SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 7, No. 1, February 2017, pp. 521~525
ISSN: 2088-8708, DOI: 10.11591/ijece.v7i1.pp521-525  521
Journal homepage: http://iaesjournal.com/online/index.php/IJECE
New Heuristic Model for Optimal CRC Polynomial
Ahmed Salih Khirbeet, Ravie Chandren Muniyandi
Research Center for Software Technology and Management, Faculty of Technology and Information Science, University
Kebangsaan Malaysia, Malaysia
Article Info ABSTRACT
Article history:
Received Oct 23, 2016
Revised Dec 14, 2016
Accepted Dec 30, 2016
Cyclic Redundancy Codes (CRCs) are important for maintaining integrity in
data transmissions. CRC performance is mainly affected by the polynomial
chosen. Recent increases in data throughput require a foray into determining
optimal polynomials through software or hardware implementations. Most
CRC implementations in use, offer less than optimal performance or are
inferior to their newer published counterparts. Classical approaches to
determining optimal polynomials involve brute force based searching a
population set of all possible polynomials in that set. This paper evaluates
performance of CRC-polynomials generated with Genetic Algorithms. It then
compares the resultant polynomials, both with and without encryption
headers against a benchmark polynomial.
Keyword:
Cyclic redundancy codes
Data authentication
Data integrity
Genetic algorithms
Optimization Copyright © 2017 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Ahmed Salih Khirbeet,
Research Center for Software Technology and Management,
Faculty of Technology and Information Science,
University Kebangsaan Malaysia, Malaysia.
Email: ahmed.salih89@siswa.ukm.edu.my
1. INTRODUCTION
Cyclic Redundancy Check (CRC) codes are a highly recognized data integrity mechanism in digital
communications for industrial use. They act as a first line of defense in detecting data packet corruption
between two nodes in a communication link [1]. Various CRC implementations exist in different
applications, e.g. from embedded network applications [1] to wireless networks [2], to communication
protocols such as USB 3 [3]. Their wide acceptance is due to their simplicity, good encoding and decoding
performance, and good levels of error detection [4]. As data throughput increases, however, it becomes
important to utilize optimized CRC implementations.
CRC optimization has been attempted from two angles, namely, polynomial selection, and hardware
implementation. The latter is due to the constraints of traditional CRC implementations caused by increasing
data rates. Different hardware implementations have been attempted to cope with this.
An attempt for better polynomial selection from a hardware perspective was described by [5]. They
developed a pipelined implementation of polynomial division which helped form the basis of an effective
CRC. It improved speed, while allowing for data rates from 1 Gbits/s to 4 Gbits/s on field-programmable
gate array (FPGA) implementations with respect to the parallelization level (from 8 to 32 bits). However,
faster data rates, i.e. 5 Gbits/s, were achieved by an 8-bit parallel CRC-32 proposed by [3] to match the high
throughput of USB 3.0. It also proved that an 8-bit parallel CRC-32 was much faster than its serial
counterpart. Despite the improvement, it is overshadowed by research done by [6] who propose a CRC
circuit usable for 10Gbp, utilizing the state-space transformation method.
Improving CRC implementation from a software perspective requires increasing optimization of a
population of polynomials or finding other ways such as reducing the initial search population set of
polynomials. Choosing different polynomials for certain data word lengths and bit lengths offer different
levels of optimization. A polynomial selection process for embedded network applications and a set of
 ISSN: 2088-8708
IJECE Vol. 7, No. 1, February 2017 : 521 – 525
522
"good" general-purpose polynomials has been described by [1]. A collection of 35 new polynomials along
with 13 previously published polynomials that provide good performance for CRCs between 3- and 16-bit for
data word lengths up to 2048 bits were listed. It also discusses a couple of comparison case studies between a
set of current protocols namely USB with ITU (for 5-bit CRCs) and different 8-bit polynomials. The case
studies are used to prove how using different polynomials affect the performance of error detection and how
higher levels of optimization may be achieved by using newer published CRC polynomials. The paper then
provides an exhaustive survey of CRC polynomials from 3- to 15-bit along with a discussion of 16-bit
polynomials. The paper also defines "good" polynomials as those achieving the maximum Hamming
Distance for the longest data word along with other considerations. Despite the comprehensive nature of this
research, CRC codes beyond 16 parity bits were avoided due to the large number of possibilities that had to
be investigated. However, certain classes of 24- and 32-bit CRC codes were investigated by [7], whereas a
comprehensive search for CRC codes with 32 parity bits was undertaken by [8].
Similar to [1], an analysis of CRC code standards, namely, CRC-12, ANSI and CCI7T X.25, proved
that the standards were not on par with the best possible CRC implementations and that the situation seemed
unlikely to change due to economic concerns [4]. This coupled with the use of CRCs in high-throughput
applications such as USB 3 [3], has made parallel CRC circuitry design, an important area of research [9].
Performance of CRC implementations created by polynomials with a degree of 16 and above for
error detection in communication systems was evaluated by [4]. The properties of minimum distance,
"properness" and undetected error probability for binary symmetric channels (BSC) are calculated and
compared with existing standards.
The core of CRC implementations depends on the polynomial chosen. Despite their importance in
ensuring data integrity, a comprehensive research disclosed that most published CRC polynomials are either
optimal when limited to certain message lengths or inferior to alternatives. The latter is supported by the fact
that many applications utilize CRCs that offer much less error detection capability than possible for a certain
CRC bit value. This may also be supported by the lack of "tools and data tables" for measuring polynomial
performance [1].
With regards to polynomial selection, the current landscape suffers from three issues: (1) lacunae
