ieee cuet sb members in one frame · ieee cuet sb members in one frame photo courtesy: salamat...

22

Upload: others

Post on 29-Mar-2020

14 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all
Page 2: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

IEEE CUET SB Members in One Frame

Photo Courtesy: Salamat Ullah

Page 01

Page 3: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

Prof. Dr. Mohammed Moshiul Hoque

Professor & Head, Dept. CSE

Chittagong University of Engineering & Technology

Prof. Dr. Mahmud Abdul Matin Bhuiyan

Professor, Dept. of EEE

Dean, Faculty of Electrical & Computer Engineering

Chittagong University of Engineering & Technology

Prof. Dr. Faruque-Uz-Zaman Chowdhury

Registrar,

Chittagong University of Engineering & Technology

“There’s no other substitution than hard work to overcome all the

hurdles along the path toward the success. And I know, you will make

it there. Really proud of IEEE CUET SB and best wishes for the coming

years.”

Prof. Dr. Mohammad Rafiqul Alam

Vice-Chancellor

Chittagong University of Engineering & Technology

Messages

My heartiest congratulations to IEEE CUET SB members for their

tremendous enthusiasm and also for their activities of IEEE CUET SB. I

truly believe that our SB members can take the activities of IEEE CUET

SB to a different level. Wishing you all the best.

All the best wishes to IEEE CUET SB. I believe that the student members

of the branch are very much hard working and capable of overcoming

all hurdles on the way to reach their academic and professional success.

I am very much impressed by the tremendous interest and enthusiasm of

the students by participating in all events organized by IEEE SB CUET. I

wish them all the best for the upcoming years.

Page 02

Page 4: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

Prof. Dr. Quazi Delwar Hossain

Councilor, IEEE CUET SB

Chittagong University of Engineering & Technology

Our campus is very much delighted with the activities done by the

IEEE SB CUET and the interests of the students are quite impressive. I

wish them a very good luck and shining future.

Prof. Dr. Sajal Chandra Banik

Professor & Head, Dept. of Mechanical Engineering

Chittagong University of Engineering & Technology

I would like to encourage all the student member to participate in all

IEEE sponsored activities & wish all the good luck to IEEE SB CUET

for their retention & escalation of success.

Messages

Dr. Md Ahsanullah

Professor

Chittagong University of Engineering & Technology

IEEE CUET Student Branch is doing splendid activity to celebrate IEEE

Day 2016. Their enthusiasm reflects on their activities. I’m wishing

them a very best of luck.

Page 03

Page 5: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

Mehdi Hasan Chowdhury

Mentor, IEEE SB CUET

Chittagong University of Engineering & Technology

Dr. Md. Azad Hossain

Co-councilor, IEEE SB CUET

Chittagong University of Engineering & Technology

I am very much delighted to see the student members of IEEE SB CUET

organizing different technical events and has reached a whole different level.

I wish them all the success for this great initiative that the branch has taken.

It is a great pleasure to witness the creative activities of IEEE SB CUET. I wish

them all the best for the upcoming events.

Page 04

Page 6: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

Contents

1. IEEE CUET SB-EXECUTIVE BODY 06

2. Events Through 2016 09

3. Project Corner 13

4. Research Corner 14

5. Review Articles

16

Page 05

Page 7: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

Bikash Kumar Bhowmick

Shubroto Bhowmick

Farzana Farid Nitol

IEEE CUET SB-EXECUTIVE BODY -

2016

E.M.K. Ikball Ahmed Abdur Noor Tushar

Arnab Basu Parash Chakma

Kanchon Kanti Podder

Md. Mushfiqur Rahman Shovon

Page 06

Page 8: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

Page 07

Hasib-Al-Rashid

Avro Bhattacharya

Asif Siddique

Md. Asifur Rahman

Shafkat Islam

Md. Kamrul Hasan

Rodoshi Zakaria Urbi Md. Hasib Fakir

IEEE CUET SB-EXECUTIVE BODY -

2016

Kamrul Huda

Fazle Rabby

Sajan Das Atish Bhattacharjee

Page 9: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

Page 08

Maisha Haque Sabrina Abedin Naznin Akther

Prabal Krishna Saha Tabassum Mahmud Adnan Basir Fahim Ruhi

Abir Sabbir Ahmed Shubho Nishako Chakma Antora Dev

Umme Kulsum Rubaya Absar Rahat Amin Saleha Fatema

IEEE CUET SB-EXECUTIVE BODY -

2016

Page 10: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

IEEE Student Branch, CUET

organized “EEG SIGNAL

BASED ROBOT

CONTROLLING USING SVM”

