首页 > 最新文献

2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)最新文献

英文 中文
Intelligent Relay Based on Artificial Neural Networks ANN for Transmission Line 基于人工神经网络的传输线智能中继
Raghda Alilouch, F. Slaoui-Hasnaoui
The detection of faults on transmission lines is an essential and important part of power system monitoring and control. Providing high-quality electric power requires an efficient, reliable, and intelligent protection, a system that can handle transmission line outages that result from a variety of random reasons. This system will allow a fast detection and gives an accurate fault location, thus isolating the faulted section and avoiding catastrophic damage to material and human assets.In this paper, the use of artificial neural network algorithm ANN is proposed, which can be implemented in a numerical relay, this approach has been noticed by many researchers in the field of power system protection. ANN is trained using the measurements of the three-phase currents and voltages. The feedforward neural network was used together with the backpropagation algorithm to detect, classify, and localize the fault. To validate the choice of the neural network, a detailed analysis was performed with a different number of hidden layers. Simulation results show that the present artificial neural network-based method performs satisfactorily in detecting, classifying, and locating faults on transmission lines. To test the proposed method, different fault scenarios were simulated
输电线路故障检测是电力系统监测与控制的重要组成部分。提供高质量的电力需要一个高效、可靠和智能的保护系统,一个能够处理由各种随机原因引起的输电线路中断的系统。该系统将允许快速检测并给出准确的故障位置,从而隔离故障部分,避免对物质和人力资产造成灾难性损害。本文提出了利用人工神经网络算法ANN在数值继电器中实现的方法,这种方法已受到电力系统保护领域许多研究者的注意。人工神经网络是通过测量三相电流和电压来训练的。将前馈神经网络与反向传播算法相结合,对故障进行检测、分类和定位。为了验证神经网络的选择,使用不同数量的隐藏层进行了详细的分析。仿真结果表明,基于人工神经网络的故障检测、分类和定位方法具有较好的效果。为了验证该方法,对不同的故障场景进行了仿真
{"title":"Intelligent Relay Based on Artificial Neural Networks ANN for Transmission Line","authors":"Raghda Alilouch, F. Slaoui-Hasnaoui","doi":"10.1109/SETIT54465.2022.9875449","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875449","url":null,"abstract":"The detection of faults on transmission lines is an essential and important part of power system monitoring and control. Providing high-quality electric power requires an efficient, reliable, and intelligent protection, a system that can handle transmission line outages that result from a variety of random reasons. This system will allow a fast detection and gives an accurate fault location, thus isolating the faulted section and avoiding catastrophic damage to material and human assets.In this paper, the use of artificial neural network algorithm ANN is proposed, which can be implemented in a numerical relay, this approach has been noticed by many researchers in the field of power system protection. ANN is trained using the measurements of the three-phase currents and voltages. The feedforward neural network was used together with the backpropagation algorithm to detect, classify, and localize the fault. To validate the choice of the neural network, a detailed analysis was performed with a different number of hidden layers. Simulation results show that the present artificial neural network-based method performs satisfactorily in detecting, classifying, and locating faults on transmission lines. To test the proposed method, different fault scenarios were simulated","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129366578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Refinement Approach for Node Localization Using Dynamic Cell Structures Neural Networks 基于动态细胞结构神经网络的节点定位改进方法
Mohsen Othmani, T. Ezzedine
Wireless Sensor Network (WSN) localization is still an open topic for improvement and continues to prove its necessity in our daily life in parallel with the technological evolution and our needs in various fields. The issue of energy efficiency and network lifetime extension, localization, secure data communication, latency reduction, efficient quality of service, data communication assurance, high scalability also remain topics for improvement.In a context of indoor localization based on learning a database of collected RSSI values, we detail how to proceed with a refinement approach in order to gain in memory, execution time, and localization accuracy. We took advantage of our previous studies in which dynamic cell structure neural networks (DCSNN) have proven superior performance to apply our approach.The results obtained show a memory gain of 82% relative to the data to be extracted from the training database and to be learned, and consequently a gain in execution time and energy consumed. The precision of the coordinates is about 0.031m.Note that the training database is presented as a matrix of RSSI (Received Signal Strength Indicator) values collected by the anchor nodes for each reference point.