exist in the current published polynomials set (2) no specific guidance exists on the viability of certain
polynomials in certain contexts, and (3) lacunae with respect to published quantitative analyses [1]. Research
has shown that varying polynomials within a certain size as well as varying the size, produces different
results with respect to error detecting performance [4].
2. METHODOLOGY
With regards to embedded networks, an attribute of concern with CRC implementation is the
Hamming Distance (HD) [1]. HD is the least bit inversions that have to be integrated into a message to
generate an error that is "undetectable by that message's CRC-based Frame Check Sequence". The
probability of such a data corruption occurring is small but nonetheless, the least number of bit inversions in
order to achieve the aforementioned undetectable errors is crucial in CRC polynomial design [1]; size of bits
and data words are also to be considered since they affect error-detection performance [4].
Connected with HD is the attribute, Hamming Weight (HW). For a HW of N, N is the number of
undetected error probabilities by a CRC implementation with respect to a specific polynomial. A collection
of HWs captures performance for different numbers of bits corrupted in a message at a particular data word
length. The first non-zero Hamming weight determines a code’s HD.
The goal of finding a good CRC polynomial is to ensure optimization, i.e., to maximize the HD and
minimize the HW. The classical way to find such polynomials is to try all possible cases of polynomials and
data bit errors (1-, 2-, 3-, message length errors), and then select the optimal one. This method is suitable for
small values of data word lengths and polynomial degree. However, for larger values, computational
complexity increases and thus makes solutions impossible on today's computers.
We propose solving the issue of reducing computational complexity by using the concept of Genetic
Algorithms (GA), thus treating the problem as an optimization problem. GA is a type of evolutionary
computation method, but has no agreed upon definition which differentiates it from other evolution-
computation methods. However, there are some features which consistently present themselves in GA
methods: “populations of chromosomes, selection according to fitness, crossover to produce new offspring,
and random mutation of new offspring.”[10]. Also, genetic algorithms have been applied in various
applications in communication [11], [12].
GAs help reduce the population of a certain problem set by performing a directed search [13]. This
is in contrast to the classical method, which is random in nature and requires going through all members of
the problem set's population.
IJECE ISSN: 2088-8708 
New Heuristic Model for Optimal CRC Polynomial (Ahmed Salih Khirbeet)
523
GA allows movement from one set of data represented in binary ("chromosomes") in the search
space to a new one by performing a type of "natural selection", as is present in nature. It utilizes genetics-
inspired operators: crossover, mutation, and inversion. Similar to the natural inspiration it was derived from,
each "chromosome" consists of "genes". "Genes" in turn represent an instance of a certain "allele", i.e., 0
or 1. "Chromosomes" are selected on their fitness to reproduce; fitter chromosomes on average produce more
offspring. The Operators then define how new "chromosomes" are to be selected until an optimal solution is
reached [10].
In relation to the case at hand, the highest possible degree for any polynomial is n. Therefore, the
length of each chromosome is n and each chromosome is padded with “1”s which represent the constant in
the polynomial.
HD has been used as a constraint, so each chromosome that does not satisfy the constraint is
rejected. Before starting a search process, the user must determine bit error cases (from 1 to the required
value of bit errors), the maximum number of combinations for each case, and the message length. Because
binary representation has been used, the values' lower bound is zero (0) while the higher bound is one (1).
The values are always integers (GF(2)). The target of the optimization process is to minimize the following
function:
∑
The Fitness Value (FV) equation clarifies that increasing the number of used combinations makes
the resultant solution nearer to the best solution, but not without increasing the computational complexity.
Data integrity of the data packets transferred can be ensured by using encryption. One of secure
cipher operation's principles is diffusion. It is satisfied when, if a single bit of the plain text is changed, every
bit of the cipher text changes with a probability of 0.5 and vice versa. This is useful for the scenario at hand
as any error that occurs in the message during transmission will cause a large number of errors in the
message after decryption which in turn helps the next stage (CRC detector) to reduce the number of
undetected errors. The number of undetected errors can be further reduced by ensuring each data packet
contains a header which is known to both the sender and receiver. Thus, if the error is undetected using FCS,
it can be detected by checking for changes in the header after decryption.
The Advanced Encryption Standard (AES) specification will be used for encryption functions
relating to headers. The specification [14] defines it as a block cipher which can be used both ways, i.e., to
encrypt information into ciphertext and also to decrypt the resultant ciphertext back into its original form. It
is a symmetric-key algorithm, which means that the same key is used for both encryption and decryption
functions. It can encrypt and decrypt data in 128-bit blocks by using 128, 192, and 256-bit cryptographic
keys. We will be using a 128-bit cryptographic key for our application.
3. RESULTS AND DISSCUSSION
To validate the proposed method, we conducted experiments using the MATLAB environment with
its built-in GA toolbox. The first experiment consisted of data packets of 48 bits, and where the highest
degree of the generator polynomial was 16. Bit error cases ranged from 1 to 6f bits, and for each case, 10,000
combinations were tested at most.
The HD was chosen to be at minimum, 6. The benchmark chosen for this experiment was the
polynomial found by [4], with a hex value of 0xC86C. An analysis by [1] found it to the best amongst many