On 8th of March 2016, IEEE SB CUET organized EEG Signal

based robot controlling using SVM. EEG signal has many

applications like biomedical, prosthesis control, robot control

and so on.

The purpose of this research is to analyze the EEG signal and

control a robot to move forward, backward, left and right

based on the variation in brain wave.

The first step is to classify the EEG signal using offline pattern recognition and the second step is to use online or real

time pattern recognition.

Machine Learning Algorithm Chosen: Support Vector Machine (SVM)

Signal Processing Platform: Wavelet analysis, Empirical Mode Decomposition (EMD)

Data from EEG headset successfully received in Smartphone and PC.

MARCH '16

Activity Throughout 2016

Page 09

Page 11: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

June '16

July '16

On June 8, IEEE SB CUET organized “Presentation

Skill Development Program” at Mechanical

Seminar Room of Chittagong University of

Engineering & Technology. This was the first

session of two phase program of skill

development. The total number of participants

was 40 and the main speaker of that program was

Safayet Arefin Fahim, who was the champion of

‘Banglalink Grand master IDEA contest’.

The councilor of IEEE SB CUET, Prof Dr. Quazi Delwar Hossain, Head of the Dept. of ETE, made the inauguration of the program. In the main part of event, Safayet Arefin Fahim started with his experience throughout the total competition then made his speech on process of poster presentation and how to boost an idea on the larger scale of competition. In the concluding part of the program, Parash Chakma, the program coordinator of IEEE SB CUET & winner of “Huawei- Seeds for the Future” competition shared his experience in Idea competition & showed some preparation demo for an idea competition.

Page 10

"GRE: Key to Funded

Admission in USA"

In collaboration with GRE Center Chittagong, IEEE SB

CUET organized the program “GRE: Key to Funded

Admission in USA” with a view to motivate students for

higher studies. Our honorable Vice-chancellor Prof. Dr.

Rafiqul Alam made the inaugural speech. He mentioned

the process and aim of higher studies in a brief.

Dr. Quazi Delwar Hossain , the instructor of the program shared a few words with participants. In the main

part of the program, three instructors from GRE Center made their session. They enlightened the participants

with the total examination process of GRE. Then they made a Q&A. session with a PHD student in USA over

SKYPE. And the participants cheerfully took part in this session. This program was concluded by the founder of

GRE Center Chittagong Sourav Mustafa , another PhD student studying in USA.

Presentation Skill

Development (Enhancement Session

1: ‘IDEA Competition’)

Page 12: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

IEEE SB CUET organized

“Online Workshop on PCB

Design”

With 15 online participants (all of them are IEEE members)

IEEE SB CUET arranged “Online Workshop on PCB Design” at

Simulation Lab, ECE building CUET on 28th of July. The

founder & CEO of Planeter Ltd Bangladesh Rini Ehsan Khusbu

conducted the workshop online. This session was started

with the basic of PCB design.

She conducted the session with great care and made this session

helpful by giving task to compile on spot. It was an hour long

workshop for beginners.

Then Nursadul Mamun(Lecturer, Department of ETE) took his part in the session and described the process to get

started as a researcher and the final goal of a researcher. The most of the part of his speech was inspirational and

motivated. He also explained how a person can develop their presentation skill.

In the last part of the session, Prof. Dr. Asaduzzaman(Department of CSE) drew the attention of the participants by

describing the bright future in networking research. He briefly explained the every promising sectors on his part of

research talk. The Student Branch of IEEE SB CUET Kanchon Kanti Podder concluded the program by giving souvenir

to the speakers.

