app and traffic
control rooms. The app will use Google map for showing traffic conditions of an area or route. If an
user double tap on the map a pop-up screen will appear. Users can give location data by pinning a
location in the map. In this screen users can give information about traffic condition. Users can
select from given options to determine the severity of jam. Severity of jam will be determined
according to duration and length of the jam affected route. There will be additional options in which
an user can add some additional information such as-condition of the road (damaged or not), road
blockage (caused either by natural hazards or development works).By collaborating all these
information from various users the app will show which roads are jam effected or not. If an user
choose his destination from his position the app will show the routes which are less affected by
traffic jam and can be used to reach the destination. By using these data one can reach his
destination in a less troublesome way.
Voice commanded English and Bangla Keyboard Eftekhar Hossain
Project category: Software
Introduction: Software technology has been developed tremendously over the years. It makes
easier the communication between people over the world. People use voice and writing messages
as a protocol of communication. Different types of keyboard apps are used for messaging or
chatting where people can write their messages in any language. But if a keyboard can write
Page 13
messages without typing only by using your voice word then it will be a great keyboard that helps
people those are not able to use their hand or eyes.
Project Feature: This keyboard app could write voice word or
sentence.
It could write both Bangla and English
sentence.
It repeats the word or sentence by a voice sound which helps to ensure blind people that their speaking message and generating message in keyboard are same or not.
Idea Behind on Project: 1. The main scheme is every human voice word generate an electrical analog signal where signal must be different for respective word.
2. If these analog signals are calculated and generate their Digital signal by using ADC then a app
could be established by using proper algorithm.
Conclusion: The idea of the project is actually helpful for blind people and those people who are not able to use
their hand. For them the idea tries to developed a voice commanded system where all system is
running by a voice word.
Nano-electronics is one of the words which may give you a feeling that the topic is very hard and
boring which is may not be true in all sense. Today I will try my best to explain what is Nano-
electronics, why Nano-electronics and in conclusion why I gave this article that name. I will try my
best to make all this as simple as possible, in which I can fail like a lot of things I have failed before.
But if you think you have learned something from this article that will be only because of your
patience and eagerness to learn something.
So let’s begin with the word “Nano-electronics”. As you can guess Nano-electronics is made up of
two words “Nano” and “Electronics”. “Nano” means nanometer which is a very small unit of
measurement of length (or width or height). So how small is a nanometer? If you hold a human hair
with your two fingers (thumb and index finger of your same hand), the distance between your two
fingers will be maximum 100 micrometers. 1 nanometer (nm) is even hundred thousand (100,000)
times less than that distance. So, trust me it’s a very small size. Now let's come to “Electronics”
which we very well know what it is. So, now instead of asking “What is electronics?”, the question
Page 14
Research Corner Nano-electronics: The Future
Minhaz Ibna Abedin
should be “What is not electronics?” because almost everything that we are using to make our life
easier is electronics, from cell phones, computer, television to ATM machine, satellite etc
.
Figure: Conventional MOSFET Structure (Left), Intel’s new wrapped gated 3D MOSFET (Right)
So now you can ask me the question- “Why Nano-electronics?” Then before answering first I will
ask you these questions - “What cell phones could do 10 years ago and what they can do now? How
a “phone” became “Smart-phone”? What is making the phone “Smart”? ” The answer will be the
main thing that is making possible these changes is the “processor” which is like a brain compared
to a human body. So, with the same size of the device that you had ten years ago, you are now able
to browse the internet, writing, taking pictures and processing them etc. So now the question is
“How the processors are getting better without getting bigger or making the device (your cell
phone) bigger?”
Now we have come almost to the point. Like “Buildings” are made of “Bricks”, “Processors” are
made of “MOSFETs” (Metal Oxide Semiconductor Field Effect Transistor, don’t be bothered by this
scary name, it has nothing to do with the things I am explaining). The more “MOSFETs” you use in a
processor, the more powerful your “Processor” becomes (may vary, but almost true with this
current technology). Now, to keep your cell phone in the same size and to increase the processing
power, you have to put more “MOSFETs” in the same size processor. How is that possible? Simple,
you just have to make the “MOSFETs” smaller. In 1984 the length (which is the most important
feature of a MOSFET) of the MOSFETs were around 1 μm (micrometer), currently, Intel (arguably
the largest manufacturers of processors) is making the MOSFETs of length 22 nm. But how far
miniaturization can be done?