others for a data word size of 48 bits. Results are shown in Table 1.
Table 1. Resultant Polynomial Vs [4], Tested With 10,000 Combinations
HD Polynomial 1 bit 2 bits 3 bits 4 bits 5 bits 6 bits No. of Undetected Errors
Resultant 0x8411 5 0 0 0 0 183 1267 1450
[4] 0xC86C 6 0 0 0 0 0 2191 2191
Although the resultant polynomial has a lower HD than [4], the sum of undetected errors in 5-bit
and 6-bit cases is lower than undetected errors in [4] for 6 bits. As previously mentioned, increasing the
maximum number of combinations makes the solution nearer to the best solution. Therefore, another
experiment was conducted; this time, making the maximum number of combinations, 300,000. The results
are summarized in Table 2.
 ISSN: 2088-8708
IJECE Vol. 7, No. 1, February 2017 : 521 – 525
524
Table 2. Resultant Polynomial Vs [4], Tested With 300,000 Combinations
HD Polynomial 1 bit 2 bits 3 bits 4 bits 5 bits 6 bits No. of Undetected Errors
Resultant 0x9947 5 0 0 0 0 57 1163 1220
[4] 0xC86C 6 0 0 0 0 0 2191 2191
It is clear that the new resultant polynomial is able to detect more error cases than the previous one,
and thus [4]'s as well. The number of undetected error probabilities has decreased significantly from the
previous experiment, resulting in 57 compared with 183 from the previous experiment, for 5-bits. The
improvement in 6-bits was not significant but nonetheless still better by 104 undetected error probabilities.
In order to validate the effect of encryption in lowering the number of undetected errors, another
experiment was conducted. This time, a data word size of 112 was used and the highest possible polynomial
degree was 16. Bit error cases ranged from 1 to 6 bits, and 400,000 combinations at most, were tested for
each case. The HD constraint was left as is, with a minimum value of 6.
Table 3 shows the resultant polynomial, the number of undetected errors, the number of undetected
errors with encryption, and the number of undetected errors with encryption along with a header of one-byte
size, where 4 million combinations of 6-bit errors have been randomly chosen and tested. The data word size
was 112 bit. The benefit of adding encryption as well as a header can be clearly seen. The number of
undetected error probabilities without encryption and a header was 141. Adding encryption reduced it to 60
and adding a header along with encryption decreased it even further, enabling the CRC implementation to
catch all possible errors.
Table 3. No. Of Undetected Error Probabilities for the Polynomial 0x8948
Polynomial CRC CRC and Encryption CRC and Encryption with Header
0x8948 141 60 0
4. CONCLUSION AND FUTURE WORK
Our work showed how using a GA approach decreased the number of possible solution candidates
for finding an optimal polynomial for use in a CRC implementation. We compared the resultant polynomials
against a benchmark [4] for a data word length of 48 bits. We also evaluated the effect of encryption on data
headers in a CRC implementation; we found that encryption improves performance of a CRC
implementation.
Our evaluation, however, is not comprehensive which leaves room for future work. A more
thorough evaluation of using GA for different data word lengths and CRC bit length would add strength to
the proposal at hand. Similarly, a thorough benchmark analysis of resultant polynomials using GA for the
various data word lengths and CRC bit length would prove the validity of our method across a wider scope of
CRC implementations.
ACKNOWLEDGEMENTS
The researchers wish to thank Universiti Kebangsaan Malaysia (UKM) for supporting this work by
research grants: Dana Impak Perdana (DIP-2014-037).
REFERENCES
[1] P. Koopman and T. Chakravarty, “Cyclic Redundancy Code (CRC) Polynomial Selection For Embedded
Networks”, Int. Conf. Dependable Syst. Networks, 2004, pp. 1–11, 2004.
[2] V. Chea, M.V. Martin, and R. Liscano, “Hamming distance as a metric for the detection of crc-based side-channel
communications in 802.11 wireless networks”, in IEEE conference on communications and network security (cns),
2015, pp. 218–226.
[3] Y. Wu and Y. Qiu, “The 8-bit parallel crc-32 research and implementation in usb 3.0”, in International conference
on Computer science service system (csss), 2012, pp. 1079–1082.
[4] T. Baicheva, S. Dodunekov, and P. Kazakov, “Undetected error probability performance of cyclic redundancy-
check codes of 16-bit redundancy”, in IEE Proceedings - Communications, vol. 147, no. 5, pp. 253–256.
[5] F. Monteiro, A. Dandache, A. M’Sir, and B. Lepley, “A polynomial division pipelined architecture for crc error
detecting codes”, in The 13th international conference on Microelectronics, 2001, vol. 13, pp. 133–136.
IJECE ISSN: 2088-8708 
New Heuristic Model for Optimal CRC Polynomial (Ahmed Salih Khirbeet)
525
[6] J.S. Lin, C.K. Lee, M.D. Shieh, and J.H. Chen, “High-speed crc design for 10 gbps applications”, in IEEE
international symposium on circuits and systems, 2006, p. 4.
[7] G. Castagnoli, S. Brauer, and M. Herrmann, “Optimization of cyclic redundancy-check codes with 24 and 32 parity
bits”, IEEE Trans. Commun., vol. 41, no. 6, pp. 883–892, 1993.
[8] P. Koopman, “32-bit cyclic redundancy codes for internet applications”, in International conference on dependable
systems and networks, 2002, pp. 459–468.
[9] K. Witzke and C. Leung, “A comparison of some error detecting crc code standards”, IEEE Trans. Commun., vol.
33, no. 9, pp. 996–998, 1985.
[10] M. Mitchell, An introduction to genetic algorithms. Bradford Books, 1998.
[11] J. Mohammed, “Comparative Performance Investigations of Stochastic and Genetic Algorithms Under Fast
Dynamically Changing Environment in Smart Antennas”, Int. J. Electr. Comput. Eng., vol. 2, no. 1, pp. 98–105,
2012.
[12] N. Jiang, S. Jin, Y. Guo, and Y. He, “Localization of Wireless Sensor Network Based on Genetic Algorithm”, Int.
J. Comput. Commun. Control, vol. 8, no. 6, p. 825, 2013.
[13] S. Sivanandam and S. Deepa, Introduction to genetic algorithms. Springer Berlin Heidelberg, 2007.
[14] “Specification for the advanced encryption standard (AES),” Fed. Inf. Process. Stand. Publ., 2001.
BIOGRAPHIES OF AUTHORS
Ahmed Salih Khirbeet
Research Center for Software Technology and Management (SOFTAM)
Faculty of Technology and Information Science
University Kebangsaan Malaysia
ahmed.salih89@siswa.ukm.edu.my
Ravie Chandren Muniyandi
Research Center for Software Technology and Management (SOFTAM)
Faculty of Technology and Information Science
University Kebangsaan Malaysia.
ravie@ukm.edu.my