Presentation Skill

Development (Enhancement Session 1:

‘Research Experience) On 25th of July, IEEE SB CUET organized Presentation Skill

Development (enhancement Session 1: ‘Research Experience)”

at WEST GALLERY, CUET. In the inauguration, Dr. Sajal Chandra

Banik (Head, Dept. of ME) discussed the various field of research

in ROBOTICS arena. In his total time of speech, he delivered the

useful details on ROBOTICS research. He also presented his PhD

research on ROBOTICS to inspire the participants. Md. Shah Jalal

Misuk (Lecturer, Dept. of URP) described about presentation skill

development of beginners.

Page 11

Page 13: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

IEEE Student Branch CUET will organize a

workshop on “Robotic Vision”

On 25th August, 2016, IEEE CUET Student Branch

organized a workshop on “ROBOTIC VISION”. Robotic

vision is a kind of Artificial intelligence to provide

designed robots or systems a vision power to observe

environment and take decisions independently. Using

Camera or some passives devices (ex. Ultrasonic

sensors) provides a detail of the surrounding and

processes the information which can be useful in

autonomous robots as well as security purposes.

The total participants were over seventy. This

workshop was taken by Rini Ehsan Khusboo. The

participants were provided certificate after the

workshop.

July '16

Page 12

Page 14: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

Project Corner

TRAFFIC UPDATE-THE TIME SAVER

Mohammed Shahriar Arefin

Currently I am working on a project to make an android app which will provide it’s users real time

information about traffic condition of an area or route. We know that traffic jam is a daily

occurrence in our life. It can be caused either by huge traffic or natural hazards. Road blockages due

to development works are also responsible for traffic jam. It kills our valuable time. Sometimes, it is

possible to avoid jam by taking alternative routes to reach a destination but we don’t know whether

the routes we are using are affected or not.

But this problem can be solved by the app in which real time information can be seen. The

information about traffic conditions will be provided by the registered users of the app and traffic

control rooms. The app will use Google map for showing traffic conditions of an area or route. If an

user double tap on the map a pop-up screen will appear. Users can give location data by pinning a

location in the map. In this screen users can give information about traffic condition. Users can

select from given options to determine the severity of jam. Severity of jam will be determined

according to duration and length of the jam affected route. There will be additional options in which

an user can add some additional information such as-condition of the road (damaged or not), road

blockage (caused either by natural hazards or development works).By collaborating all these

information from various users the app will show which roads are jam effected or not. If an user

choose his destination from his position the app will show the routes which are less affected by

traffic jam and can be used to reach the destination. By using these data one can reach his

destination in a less troublesome way.

Voice commanded English and Bangla Keyboard Eftekhar Hossain

Project category: Software

Introduction: Software technology has been developed tremendously over the years. It makes

easier the communication between people over the world. People use voice and writing messages

as a protocol of communication. Different types of keyboard apps are used for messaging or

chatting where people can write their messages in any language. But if a keyboard can write

Page 13

Page 15: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

messages without typing only by using your voice word then it will be a great keyboard that helps

people those are not able to use their hand or eyes.

Project Feature: This keyboard app could write voice word or

sentence.

It could write both Bangla and English

sentence.

It repeats the word or sentence by a voice sound which helps to ensure blind people that their speaking message and generating message in keyboard are same or not.

Idea Behind on Project: 1. The main scheme is every human voice word generate an electrical analog signal where signal must be different for respective word.

2. If these analog signals are calculated and generate their Digital signal by using ADC then a app

could be established by using proper algorithm.

Conclusion: The idea of the project is actually helpful for blind people and those people who are not able to use

their hand. For them the idea tries to developed a voice commanded system where all system is

running by a voice word.

Nano-electronics is one of the words which may give you a feeling that the topic is very hard and

boring which is may not be true in all sense. Today I will try my best to explain what is Nano-

electronics, why Nano-electronics and in conclusion why I gave this article that name. I will try my

best to make all this as simple as possible, in which I can fail like a lot of things I have failed before.