Below 10nm things get complicated because then we will reach almost the size of a singleatom. In
sub 10 nm (below 10 nm), quantum effects get
important and change the behavior of MOSFET. Yes, I
wrote “Quantum”? Now you will be saying be, “Hey you
said it will be an easy article, now you are making it a
complicated one.” Ok, I am stopping here but let me
simplify that first, when we are trying to make
MOSFETs smaller it’s not giving the behavior that made
it a building block of processors (as per latest research).
So we are now entering a new era of electronics, era of
Nanoe-lectronics. We have to change, may be a bit or a
lot, but we have to change for sure. Intel changed the
structure of MOSFETs a little bit (for advanced readers- 3D MOSFETs with wrapped gate for 22 nm
MOSFETs). HP (Hewlett-Packard) one of the largest manufacturing company, is doing research on
replacing the whole idea of MOSFET with Memristors (for advanced readers- Resistor with
Page 15
Figure: Memristor in comparison with
Resistor, Inductor and Capacitor. (Figure
from wikipedia)
memory) [this is what I am guessing reading their recent publications of the project “The Machine”]
and planning to bring the computer to market within few years. Still a lot of researches are going on
changing the idea of MOSFET as a building block or to change the material of it (for advanced
readers- From Silicon to Molybdenum Disulfide, Silicene etc). No doubt Nano-electronics is the
future of electronics, and like the definition of “future”, it’s something that we don’t know yet what
it will come with.
For getting better life and less effort in life, energy must needed. Energy Sources are fossil fuel,
nuclear and renewable sources. Almost all the energy are consumed today from fossil fuels. Energy
from fossil fuels are taking through burning of them. The more we burn fossil fuel, the more fossil
fuel finished. Moreover, burning of fossil fuel produce greenhouse gas. To solve the crisis in energy
and save the environment, green energy is the only solution. Green energy are solar energy, wind
energy, bio-energy etc. Due to limited source of bio-energy and wind is not feasible in maximum
places, solar energy is the only solution of crisis in energy and save the environment. Solar is
feasible in almost all the area in the world. Solar energy are two types solar thermal and solar
photovoltaic. Solar thermal system use the heat from the sun where solar photovoltaic use the
photovoltaic action in solar cell. What is photovoltaic? Photons of higher energy than energy band
gap of solar cell are absorbed in solar cell. The absorption of solar energy create electron and hole
which create flow electricity outside the solar cell. The output of each solar cell approximately 0.8 V
and 30 mA. But how this small energy solve problem of our huge energy demand? The answer is
very simple, using of several solar cell. By connecting these cell we get our desired voltage and
current. Even GW of electricity now produce from solar cell by connecting each other.
But now a question will bring into mind, how many lands solar cells needed? The answer is only
few non-cultivable land can supply the energy. Moreover the rooftop of buildings, surroundings of
Page 16
Review Article
Solar: The Future and Green energy
Shubrata Bhowmik
buildings can use for solar cells placement. Even windows of buildings can be use for solar cells
placement. Solar energy can used in vehicle. The first solar family car was built in 2013 by
students in the Netherlands.
But there is one question remain, how we used energy in night or rainy day? By reserving energy or
by connecting all the solar power plant in the world in a grid the problem can be solved. The cost of
solar energy is little bit greater than the energy from fossil fuel. But for solving the energy crisis and
saving environment Researches are going to decrease the cost and increasing the efficiency of solar
cell.
“Seeing is believing”, an old proverb, shows the importance of visual perception in human life.
There were two major theories in ancient Greek regarding visual perception. One of the two:
“Emission Theory”, led by Euclid and Ptolemy, and another is “Intromission Theory” championed by
scholars like Aristotle and Galen. According to “Emission Theory”, the objects hit by the light rays
emitted from eyes create human perception. The “Intromission” theory believed that something
entering in eyes representative of the object. Later Ibn Al-Haytham refined the intromission theory
by modern theories . In his book “Book of Optics”, Al-Haytham defines light as the reason for visual
perception. Through the advancement of technology man replicated the idea of visual perception to
digital imaging.
“Pix” and “El” of the word “Pixel” derives
from “Picture” and “Element” respectively.
Pixel is the fundamental portion of an
image sensor. An image sensor is the
device which takes picture frames. In a
frame there are arrays of pixels each of
which generates voltage/current
according to the level of illumination. The
output of each pixel is read out and
converted from analogue to digital. The converted digital signal is then process by signal processing
unit. Then the processed signal is sent or stored via digital interface.