随着技术的发展和各个领域的需求,无线传感器网络(WSN)的定位仍然是一个有待改进的开放话题,并不断证明其在我们日常生活中的必要性。能源效率和网络寿命延长、本地化、安全数据通信、降低延迟、高效服务质量、数据通信保证、高可扩展性等问题也仍有待改进。在基于学习收集的RSSI值数据库进行室内定位的背景下,我们详细介绍了如何使用改进方法来获得内存、执行时间和定位精度。我们利用我们之前的研究,其中动态细胞结构神经网络(DCSNN)已经证明了优越的性能来应用我们的方法。获得的结果显示,相对于从训练数据库中提取和学习的数据,内存增加了82%,因此执行时间和消耗的能量增加了。坐标精度约为0.031m。请注意,训练数据库以锚节点为每个参考点收集的RSSI (Received Signal Strength Indicator,接收信号强度指标)值矩阵的形式呈现。
{"title":"Refinement Approach for Node Localization Using Dynamic Cell Structures Neural Networks","authors":"Mohsen Othmani, T. Ezzedine","doi":"10.1109/SETIT54465.2022.9875494","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875494","url":null,"abstract":"Wireless Sensor Network (WSN) localization is still an open topic for improvement and continues to prove its necessity in our daily life in parallel with the technological evolution and our needs in various fields. The issue of energy efficiency and network lifetime extension, localization, secure data communication, latency reduction, efficient quality of service, data communication assurance, high scalability also remain topics for improvement.In a context of indoor localization based on learning a database of collected RSSI values, we detail how to proceed with a refinement approach in order to gain in memory, execution time, and localization accuracy. We took advantage of our previous studies in which dynamic cell structure neural networks (DCSNN) have proven superior performance to apply our approach.The results obtained show a memory gain of 82% relative to the data to be extracted from the training database and to be learned, and consequently a gain in execution time and energy consumed. The precision of the coordinates is about 0.031m.Note that the training database is presented as a matrix of RSSI (Received Signal Strength Indicator) values collected by the anchor nodes for each reference point.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124935653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling, simulation and analysis of BEV and FCEV using Matlab/Simulink 利用Matlab/Simulink对纯电动汽车和纯燃料汽车进行建模、仿真和分析
Oussama Attia, Makram Khalil, Chokri Ben Salah
nowadays, Climate change is one of the big problems we are facing, especially with the continuous rise in fossil fuel combustion engines uses. Presently, the battery electric vehicle BEV is the highly requested vehicle, while fuel cell vehicle FCEV only has an insignificant market share. To justify this, FCEV is analysed and compared to the BEV.This document focus on Matlab-based simulations of electric vehicle systems and fuel cell vehicles in order to predict vehicle performance parameters, Especially the battery, with current demand and charging status depending on the driving cycle.This study also aims to compare battery and hydrogen fuel effects as two sources of power for EVs. We discuss also the benefits of changing a conventional vehicle to an electric vehicle, as well as how we can protect the environment by reducing our gasoline consumption.
如今,气候变化是我们面临的大问题之一,特别是随着化石燃料内燃机使用的不断增加。目前,纯电动汽车BEV是需求量最大的汽车,而燃料电池汽车FCEV的市场份额很小。为了证明这一点,对FCEV进行了分析并与BEV进行了比较。本文主要基于matlab对电动汽车系统和燃料电池汽车进行仿真,以预测汽车性能参数,特别是电池,当前需求和充电状态随行驶周期的变化。这项研究还旨在比较电池和氢燃料作为电动汽车的两种动力来源的影响。我们还讨论了将传统汽车换成电动汽车的好处,以及我们如何通过减少汽油消耗来保护环境。
{"title":"Modeling, simulation and analysis of BEV and FCEV using Matlab/Simulink","authors":"Oussama Attia, Makram Khalil, Chokri Ben Salah","doi":"10.1109/SETIT54465.2022.9875536","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875536","url":null,"abstract":"nowadays, Climate change is one of the big problems we are facing, especially with the continuous rise in fossil fuel combustion engines uses. Presently, the battery electric vehicle BEV is the highly requested vehicle, while fuel cell vehicle FCEV only has an insignificant market share. To justify this, FCEV is analysed and compared to the BEV.This document focus on Matlab-based simulations of electric vehicle systems and fuel cell vehicles in order to predict vehicle performance parameters, Especially the battery, with current demand and charging status depending on the driving cycle.This study also aims to compare battery and hydrogen fuel effects as two sources of power for EVs. We discuss also the benefits of changing a conventional vehicle to an electric vehicle, as well as how we can protect the environment by reducing our gasoline consumption.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127278507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
cybclass: classification approach for cybersecurity in industry 4.0 网络类:工业4.0中网络安全的分类方法
Salma Laazizi, Jihan Ben Azzouz, A. Jemai
Cyberinfrastructure is characterized by a large amount of emerging and dynamic information, requiring a large number of cyber-criminals trying to acquire information, data mining, machine learning, measurements, and other interdisciplinary skills to meet the cybersecurity issues in Industry 4.0. Machine learning and information mining play an important role in cybersecurity, and unstable information frequently has a high-dimensional feature space. The presence of several noisy characteristics among high-dimensional features might impede and degrade classifier performance. To address this issue, feature selection and subspace methods have been put out and assessed during the past few years. In this paper, four classification techniques and a feature selection strategy are implemented to detect attacks that threaten Industry 4.0. These techniques are Random Forest (RF), Decision Trees (J48), Support Vector Machines (SVM), and Naive Bayes (NB) with Feature Selection Strategy (CFS). Several experiments have been performed using the train and test NSL-KDD datasets with good results. These are based on four categories: Denial of Service (DoS) attack, Probing Attack, User-to-Root (U2R) attack, and Remote-to-Local (R2L) attack. To improve the detection rate of these attacks, a strategy combining multiple classification algorithms is implemented.