But if you think you have learned something from this article that will be only because of your

patience and eagerness to learn something.

So let’s begin with the word “Nano-electronics”. As you can guess Nano-electronics is made up of

two words “Nano” and “Electronics”. “Nano” means nanometer which is a very small unit of

measurement of length (or width or height). So how small is a nanometer? If you hold a human hair

with your two fingers (thumb and index finger of your same hand), the distance between your two

fingers will be maximum 100 micrometers. 1 nanometer (nm) is even hundred thousand (100,000)

times less than that distance. So, trust me it’s a very small size. Now let's come to “Electronics”

which we very well know what it is. So, now instead of asking “What is electronics?”, the question

Page 14

Research Corner Nano-electronics: The Future

Minhaz Ibna Abedin

Page 16: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

should be “What is not electronics?” because almost everything that we are using to make our life

easier is electronics, from cell phones, computer, television to ATM machine, satellite etc

.

Figure: Conventional MOSFET Structure (Left), Intel’s new wrapped gated 3D MOSFET (Right)

So now you can ask me the question- “Why Nano-electronics?” Then before answering first I will

ask you these questions - “What cell phones could do 10 years ago and what they can do now? How

a “phone” became “Smart-phone”? What is making the phone “Smart”? ” The answer will be the

main thing that is making possible these changes is the “processor” which is like a brain compared

to a human body. So, with the same size of the device that you had ten years ago, you are now able

to browse the internet, writing, taking pictures and processing them etc. So now the question is

“How the processors are getting better without getting bigger or making the device (your cell

phone) bigger?”

Now we have come almost to the point. Like “Buildings” are made of “Bricks”, “Processors” are

made of “MOSFETs” (Metal Oxide Semiconductor Field Effect Transistor, don’t be bothered by this

scary name, it has nothing to do with the things I am explaining). The more “MOSFETs” you use in a

processor, the more powerful your “Processor” becomes (may vary, but almost true with this

current technology). Now, to keep your cell phone in the same size and to increase the processing

power, you have to put more “MOSFETs” in the same size processor. How is that possible? Simple,

you just have to make the “MOSFETs” smaller. In 1984 the length (which is the most important

feature of a MOSFET) of the MOSFETs were around 1 μm (micrometer), currently, Intel (arguably

the largest manufacturers of processors) is making the MOSFETs of length 22 nm. But how far

miniaturization can be done?

Below 10nm things get complicated because then we will reach almost the size of a singleatom. In

sub 10 nm (below 10 nm), quantum effects get

important and change the behavior of MOSFET. Yes, I

wrote “Quantum”? Now you will be saying be, “Hey you

said it will be an easy article, now you are making it a

complicated one.” Ok, I am stopping here but let me

simplify that first, when we are trying to make

MOSFETs smaller it’s not giving the behavior that made

it a building block of processors (as per latest research).

So we are now entering a new era of electronics, era of

Nanoe-lectronics. We have to change, may be a bit or a

lot, but we have to change for sure. Intel changed the

structure of MOSFETs a little bit (for advanced readers- 3D MOSFETs with wrapped gate for 22 nm

MOSFETs). HP (Hewlett-Packard) one of the largest manufacturing company, is doing research on

replacing the whole idea of MOSFET with Memristors (for advanced readers- Resistor with

Page 15

Figure: Memristor in comparison with

Resistor, Inductor and Capacitor. (Figure

from wikipedia)

Page 17: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

memory) [this is what I am guessing reading their recent publications of the project “The Machine”]

and planning to bring the computer to market within few years. Still a lot of researches are going on

changing the idea of MOSFET as a building block or to change the material of it (for advanced

readers- From Silicon to Molybdenum Disulfide, Silicene etc). No doubt Nano-electronics is the

future of electronics, and like the definition of “future”, it’s something that we don’t know yet what

it will come with.