Page 17
A SELF-ADJUSTING LIN-LOG ACTIVE PIXEL FOR
WIDE DYNAMIC RANGE CMOS IMAGE SENSOR
Dr. Quazi Delwar Hossain
Minhaz Ibna Abedin
Figure: Basic block diagram of CMOS Image Sensor
Till 1990s Charge Coupled Devices (CCD) dominated the image sensor markets. But with the
advantage of low cost CMOS (Complementary metal–oxide–semiconductor) fabrication process
CMOS image sensors have become a viable solution for consumer electronics like camera, video
camera, surveillance camera etc,
machine vision like in robotics,
automated vehicle as well as in
research applications. Though
CMOS image sensors have low
cost, low power consumption and
high on chip functionality, CMOS
image sensors still suffers in
dynamic range.
According to in-pixel circuitry,
CMOS image sensors are of three
kinds: Passive Pixel Sensor (PPS),
Active Pixel Sensor (APS) and Digital Pixel Sensor (DPS). PPS has only one transistor to readout
from the pixel, whereas APS uses few (around 3-7) transistors for readout. DPS includes
comparator even Analog to Digital Converter (ADC) which increases the number of transistors in
pixel. As number of transistors in pixel increase, it reduces the fill factor. As APS has higher fill
factor, APS is widely used in consumer electronics. In this project, previous researches were studied
for understanding the methods for extending dynamic range. Most techniques for widening
dynamic range involve in-pixel processing which in turn reduces the fill factor. One of the
techniques for extending dynamic range without decreasing fill factor is to introduce logarithmic
response.
Though logarithmic APS has better response in high illumination, it suffers in low light illumination.
Hence combination of linear and logarithmic response increases the dynamic range. Many
approaches have been proposed to combine linear logarithmic response but these techniques
involve either in-pixel circuitry or external analog signal both of which increases the pixel
complexity. In this project, a self-adjusting Lin-Log APS has been proposed to increase the dynamic
range.
The proposed pixel has been simulated in Cadence Virtuoso using CMOS 180nm technology node.
The analysis of the proposed pixel shows a dynamic range of 160dB which is wider in comparison
with standard 3T linear and 3T logarithmic APS. The layout of the pixel was designed maintaining
Design Rules of 180nm technology node which shows a fill factor of 45%.
1.Abstract The world is becoming increasingly digital space. Today we manage, share and store our life online and data’s are gathered from our computers, televisions and smart-phones. All the data from the
Page 18
Figure: Basic components of a Pixel.
BIG DATA-The Next Frontier Of Innovation and
Quantum Encryption To Consolidate Big Data Environment
In The Cloud Walia Farzana
beginning of the time till 2000’s is less than now we create in a minute. This phenomenon transform our understanding of the world and our place and it is becoming known as Big Data. Therefore, a cloud computing model is needed that captures a rich class of big data use-cases and allows reasoning about relevant threads and security goals and quantum cryptographic approach can be used to achieve the goals. . In future, light which has same quantum properties will be the best approach because people can see only light not the data. 2.Introduction We awash in a flood of data today. In board range of application areas, data is being collected at unprecedented scale. Decisions that were previously based on guesswork, or on painstakingly constructed models of reality, can now be based on the data itself. Enhancement of security and privacy in mobile data centres is challengeable with efficient security key management .Based on the recent research ,estimate suggested that 2.5 zettabytes (2.5*10^21 bytes) of information handled in 2012.Quantum cryptography seems to be enhance the security and privacy with less complexity. Data Commission(2012) There are three V’s –Volume refers to the magnitude of data. Variety refers to the structural heterogeneity in a datasheet. Velocity refers to the rate at which data is generated and the speed at which it should be analyzed and acted upon. Cloud computing is a method of providing a set a shared computing resources that include applications, computing storage ,networking, development and deployment platforms ,as well as business processes. Cloud computing turns traditional computing assets into shared pools of resources based on an underlying Internet foundation. A popular example of the benefits of cloud supporting big data can be noted as both Google and Amazon.com. Both companies depend on the capability to manage massive amounts of data to move their businesses forward. Such Big Data analysis now nearly drives every aspects of our modern society, including mobile services ,retail, manufacturing, financial services, life sciences, and physical sciences. While the potential benefits of Big Data are real and significant ,they remain some technical challenges that must be addressed to fully realize the data. The privacy of data is one of them and that increases in the context of big data. There are many additional challenging research problems .For example, we do not yet know yet how to share public data while limiting disclosure and ensuring sufficient data utility in the shared data. The existing paradigm of differential privacy is very important step in the right direction, but it unfortunately reduces information content too far in order to be