More Related Content

What's hot

Ieee projects 2012 for cse
Ieee projects 2012 for cseIeee projects 2012 for cse
Ieee projects 2012 for cseSBGC
 
Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...
Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...
Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...IJERA Editor
 
Measurement of end to end delays in ad hoc 802
Measurement of end to end delays in ad hoc 802Measurement of end to end delays in ad hoc 802
Measurement of end to end delays in ad hoc 802IAEME Publication
 
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5GNEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
 
Cross Layer Solution for Energy and Delay Optimization in MANETs
Cross Layer Solution for Energy and Delay Optimization  in MANETs Cross Layer Solution for Energy and Delay Optimization  in MANETs
Cross Layer Solution for Energy and Delay Optimization in MANETs IJECEIAES
 
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationAnalytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationIJCNCJournal
 
CONTEXT-AWARE CLUSTERING USING GLOVE AND K-MEANS
CONTEXT-AWARE CLUSTERING USING GLOVE AND K-MEANSCONTEXT-AWARE CLUSTERING USING GLOVE AND K-MEANS
CONTEXT-AWARE CLUSTERING USING GLOVE AND K-MEANSijseajournal
 
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)S3 Infotech IEEE Projects
 
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...SBGC
 
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )SBGC
 
Improving the data recovery for short length LT codes
Improving the data recovery for short length LT codes Improving the data recovery for short length LT codes
Improving the data recovery for short length LT codes IJECEIAES
 
Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...TELKOMNIKA JOURNAL
 
IEEE MultiMedia 2016 Title and Abstract
IEEE MultiMedia 2016 Title and AbstractIEEE MultiMedia 2016 Title and Abstract
IEEE MultiMedia 2016 Title and Abstracttsysglobalsolutions
 
Presentation2 2000
Presentation2 2000Presentation2 2000
Presentation2 2000suvobgd
 
Data Preparation and Reduction Technique in Intrusion Detection Systems: ANOV...
Data Preparation and Reduction Technique in Intrusion Detection Systems: ANOV...Data Preparation and Reduction Technique in Intrusion Detection Systems: ANOV...
Data Preparation and Reduction Technique in Intrusion Detection Systems: ANOV...CSCJournals
 
Peer to peer cache resolution mechanism for mobile ad hoc networks
Peer to peer cache resolution mechanism for mobile ad hoc networksPeer to peer cache resolution mechanism for mobile ad hoc networks
Peer to peer cache resolution mechanism for mobile ad hoc networksijwmn
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Modeling and Analysis of Two Node Network Model with Multiple States in Mobi...
Modeling and Analysis of Two Node Network Model with  Multiple States in Mobi...Modeling and Analysis of Two Node Network Model with  Multiple States in Mobi...
Modeling and Analysis of Two Node Network Model with Multiple States in Mobi...Editor IJCATR
 

What's hot (18)

Ieee projects 2012 for cse
Ieee projects 2012 for cseIeee projects 2012 for cse
Ieee projects 2012 for cse
 
Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...
Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...
Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...
 
Measurement of end to end delays in ad hoc 802
Measurement of end to end delays in ad hoc 802Measurement of end to end delays in ad hoc 802
Measurement of end to end delays in ad hoc 802
 
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5GNEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
 
Cross Layer Solution for Energy and Delay Optimization in MANETs
Cross Layer Solution for Energy and Delay Optimization  in MANETs Cross Layer Solution for Energy and Delay Optimization  in MANETs
Cross Layer Solution for Energy and Delay Optimization in MANETs
 
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationAnalytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
 
CONTEXT-AWARE CLUSTERING USING GLOVE AND K-MEANS
CONTEXT-AWARE CLUSTERING USING GLOVE AND K-MEANSCONTEXT-AWARE CLUSTERING USING GLOVE AND K-MEANS
CONTEXT-AWARE CLUSTERING USING GLOVE AND K-MEANS
 
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
 
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
 
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
 
Improving the data recovery for short length LT codes
Improving the data recovery for short length LT codes Improving the data recovery for short length LT codes
Improving the data recovery for short length LT codes
 
Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...
 
IEEE MultiMedia 2016 Title and Abstract
IEEE MultiMedia 2016 Title and AbstractIEEE MultiMedia 2016 Title and Abstract
IEEE MultiMedia 2016 Title and Abstract
 
Presentation2 2000
Presentation2 2000Presentation2 2000
Presentation2 2000
 
Data Preparation and Reduction Technique in Intrusion Detection Systems: ANOV...
Data Preparation and Reduction Technique in Intrusion Detection Systems: ANOV...Data Preparation and Reduction Technique in Intrusion Detection Systems: ANOV...
Data Preparation and Reduction Technique in Intrusion Detection Systems: ANOV...
 
Peer to peer cache resolution mechanism for mobile ad hoc networks
Peer to peer cache resolution mechanism for mobile ad hoc networksPeer to peer cache resolution mechanism for mobile ad hoc networks
Peer to peer cache resolution mechanism for mobile ad hoc networks
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Modeling and Analysis of Two Node Network Model with Multiple States in Mobi...
Modeling and Analysis of Two Node Network Model with  Multiple States in Mobi...Modeling and Analysis of Two Node Network Model with  Multiple States in Mobi...
Modeling and Analysis of Two Node Network Model with Multiple States in Mobi...
 