For getting better life and less effort in life, energy must needed. Energy Sources are fossil fuel,

nuclear and renewable sources. Almost all the energy are consumed today from fossil fuels. Energy

from fossil fuels are taking through burning of them. The more we burn fossil fuel, the more fossil

fuel finished. Moreover, burning of fossil fuel produce greenhouse gas. To solve the crisis in energy

and save the environment, green energy is the only solution. Green energy are solar energy, wind

energy, bio-energy etc. Due to limited source of bio-energy and wind is not feasible in maximum

places, solar energy is the only solution of crisis in energy and save the environment. Solar is

feasible in almost all the area in the world. Solar energy are two types solar thermal and solar

photovoltaic. Solar thermal system use the heat from the sun where solar photovoltaic use the

photovoltaic action in solar cell. What is photovoltaic? Photons of higher energy than energy band

gap of solar cell are absorbed in solar cell. The absorption of solar energy create electron and hole

which create flow electricity outside the solar cell. The output of each solar cell approximately 0.8 V

and 30 mA. But how this small energy solve problem of our huge energy demand? The answer is

very simple, using of several solar cell. By connecting these cell we get our desired voltage and

current. Even GW of electricity now produce from solar cell by connecting each other.

But now a question will bring into mind, how many lands solar cells needed? The answer is only

few non-cultivable land can supply the energy. Moreover the rooftop of buildings, surroundings of

Page 16

Review Article

Solar: The Future and Green energy

Shubrata Bhowmik

Page 18: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

buildings can use for solar cells placement. Even windows of buildings can be use for solar cells

placement. Solar energy can used in vehicle. The first solar family car was built in 2013 by

students in the Netherlands.

But there is one question remain, how we used energy in night or rainy day? By reserving energy or

by connecting all the solar power plant in the world in a grid the problem can be solved. The cost of

solar energy is little bit greater than the energy from fossil fuel. But for solving the energy crisis and

saving environment Researches are going to decrease the cost and increasing the efficiency of solar

cell.

“Seeing is believing”, an old proverb, shows the importance of visual perception in human life.

There were two major theories in ancient Greek regarding visual perception. One of the two:

“Emission Theory”, led by Euclid and Ptolemy, and another is “Intromission Theory” championed by

scholars like Aristotle and Galen. According to “Emission Theory”, the objects hit by the light rays

emitted from eyes create human perception. The “Intromission” theory believed that something

entering in eyes representative of the object. Later Ibn Al-Haytham refined the intromission theory

by modern theories . In his book “Book of Optics”, Al-Haytham defines light as the reason for visual

perception. Through the advancement of technology man replicated the idea of visual perception to

digital imaging.

“Pix” and “El” of the word “Pixel” derives

from “Picture” and “Element” respectively.

Pixel is the fundamental portion of an

image sensor. An image sensor is the

device which takes picture frames. In a

frame there are arrays of pixels each of

which generates voltage/current

according to the level of illumination. The

output of each pixel is read out and

converted from analogue to digital. The converted digital signal is then process by signal processing

unit. Then the processed signal is sent or stored via digital interface.

Page 17

A SELF-ADJUSTING LIN-LOG ACTIVE PIXEL FOR

WIDE DYNAMIC RANGE CMOS IMAGE SENSOR

Dr. Quazi Delwar Hossain

Minhaz Ibna Abedin

Figure: Basic block diagram of CMOS Image Sensor

Page 19: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

Till 1990s Charge Coupled Devices (CCD) dominated the image sensor markets. But with the

advantage of low cost CMOS (Complementary metal–oxide–semiconductor) fabrication process

CMOS image sensors have become a viable solution for consumer electronics like camera, video

camera, surveillance camera etc,

machine vision like in robotics,

automated vehicle as well as in

research applications. Though

CMOS image sensors have low

cost, low power consumption and

high on chip functionality, CMOS

image sensors still suffers in

dynamic range.