useful in most practical cases. In addition, real data is not static but gets larger and changes over time. 3.Body Cloud Computing has become the tool of choice for big-data processing and analytics due to reduced cost, board network access, elasticity, resource pooling and measured service. However, Cloud Computing comes with risks. The shared compute infrastructure introduces many security concerns not present in more traditional computing architecture. The cloud provider and tenants may be unreliable entities to try to tamper with data storage and computation. These concerns motivate the need for a novel framework for analyzing cloud computing security ,as well as the cryptographic tools to encrypt cloud computing security goals. In today’s data-centric world ,big-data processing and analytics have become critical to most enterprise and government applications. Thus there is a need for an appropriate big-data infrastructure that supports storage and processing on a massive scale. Cloud Computing enables consumers to store and analyze their data using shared computing resources while easily handling fluctuations in the volume and velocity of data . Thereby, after integrating data’s if they are being encrypted that may provide security to concealed data which can be decoded by the only one user or permitted ones. Why Quantum Cryptography? The quantum properties of light can be exploited to send secret messages. Light has wavelike
Page 19
properties and the waves can be aligned or polarized in any direction unlike LASER which ispolarized in one direction. Lasers can be used to produce photons with a given polarization. Suppose, the following example will use photon polarized vertically, horizontally, at 45 degrees and 135 degrees, denoted |, , / and \. A calcite crystal can be used as quantum filter. If the crystal is held in vertical position, photons that are vertically polarized (| or )will pass through the filter unchanged. If a photon is diagonally polarized (/or \) passes through the vertical filter, however, the polarization will be changed to vertical or horizontal (| or )in totally random fashion. Thus ,information is lost if the crystal is not aligned correctly, depending on the polarization of the upcoming photon. That is why it is difficult to steal a quantum message without detection. Following is an example of how polarized photons can be used to distribute keys, first proposed by Bennett and Brassard in 1984.In this example Alia will send a key to Aman, while an eavesdropper named Eve tries to intercept the message. Alia first encodes the key into a string of ones and zeros. She can choose from one of two polarizations for each one or zero. It is important to note that Alia will use the “ “ and “/” polarizations randomly to code the zeros and likewise | and / polarizations randomly for ones. Thus the binary string “01” could be coded as |, \,/| or /\.If Alia sends a one as a vertically polarized photon, and Eve measures it with titled crystal the result Eve gets will be useless because she measured it wrong. The binary stringsent is ‘100100011’.
For each photon Alia sends, Aman chooses at random measurement type: either with the crystal vertical or slanted. The vertical crystal, which will correctly pass the vertical or horizontally polarized photons, is also known as a rectilinear measurement and designed as “+”.Aman can also tilt the crystal at a 45 or 135-degree angle, which will pass the correspondingly angled photons. This orientation is also called a diagonal measurement designed as “ “ . If Aman measures a vertical or horizontal photon with a rectilinear measurement, as mentioned in the beside diagram,his measurement will be correct. In the second measurement above Aman made the
wrong measurement and the 45-degree photon will come through the crystal randomly either a horizontal or vertical photon. Thus, the information for the second bit that Alia sends is irretrievably lost. The next step is for Aman to publicly to allow which measurements he made(not the results of the measurements) .Alia publicly tells Aman for which photon he made the correct type of measurement. The correct measurements are
below: Aman keeps all the results for which he has made the correct measurement and discards the rest. The ones and zeros are left will contain secret information and privacy will be maintained.
Page 20
Why Quantum Cryptography is Secure? Theoretically, messages sent using quantum cryptography would be in unknown quantum state that cannot be copied and an attempt to measure quantum state would disturb the system. The effects produced by measuring a quantum property are irreversible, which means an eavesdropper can not “put back” a quantum message to its original state. It is as if I mail a book to a friend, and someone in the post office opens the package and reads the book, and all the letters become scrambled and the book is rendered unreadable and it can be seen someone broke into the package. That is why quantum cryptography is so useful in distributing the keys used to encrypt messages. Conclusion Quantum cryptographic technique can give a good starting point for secure cloud computing, further research is needed to turn into practical solutions that can achieve secure cloud computing in the world. The field of quantum encryption is so new that more thought and research has into producing quantum transmissions. In summary, quantum techniques should meet the encryption needs of users, perhaps indefinitely.
Page 21