网络基础设施具有大量新兴和动态信息的特点,需要大量网络犯罪分子试图获取信息、数据挖掘、机器学习、测量等跨学科技能,以满足工业4.0中的网络安全问题。机器学习和信息挖掘在网络安全中发挥着重要作用,不稳定信息往往具有高维特征空间。在高维特征中存在一些噪声特征可能会阻碍和降低分类器的性能。为了解决这个问题,在过去的几年里,人们提出并评估了特征选择和子空间方法。本文采用了四种分类技术和一种特征选择策略来检测威胁工业4.0的攻击。这些技术是随机森林(RF),决策树(J48),支持向量机(SVM)和朴素贝叶斯(NB)与特征选择策略(CFS)。利用训练和测试NSL-KDD数据集进行了多次实验,取得了良好的效果。这些攻击基于四种类型:拒绝服务(DoS)攻击、探测攻击、用户到根(U2R)攻击和远程到本地(R2L)攻击。为了提高这些攻击的检出率,采用了多种分类算法相结合的策略。
{"title":"cybclass: classification approach for cybersecurity in industry 4.0","authors":"Salma Laazizi, Jihan Ben Azzouz, A. Jemai","doi":"10.1109/SETIT54465.2022.9875643","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875643","url":null,"abstract":"Cyberinfrastructure is characterized by a large amount of emerging and dynamic information, requiring a large number of cyber-criminals trying to acquire information, data mining, machine learning, measurements, and other interdisciplinary skills to meet the cybersecurity issues in Industry 4.0. Machine learning and information mining play an important role in cybersecurity, and unstable information frequently has a high-dimensional feature space. The presence of several noisy characteristics among high-dimensional features might impede and degrade classifier performance. To address this issue, feature selection and subspace methods have been put out and assessed during the past few years. In this paper, four classification techniques and a feature selection strategy are implemented to detect attacks that threaten Industry 4.0. These techniques are Random Forest (RF), Decision Trees (J48), Support Vector Machines (SVM), and Naive Bayes (NB) with Feature Selection Strategy (CFS). Several experiments have been performed using the train and test NSL-KDD datasets with good results. These are based on four categories: Denial of Service (DoS) attack, Probing Attack, User-to-Root (U2R) attack, and Remote-to-Local (R2L) attack. To improve the detection rate of these attacks, a strategy combining multiple classification algorithms is implemented.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121872499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum cryptography for the benefit of API keys safety 量子加密有利于API密钥的安全
Aymen Ramadhan Ghilen, Amel Mohamed Zahou, Wiem Abedelmonem Ben Khalifa
To cope with the unauthorized access to the cloud treasure of resources and services, several cloud service providers implement the API-based access control approach and grant thus a full authentication of any client application. Once called, each cloud API (Application Programming Interface) is required to authenticate through a secret access key, commonly termed API key. A plethora of security risks is associated with these keys whether during their generation, storage, or utilization. The hardware secure element-based proposal aims for an end-to-end security between a cloud service provider and a client application. To ensure a reliable and secure API key exchange, the concerned entities rely on Public Key Infrastructure (PKI). As soon as an adversary acquires an unbounded computing power, it would be easy to intercept the keys and then unlock the gate behind the valuables over the cloud. In this paper, we propose a revised scheme that discards the PKI and installs a quantum mechanism to mutually authenticate the secure element and the cloud service provider by establishing a set of shared keys. A pioneering absolute security of the presented approach is warranted by the principles of quantum physics. To analyze the security of the quantum technology, we establish a formal verification based on PRISM model checking tool. We outstandingly focus on satisfying two prominent properties: (i) both the parties engaged in the quantum protocol are able to detect any disallowed eavesdropping and (ii) the valid amount of information caught by an adversary on the installed key must be negligible.