According to in-pixel circuitry,

CMOS image sensors are of three

kinds: Passive Pixel Sensor (PPS),

Active Pixel Sensor (APS) and Digital Pixel Sensor (DPS). PPS has only one transistor to readout

from the pixel, whereas APS uses few (around 3-7) transistors for readout. DPS includes

comparator even Analog to Digital Converter (ADC) which increases the number of transistors in

pixel. As number of transistors in pixel increase, it reduces the fill factor. As APS has higher fill

factor, APS is widely used in consumer electronics. In this project, previous researches were studied

for understanding the methods for extending dynamic range. Most techniques for widening

dynamic range involve in-pixel processing which in turn reduces the fill factor. One of the

techniques for extending dynamic range without decreasing fill factor is to introduce logarithmic

response.

Though logarithmic APS has better response in high illumination, it suffers in low light illumination.

Hence combination of linear and logarithmic response increases the dynamic range. Many

approaches have been proposed to combine linear logarithmic response but these techniques

involve either in-pixel circuitry or external analog signal both of which increases the pixel

complexity. In this project, a self-adjusting Lin-Log APS has been proposed to increase the dynamic

range.

The proposed pixel has been simulated in Cadence Virtuoso using CMOS 180nm technology node.

The analysis of the proposed pixel shows a dynamic range of 160dB which is wider in comparison

with standard 3T linear and 3T logarithmic APS. The layout of the pixel was designed maintaining

Design Rules of 180nm technology node which shows a fill factor of 45%.

1.Abstract The world is becoming increasingly digital space. Today we manage, share and store our life online and data’s are gathered from our computers, televisions and smart-phones. All the data from the

Page 18

Figure: Basic components of a Pixel.

BIG DATA-The Next Frontier Of Innovation and

Quantum Encryption To Consolidate Big Data Environment

In The Cloud Walia Farzana

Page 20: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

beginning of the time till 2000’s is less than now we create in a minute. This phenomenon transform our understanding of the world and our place and it is becoming known as Big Data. Therefore, a cloud computing model is needed that captures a rich class of big data use-cases and allows reasoning about relevant threads and security goals and quantum cryptographic approach can be used to achieve the goals. . In future, light which has same quantum properties will be the best approach because people can see only light not the data. 2.Introduction We awash in a flood of data today. In board range of application areas, data is being collected at unprecedented scale. Decisions that were previously based on guesswork, or on painstakingly constructed models of reality, can now be based on the data itself. Enhancement of security and privacy in mobile data centres is challengeable with efficient security key management .Based on the recent research ,estimate suggested that 2.5 zettabytes (2.5*10^21 bytes) of information handled in 2012.Quantum cryptography seems to be enhance the security and privacy with less complexity. Data Commission(2012) There are three V’s –Volume refers to the magnitude of data. Variety refers to the structural heterogeneity in a datasheet. Velocity refers to the rate at which data is generated and the speed at which it should be analyzed and acted upon. Cloud computing is a method of providing a set a shared computing resources that include applications, computing storage ,networking, development and deployment platforms ,as well as business processes. Cloud computing turns traditional computing assets into shared pools of resources based on an underlying Internet foundation. A popular example of the benefits of cloud supporting big data can be noted as both Google and Amazon.com. Both companies depend on the capability to manage massive amounts of data to move their businesses forward. Such Big Data analysis now nearly drives every aspects of our modern society, including mobile services ,retail, manufacturing, financial services, life sciences, and physical sciences. While the potential benefits of Big Data are real and significant ,they remain some technical challenges that must be addressed to fully realize the data. The privacy of data is one of them and that increases in the context of big data. There are many additional challenging research problems .For example, we do not yet know yet how to share public data while limiting disclosure and ensuring sufficient data utility in the shared data. The existing paradigm of differential privacy is very important step in the right direction, but it unfortunately reduces information content too far in order to be useful in most practical cases. In addition, real data is not static but gets larger and changes over time. 3.Body Cloud Computing has become the tool of choice for big-data processing and analytics due to reduced cost, board network access, elasticity, resource pooling and measured service. However, Cloud Computing comes with risks. The shared compute infrastructure introduces many security concerns not present in more traditional computing architecture. The cloud provider and tenants may be unreliable entities to try to tamper with data storage and computation. These concerns motivate the need for a novel framework for analyzing cloud computing security ,as well as the cryptographic tools to encrypt cloud computing security goals. In today’s data-centric world ,big-data processing and analytics have become critical to most enterprise and government applications. Thus there is a need for an appropriate big-data infrastructure that supports storage and processing on a massive scale. Cloud Computing enables consumers to store and analyze their data using shared computing resources while easily handling fluctuations in the volume and velocity of data . Thereby, after integrating data’s if they are being encrypted that may provide security to concealed data which can be decoded by the only one user or permitted ones. Why Quantum Cryptography? The quantum properties of light can be exploited to send secret messages. Light has wavelike