Similar to New Heuristic Model for Optimal CRC Polynomial

Energy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LCEnergy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LCpaperpublications3
 
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai
3 S W 2009 I E E E Abstracts Java, N C C T Chennaincct
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects Bncct
 
Real Time Projects, Live Projects, Student Projects, Engineering Projects
Real Time Projects, Live Projects, Student Projects, Engineering ProjectsReal Time Projects, Live Projects, Student Projects, Engineering Projects
Real Time Projects, Live Projects, Student Projects, Engineering Projectsncct
 
Ncct 2009 Ieee Java Projects
Ncct 2009 Ieee Java ProjectsNcct 2009 Ieee Java Projects
Ncct 2009 Ieee Java Projectsncct
 
I E E E 2009 A S P
I E E E 2009  A S PI E E E 2009  A S P
I E E E 2009 A S Pncct
 
Me Projects, M Tech Projects
Me Projects, M Tech ProjectsMe Projects, M Tech Projects
Me Projects, M Tech Projectsncct
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009ncct
 
Ieee Projects Asp.Net Projects Ieee 2009
Ieee Projects Asp.Net Projects Ieee 2009Ieee Projects Asp.Net Projects Ieee 2009
Ieee Projects Asp.Net Projects Ieee 2009ncct
 
Be Projects
Be ProjectsBe Projects
Be Projectsncct
 
Software Projects Asp.Net Java 2009 Ieee
Software Projects Asp.Net Java 2009 IeeeSoftware Projects Asp.Net Java 2009 Ieee
Software Projects Asp.Net Java 2009 Ieeencct
 
Final Year Projects Ncct Chennai
Final Year Projects Ncct ChennaiFinal Year Projects Ncct Chennai
Final Year Projects Ncct Chennaincct
 
Asp.Net Ieee Java Ieee Ncct 2009
Asp.Net Ieee Java Ieee Ncct 2009Asp.Net Ieee Java Ieee Ncct 2009
Asp.Net Ieee Java Ieee Ncct 2009ncct
 
A S P
A S PA S P
A S Pncct
 
Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...
Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...
Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...ncct
 
Application-oriented ping-pong benchmarking: how to assess the real communica...
Application-oriented ping-pong benchmarking: how to assess the real communica...Application-oriented ping-pong benchmarking: how to assess the real communica...
Application-oriented ping-pong benchmarking: how to assess the real communica...Trieu Nguyen
 
CAN SENSORS COLLECT BIG DATA? AN ENERGY EFFICIENT BIG DATA GATHERING ALGORIT...
 CAN SENSORS COLLECT BIG DATA? AN ENERGY EFFICIENT BIG DATA GATHERING ALGORIT... CAN SENSORS COLLECT BIG DATA? AN ENERGY EFFICIENT BIG DATA GATHERING ALGORIT...
CAN SENSORS COLLECT BIG DATA? AN ENERGY EFFICIENT BIG DATA GATHERING ALGORIT...Nexgen Technology
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNpaperpublications3
 
Quality of Service Stability Based Multicast Routing Protocol for MANETs
Quality of Service Stability Based Multicast Routing Protocol for MANETsQuality of Service Stability Based Multicast Routing Protocol for MANETs
Quality of Service Stability Based Multicast Routing Protocol for MANETsCSEIJJournal
 
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETSQUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETScseij
 

Similar to New Heuristic Model for Optimal CRC Polynomial (20)

Energy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LCEnergy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LC
 
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
 
Real Time Projects, Live Projects, Student Projects, Engineering Projects
Real Time Projects, Live Projects, Student Projects, Engineering ProjectsReal Time Projects, Live Projects, Student Projects, Engineering Projects
Real Time Projects, Live Projects, Student Projects, Engineering Projects
 
Ncct 2009 Ieee Java Projects
Ncct 2009 Ieee Java ProjectsNcct 2009 Ieee Java Projects
Ncct 2009 Ieee Java Projects
 
I E E E 2009 A S P
I E E E 2009  A S PI E E E 2009  A S P
I E E E 2009 A S P
 
Me Projects, M Tech Projects
Me Projects, M Tech ProjectsMe Projects, M Tech Projects
Me Projects, M Tech Projects
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009
 
Ieee Projects Asp.Net Projects Ieee 2009
Ieee Projects Asp.Net Projects Ieee 2009Ieee Projects Asp.Net Projects Ieee 2009
Ieee Projects Asp.Net Projects Ieee 2009
 
Be Projects
Be ProjectsBe Projects
Be Projects
 
Software Projects Asp.Net Java 2009 Ieee
Software Projects Asp.Net Java 2009 IeeeSoftware Projects Asp.Net Java 2009 Ieee
Software Projects Asp.Net Java 2009 Ieee
 
Final Year Projects Ncct Chennai
Final Year Projects Ncct ChennaiFinal Year Projects Ncct Chennai
Final Year Projects Ncct Chennai
 
Asp.Net Ieee Java Ieee Ncct 2009
Asp.Net Ieee Java Ieee Ncct 2009Asp.Net Ieee Java Ieee Ncct 2009
Asp.Net Ieee Java Ieee Ncct 2009
 
A S P
A S PA S P
A S P
 
Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...
Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...
Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...
 
Application-oriented ping-pong benchmarking: how to assess the real communica...
Application-oriented ping-pong benchmarking: how to assess the real communica...Application-oriented ping-pong benchmarking: how to assess the real communica...
Application-oriented ping-pong benchmarking: how to assess the real communica...
 
CAN SENSORS COLLECT BIG DATA? AN ENERGY EFFICIENT BIG DATA GATHERING ALGORIT...
 CAN SENSORS COLLECT BIG DATA? AN ENERGY EFFICIENT BIG DATA GATHERING ALGORIT... CAN SENSORS COLLECT BIG DATA? AN ENERGY EFFICIENT BIG DATA GATHERING ALGORIT...
CAN SENSORS COLLECT BIG DATA? AN ENERGY EFFICIENT BIG DATA GATHERING ALGORIT...
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
 
Quality of Service Stability Based Multicast Routing Protocol for MANETs
Quality of Service Stability Based Multicast Routing Protocol for MANETsQuality of Service Stability Based Multicast Routing Protocol for MANETs
Quality of Service Stability Based Multicast Routing Protocol for MANETs
 
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETSQUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
 

More from IJECEIAES

Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...IJECEIAES
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...IJECEIAES
 
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...IJECEIAES
 
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...IJECEIAES
 
A deep learning framework for accurate diagnosis of colorectal cancer using h...
A deep learning framework for accurate diagnosis of colorectal cancer using h...A deep learning framework for accurate diagnosis of colorectal cancer using h...
A deep learning framework for accurate diagnosis of colorectal cancer using h...IJECEIAES
 
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...IJECEIAES
 
Predicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningPredicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningIJECEIAES
 
Taxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportTaxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportIJECEIAES
 
Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...IJECEIAES
 

More from IJECEIAES (20)

Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behavior
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
 
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...
 
