Information Systms in Business |
Information Systems(IS) are essential in business today. The objective of this research is to understand the application of IS in business and integrate IT in business to increase the efficiency of the organization. |
|
Pattern Recognition |
It is very difficult to recognize handwritten characters because different people write in different ways. Handwritten characters are imprecise in nature such that corners are not always sharp, lines are not perfectly straight, and curves are not necessarily smooth. A robust recognition system has to account for all of these factors. Bangla handwrting is also very difficult to recognize since in handwriting it added some further difficulties by joining the letters when write words. It is difficult to distinguish the alphabets in a sentence or words. |
|
HCI- Bangla Text Entry Techniques for Mobile Phones |
Mobile phones have become the vital part of our lives. Though the main purpose of a mobile phone is voice communication, but many other uses are also getting increasing popularity. Short Message Service is now very popular to send short messages with each other. Mobile phone users in Bangladesh are increasing rapidly. The interface of mobile phone is mostly in English. Few mobile phone operators have successfully introduced Short Messaging Services (SMS) in Bangla. Entering text in Bangla in mobile phone is not so simple. The complexity arises due to the structure of the Bangla script and large number of characters in this script. At present, to enter Bangla in mobile phones requires huge keystrokes and lot of time. The objective of this research is to develop a Bangla text entry model so that it will be easy and faster in typing speed. |
|
Privacy and Security in RFID Systems |
The RFID tag in the form of Electronic Product Code (EPC) tag is the most popular standard and is specified by an organization called EPCglobal Inc . An EPC tag traditionally contains some information such as a product type identifier, a manufacturer identifier, and a unique serial number those are exposed to the reader. This unique serial number works as a unique identifier (ID). Due to this unique serial number in an RFID tag it is possible to track the tag uniquely. Due to this the information in an RFID system is vulnerable to unauthorized readers. An RFID system is vulnerable to various attacks such as eavesdropping, traffic analysis, spoofing and denial of service. These attacks may reveal sensitive information of tags and hence break a person’s privacy. Another type of privacy violation is traceability which establishes a relation between a person and a tag. If a link can be established between a person and the tag, the tracing of the tag makes the tracing of the person possible. To protect the privacy in an RFID system, a tag needs to authenticate a reader. However, it is infeasible to use conventional cryptography in a passive RFID tag due to its extremely limited processing and memory limitations.
There are many approaches for the privacy and security of the RFID systems. The first approach towards the privacy and security of the RFID tag is to kill the tag at the point of sale. Due to various reasons for which killing tag is not expected because consumer may wish to reuse the tag. Another approach uses hash function of varied identifier or varying secret. Varying identifier may cause problem in ubiquitous computing environment. To solve the problem static identifiers are used in many authentication protocols.
The objective of my research is to develop new efficient and effective protocols to address these issues for RFID systems in ubiquitous computing environment |
|