Page 19

Page 21: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

properties and the waves can be aligned or polarized in any direction unlike LASER which ispolarized in one direction. Lasers can be used to produce photons with a given polarization. Suppose, the following example will use photon polarized vertically, horizontally, at 45 degrees and 135 degrees, denoted |, , / and \. A calcite crystal can be used as quantum filter. If the crystal is held in vertical position, photons that are vertically polarized (| or )will pass through the filter unchanged. If a photon is diagonally polarized (/or \) passes through the vertical filter, however, the polarization will be changed to vertical or horizontal (| or )in totally random fashion. Thus ,information is lost if the crystal is not aligned correctly, depending on the polarization of the upcoming photon. That is why it is difficult to steal a quantum message without detection. Following is an example of how polarized photons can be used to distribute keys, first proposed by Bennett and Brassard in 1984.In this example Alia will send a key to Aman, while an eavesdropper named Eve tries to intercept the message. Alia first encodes the key into a string of ones and zeros. She can choose from one of two polarizations for each one or zero. It is important to note that Alia will use the “ “ and “/” polarizations randomly to code the zeros and likewise | and / polarizations randomly for ones. Thus the binary string “01” could be coded as |, \,/| or /\.If Alia sends a one as a vertically polarized photon, and Eve measures it with titled crystal the result Eve gets will be useless because she measured it wrong. The binary stringsent is ‘100100011’.

For each photon Alia sends, Aman chooses at random measurement type: either with the crystal vertical or slanted. The vertical crystal, which will correctly pass the vertical or horizontally polarized photons, is also known as a rectilinear measurement and designed as “+”.Aman can also tilt the crystal at a 45 or 135-degree angle, which will pass the correspondingly angled photons. This orientation is also called a diagonal measurement designed as “ “ . If Aman measures a vertical or horizontal photon with a rectilinear measurement, as mentioned in the beside diagram,his measurement will be correct. In the second measurement above Aman made the

wrong measurement and the 45-degree photon will come through the crystal randomly either a horizontal or vertical photon. Thus, the information for the second bit that Alia sends is irretrievably lost. The next step is for Aman to publicly to allow which measurements he made(not the results of the measurements) .Alia publicly tells Aman for which photon he made the correct type of measurement. The correct measurements are

below: Aman keeps all the results for which he has made the correct measurement and discards the rest. The ones and zeros are left will contain secret information and privacy will be maintained.

Page 20

Page 22: IEEE CUET SB Members in One Frame · IEEE CUET SB Members in One Frame Photo Courtesy: Salamat Ullah Page 01 . ... “There’s no other substitution than hard work to overcome all

Why Quantum Cryptography is Secure? Theoretically, messages sent using quantum cryptography would be in unknown quantum state that cannot be copied and an attempt to measure quantum state would disturb the system. The effects produced by measuring a quantum property are irreversible, which means an eavesdropper can not “put back” a quantum message to its original state. It is as if I mail a book to a friend, and someone in the post office opens the package and reads the book, and all the letters become scrambled and the book is rendered unreadable and it can be seen someone broke into the package. That is why quantum cryptography is so useful in distributing the keys used to encrypt messages. Conclusion Quantum cryptographic technique can give a good starting point for secure cloud computing, further research is needed to turn into practical solutions that can achieve secure cloud computing in the world. The field of quantum encryption is so new that more thought and research has into producing quantum transmissions. In summary, quantum techniques should meet the encryption needs of users, perhaps indefinitely.

Page 21