A deep learning framework for accurate diagnosis of colorectal cancer using h...
A deep learning framework for accurate diagnosis of colorectal cancer using h...A deep learning framework for accurate diagnosis of colorectal cancer using h...
A deep learning framework for accurate diagnosis of colorectal cancer using h...
 
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...
 
Predicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningPredicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learning
 
Taxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportTaxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca Airport
 
Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...
 

Recently uploaded

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 

Recently uploaded (20)

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 

New Heuristic Model for Optimal CRC Polynomial

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 7, No. 1, February 2017, pp. 521~525 ISSN: 2088-8708, DOI: 10.11591/ijece.v7i1.pp521-525  521 Journal homepage: http://iaesjournal.com/online/index.php/IJECE New Heuristic Model for Optimal CRC Polynomial Ahmed Salih Khirbeet, Ravie Chandren Muniyandi Research Center for Software Technology and Management, Faculty of Technology and Information Science, University Kebangsaan Malaysia, Malaysia Article Info ABSTRACT Article history: Received Oct 23, 2016 Revised Dec 14, 2016 Accepted Dec 30, 2016 Cyclic Redundancy Codes (CRCs) are important for maintaining integrity in data transmissions. CRC performance is mainly affected by the polynomial chosen. Recent increases in data throughput require a foray into determining optimal polynomials through software or hardware implementations. Most CRC implementations in use, offer less than optimal performance or are inferior to their newer published counterparts. Classical approaches to determining optimal polynomials involve brute force based searching a population set of all possible polynomials in that set. This paper evaluates performance of CRC-polynomials generated with Genetic Algorithms. It then compares the resultant polynomials, both with and without encryption headers against a benchmark polynomial. Keyword: Cyclic redundancy codes Data authentication Data integrity Genetic algorithms Optimization Copyright © 2017 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Ahmed Salih Khirbeet, Research Center for Software Technology and Management, Faculty of Technology and Information Science, University Kebangsaan Malaysia, Malaysia. Email: ahmed.salih89@siswa.ukm.edu.my 1. INTRODUCTION Cyclic Redundancy Check (CRC) codes are a highly recognized data integrity mechanism in digital communications for industrial use. They act as a first line of defense in detecting data packet corruption between two nodes in a communication link [1]. Various CRC implementations exist in different applications, e.g. from embedded network applications [1] to wireless networks [2], to communication protocols such as USB 3 [3]. Their wide acceptance is due to their simplicity, good encoding and decoding performance, and good levels of error detection [4]. As data throughput increases, however, it becomes important to utilize optimized CRC implementations. CRC optimization has been attempted from two angles, namely, polynomial selection, and hardware implementation. The latter is due to the constraints of traditional CRC implementations caused by increasing data rates. Different hardware implementations have been attempted to cope with this. An attempt for better polynomial selection from a hardware perspective was described by [5]. They developed a pipelined implementation of polynomial division which helped form the basis of an effective CRC. It improved speed, while allowing for data rates from 1 Gbits/s to 4 Gbits/s on field-programmable gate array (FPGA) implementations with respect to the parallelization level (from 8 to 32 bits). However, faster data rates, i.e. 5 Gbits/s, were achieved by an 8-bit parallel CRC-32 proposed by [3] to match the high throughput of USB 3.0. It also proved that an 8-bit parallel CRC-32 was much faster than its serial counterpart. Despite the improvement, it is overshadowed by research done by [6] who propose a CRC circuit usable for 10Gbp, utilizing the state-space transformation method. Improving CRC implementation from a software perspective requires increasing optimization of a population of polynomials or finding other ways such as reducing the initial search population set of polynomials. Choosing different polynomials for certain data word lengths and bit lengths offer different levels of optimization. A polynomial selection process for embedded network applications and a set of
  • 2.  ISSN: 2088-8708 IJECE Vol. 7, No. 1, February 2017 : 521 – 525 522 "good" general-purpose polynomials has been described by [1]. A collection of 35 new polynomials along with 13 previously published polynomials that provide good performance for CRCs between 3- and 16-bit for data word lengths up to 2048 bits were listed. It also discusses a couple of comparison case studies between a set of current protocols namely USB with ITU (for 5-bit CRCs) and different 8-bit polynomials. The case studies are used to prove how using different polynomials affect the performance of error detection and how higher levels of optimization may be achieved by using newer published CRC polynomials. The paper then provides an exhaustive survey of CRC polynomials from 3- to 15-bit along with a discussion of 16-bit polynomials. The paper also defines "good" polynomials as those achieving the maximum Hamming Distance for the longest data word along with other considerations. Despite the comprehensive nature of this research, CRC codes beyond 16 parity bits were avoided due to the large number of possibilities that had to be investigated. However, certain classes of 24- and 32-bit CRC codes were investigated by [7], whereas a comprehensive search for CRC codes with 32 parity bits was undertaken by [8]. Similar to [1], an analysis of CRC code standards, namely, CRC-12, ANSI and CCI7T X.25, proved that the standards were not on par with the best possible CRC implementations and that the situation seemed unlikely to change due to economic concerns [4]. This coupled with the use of CRCs in high-throughput applications such as USB 3 [3], has made parallel CRC circuitry design, an important area of research [9]. Performance of CRC implementations created by polynomials with a degree of 16 and above for error detection in communication systems was evaluated by [4]. The properties of minimum distance, "properness" and undetected error probability for binary symmetric channels (BSC) are calculated and compared with existing standards. The core of CRC implementations depends on the polynomial chosen. Despite their importance in ensuring data integrity, a comprehensive research disclosed that most published CRC polynomials are either optimal when limited to certain message lengths or inferior to alternatives. The latter is supported by the fact that many applications utilize CRCs that offer much less error detection capability than possible for a certain CRC bit value. This may also be supported by the lack of "tools and data tables" for measuring polynomial performance [1]. With regards to polynomial selection, the current landscape suffers from three issues: (1) lacunae exist in the current published polynomials set (2) no specific guidance exists on the viability of certain polynomials in certain contexts, and (3) lacunae with respect to published quantitative analyses [1]. Research has shown that varying polynomials within a certain size as well as varying the size, produces different results with respect to error detecting performance [4]. 2. METHODOLOGY With regards to embedded networks, an attribute of concern with CRC implementation is the Hamming Distance (HD) [1]. HD is the least bit inversions that have to be integrated into a message to generate an error that is "undetectable by that message's CRC-based Frame Check Sequence". The probability of such a data corruption occurring is small but nonetheless, the least number of bit inversions in order to achieve the aforementioned undetectable errors is crucial in CRC polynomial design [1]; size of bits and data words are also to be considered since they affect error-detection performance [4]. Connected with HD is the attribute, Hamming Weight (HW). For a HW of N, N is the number of undetected error probabilities by a CRC implementation with respect to a specific polynomial. A collection of HWs captures performance for different numbers of bits corrupted in a message at a particular data word length. The first non-zero Hamming weight determines a code’s HD. The goal of finding a good CRC polynomial is to ensure optimization, i.e., to maximize the HD and minimize the HW. The classical way to find such polynomials is to try all possible cases of polynomials and data bit errors (1-, 2-, 3-, message length errors), and then select the optimal one. This method is suitable for small values of data word lengths and polynomial degree. However, for larger values, computational complexity increases and thus makes solutions impossible on today's computers. We propose solving the issue of reducing computational complexity by using the concept of Genetic Algorithms (GA), thus treating the problem as an optimization problem. GA is a type of evolutionary computation method, but has no agreed upon definition which differentiates it from other evolution- computation methods. However, there are some features which consistently present themselves in GA methods: “populations of chromosomes, selection according to fitness, crossover to produce new offspring, and random mutation of new offspring.”[10]. Also, genetic algorithms have been applied in various applications in communication [11], [12]. GAs help reduce the population of a certain problem set by performing a directed search [13]. This is in contrast to the classical method, which is random in nature and requires going through all members of the problem set's population.
  • 3. IJECE ISSN: 2088-8708  New Heuristic Model for Optimal CRC Polynomial (Ahmed Salih Khirbeet) 523 GA allows movement from one set of data represented in binary ("chromosomes") in the search space to a new one by performing a type of "natural selection", as is present in nature. It utilizes genetics- inspired operators: crossover, mutation, and inversion. Similar to the natural inspiration it was derived from, each "chromosome" consists of "genes". "Genes" in turn represent an instance of a certain "allele", i.e., 0 or 1. "Chromosomes" are selected on their fitness to reproduce; fitter chromosomes on average produce more offspring. The Operators then define how new "chromosomes" are to be selected until an optimal solution is reached [10]. In relation to the case at hand, the highest possible degree for any polynomial is n. Therefore, the length of each chromosome is n and each chromosome is padded with “1”s which represent the constant in the polynomial. HD has been used as a constraint, so each chromosome that does not satisfy the constraint is rejected. Before starting a search process, the user must determine bit error cases (from 1 to the required value of bit errors), the maximum number of combinations for each case, and the message length. Because binary representation has been used, the values' lower bound is zero (0) while the higher bound is one (1). The values are always integers (GF(2)). The target of the optimization process is to minimize the following function: ∑ The Fitness Value (FV) equation clarifies that increasing the number of used combinations makes the resultant solution nearer to the best solution, but not without increasing the computational complexity. Data integrity of the data packets transferred can be ensured by using encryption. One of secure cipher operation's principles is diffusion. It is satisfied when, if a single bit of the plain text is changed, every bit of the cipher text changes with a probability of 0.5 and vice versa. This is useful for the scenario at hand as any error that occurs in the message during transmission will cause a large number of errors in the message after decryption which in turn helps the next stage (CRC detector) to reduce the number of undetected errors. The number of undetected errors can be further reduced by ensuring each data packet contains a header which is known to both the sender and receiver. Thus, if the error is undetected using FCS, it can be detected by checking for changes in the header after decryption. The Advanced Encryption Standard (AES) specification will be used for encryption functions relating to headers. The specification [14] defines it as a block cipher which can be used both ways, i.e., to encrypt information into ciphertext and also to decrypt the resultant ciphertext back into its original form. It is a symmetric-key algorithm, which means that the same key is used for both encryption and decryption functions. It can encrypt and decrypt data in 128-bit blocks by using 128, 192, and 256-bit cryptographic keys. We will be using a 128-bit cryptographic key for our application. 3. RESULTS AND DISSCUSSION To validate the proposed method, we conducted experiments using the MATLAB environment with its built-in GA toolbox. The first experiment consisted of data packets of 48 bits, and where the highest degree of the generator polynomial was 16. Bit error cases ranged from 1 to 6f bits, and for each case, 10,000 combinations were tested at most. The HD was chosen to be at minimum, 6. The benchmark chosen for this experiment was the polynomial found by [4], with a hex value of 0xC86C. An analysis by [1] found it to the best amongst many others for a data word size of 48 bits. Results are shown in Table 1. Table 1. Resultant Polynomial Vs [4], Tested With 10,000 Combinations HD Polynomial 1 bit 2 bits 3 bits 4 bits 5 bits 6 bits No. of Undetected Errors Resultant 0x8411 5 0 0 0 0 183 1267 1450 [4] 0xC86C 6 0 0 0 0 0 2191 2191 Although the resultant polynomial has a lower HD than [4], the sum of undetected errors in 5-bit and 6-bit cases is lower than undetected errors in [4] for 6 bits. As previously mentioned, increasing the maximum number of combinations makes the solution nearer to the best solution. Therefore, another experiment was conducted; this time, making the maximum number of combinations, 300,000. The results are summarized in Table 2.
  • 4.  ISSN: 2088-8708 IJECE Vol. 7, No. 1, February 2017 : 521 – 525 524 Table 2. Resultant Polynomial Vs [4], Tested With 300,000 Combinations HD Polynomial 1 bit 2 bits 3 bits 4 bits 5 bits 6 bits No. of Undetected Errors Resultant 0x9947 5 0 0 0 0 57 1163 1220 [4] 0xC86C 6 0 0 0 0 0 2191 2191 It is clear that the new resultant polynomial is able to detect more error cases than the previous one, and thus [4]'s as well. The number of undetected error probabilities has decreased significantly from the previous experiment, resulting in 57 compared with 183 from the previous experiment, for 5-bits. The improvement in 6-bits was not significant but nonetheless still better by 104 undetected error probabilities. In order to validate the effect of encryption in lowering the number of undetected errors, another experiment was conducted. This time, a data word size of 112 was used and the highest possible polynomial degree was 16. Bit error cases ranged from 1 to 6 bits, and 400,000 combinations at most, were tested for each case. The HD constraint was left as is, with a minimum value of 6. Table 3 shows the resultant polynomial, the number of undetected errors, the number of undetected errors with encryption, and the number of undetected errors with encryption along with a header of one-byte size, where 4 million combinations of 6-bit errors have been randomly chosen and tested. The data word size was 112 bit. The benefit of adding encryption as well as a header can be clearly seen. The number of undetected error probabilities without encryption and a header was 141. Adding encryption reduced it to 60 and adding a header along with encryption decreased it even further, enabling the CRC implementation to catch all possible errors. Table 3. No. Of Undetected Error Probabilities for the Polynomial 0x8948 Polynomial CRC CRC and Encryption CRC and Encryption with Header 0x8948 141 60 0 4. CONCLUSION AND FUTURE WORK Our work showed how using a GA approach decreased the number of possible solution candidates for finding an optimal polynomial for use in a CRC implementation. We compared the resultant polynomials against a benchmark [4] for a data word length of 48 bits. We also evaluated the effect of encryption on data headers in a CRC implementation; we found that encryption improves performance of a CRC implementation. Our evaluation, however, is not comprehensive which leaves room for future work. A more thorough evaluation of using GA for different data word lengths and CRC bit length would add strength to the proposal at hand. Similarly, a thorough benchmark analysis of resultant polynomials using GA for the various data word lengths and CRC bit length would prove the validity of our method across a wider scope of CRC implementations. ACKNOWLEDGEMENTS The researchers wish to thank Universiti Kebangsaan Malaysia (UKM) for supporting this work by research grants: Dana Impak Perdana (DIP-2014-037). REFERENCES [1] P. Koopman and T. Chakravarty, “Cyclic Redundancy Code (CRC) Polynomial Selection For Embedded Networks”, Int. Conf. Dependable Syst. Networks, 2004, pp. 1–11, 2004. [2] V. Chea, M.V. Martin, and R. Liscano, “Hamming distance as a metric for the detection of crc-based side-channel communications in 802.11 wireless networks”, in IEEE conference on communications and network security (cns), 2015, pp. 218–226. [3] Y. Wu and Y. Qiu, “The 8-bit parallel crc-32 research and implementation in usb 3.0”, in International conference on Computer science service system (csss), 2012, pp. 1079–1082. [4] T. Baicheva, S. Dodunekov, and P. Kazakov, “Undetected error probability performance of cyclic redundancy- check codes of 16-bit redundancy”, in IEE Proceedings - Communications, vol. 147, no. 5, pp. 253–256. [5] F. Monteiro, A. Dandache, A. M’Sir, and B. Lepley, “A polynomial division pipelined architecture for crc error detecting codes”, in The 13th international conference on Microelectronics, 2001, vol. 13, pp. 133–136.
  • 5. IJECE ISSN: 2088-8708  New Heuristic Model for Optimal CRC Polynomial (Ahmed Salih Khirbeet) 525 [6] J.S. Lin, C.K. Lee, M.D. Shieh, and J.H. Chen, “High-speed crc design for 10 gbps applications”, in IEEE international symposium on circuits and systems, 2006, p. 4. [7] G. Castagnoli, S. Brauer, and M. Herrmann, “Optimization of cyclic redundancy-check codes with 24 and 32 parity bits”, IEEE Trans. Commun., vol. 41, no. 6, pp. 883–892, 1993. [8] P. Koopman, “32-bit cyclic redundancy codes for internet applications”, in International conference on dependable systems and networks, 2002, pp. 459–468. [9] K. Witzke and C. Leung, “A comparison of some error detecting crc code standards”, IEEE Trans. Commun., vol. 33, no. 9, pp. 996–998, 1985. [10] M. Mitchell, An introduction to genetic algorithms. Bradford Books, 1998. [11] J. Mohammed, “Comparative Performance Investigations of Stochastic and Genetic Algorithms Under Fast Dynamically Changing Environment in Smart Antennas”, Int. J. Electr. Comput. Eng., vol. 2, no. 1, pp. 98–105, 2012. [12] N. Jiang, S. Jin, Y. Guo, and Y. He, “Localization of Wireless Sensor Network Based on Genetic Algorithm”, Int. J. Comput. Commun. Control, vol. 8, no. 6, p. 825, 2013. [13] S. Sivanandam and S. Deepa, Introduction to genetic algorithms. Springer Berlin Heidelberg, 2007. [14] “Specification for the advanced encryption standard (AES),” Fed. Inf. Process. Stand. Publ., 2001. BIOGRAPHIES OF AUTHORS Ahmed Salih Khirbeet Research Center for Software Technology and Management (SOFTAM) Faculty of Technology and Information Science University Kebangsaan Malaysia ahmed.salih89@siswa.ukm.edu.my Ravie Chandren Muniyandi Research Center for Software Technology and Management (SOFTAM) Faculty of Technology and Information Science University Kebangsaan Malaysia. ravie@ukm.edu.my