为了应对对云资源和服务宝库的未经授权的访问,一些云服务提供商实现了基于api的访问控制方法,并因此授予任何客户端应用程序的完整身份验证。一旦被调用,每个云API(应用程序编程接口)都需要通过一个秘密访问密钥(通常称为API密钥)进行身份验证。无论是在密钥的生成、存储还是使用过程中,大量的安全风险都与这些密钥相关。基于硬件安全元素的建议旨在实现云服务提供商和客户端应用程序之间的端到端安全性。为确保可靠和安全的API密码匙交换,有关实体依靠公开密码匙基础设施(PKI)。一旦对手获得了无限的计算能力,就很容易拦截密钥,然后在云上打开贵重物品背后的大门。在本文中,我们提出了一个改进方案,该方案抛弃了PKI,并安装了一个量子机制,通过建立一组共享密钥来相互认证安全元素和云服务提供商。量子物理原理保证了所提出方法的开创性绝对安全性。为了分析量子技术的安全性,我们建立了一个基于PRISM模型检验工具的形式化验证。我们特别注重满足两个突出的特性:(i)参与量子协议的双方都能够检测到任何不被允许的窃听;(ii)对手在安装的密钥上捕获的有效信息量必须可以忽略不计。
{"title":"Quantum cryptography for the benefit of API keys safety","authors":"Aymen Ramadhan Ghilen, Amel Mohamed Zahou, Wiem Abedelmonem Ben Khalifa","doi":"10.1109/SETIT54465.2022.9875712","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875712","url":null,"abstract":"To cope with the unauthorized access to the cloud treasure of resources and services, several cloud service providers implement the API-based access control approach and grant thus a full authentication of any client application. Once called, each cloud API (Application Programming Interface) is required to authenticate through a secret access key, commonly termed API key. A plethora of security risks is associated with these keys whether during their generation, storage, or utilization. The hardware secure element-based proposal aims for an end-to-end security between a cloud service provider and a client application. To ensure a reliable and secure API key exchange, the concerned entities rely on Public Key Infrastructure (PKI). As soon as an adversary acquires an unbounded computing power, it would be easy to intercept the keys and then unlock the gate behind the valuables over the cloud. In this paper, we propose a revised scheme that discards the PKI and installs a quantum mechanism to mutually authenticate the secure element and the cloud service provider by establishing a set of shared keys. A pioneering absolute security of the presented approach is warranted by the principles of quantum physics. To analyze the security of the quantum technology, we establish a formal verification based on PRISM model checking tool. We outstandingly focus on satisfying two prominent properties: (i) both the parties engaged in the quantum protocol are able to detect any disallowed eavesdropping and (ii) the valid amount of information caught by an adversary on the installed key must be negligible.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121931630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of an Embedded Vision System for Industrial Inspection 工业检测嵌入式视觉系统的设计与实现
Intissar Sayahi, Sarra Ismail
Nowadays, the advantages offered by image processing and deep learning increased their efficiency popularity. Thus, vision systems are widely motivating researchers to develop new protocols and features to optimize existing ones. Of course, technical challenges do not lack since the integration of image acquisition and processing units industrial environment poses considerable problems. In context, we adopted in our work the hybrid approach combining hardware design and software development. This approach makes the system compact, robust and reliable, especially in industrial field to ensure several operations quality inspection and verification. The proposed solution is to design an industrial embedded vision system that matches scalable hardware architectures to adaptable algorithms. this paper, we propose an efficient model to automate quality control in an industrial production line. This work aims to integrate the concept of the multi-tasking image processing in the manufacturing field by offering a whole pack of various inspection operations, from surface to dimensional inspections, based on simple hardware implementations, optical setups, and deep learning algorithms.
如今,图像处理和深度学习所提供的优势增加了它们的效率和普及程度。因此,视觉系统正在广泛激励研究人员开发新的协议和功能来优化现有的协议和功能。当然,技术上的挑战也不缺少,因为图像采集和处理单元的集成在工业环境中提出了相当大的问题。在上下文中,我们在工作中采用了硬件设计和软件开发相结合的混合方法。这种方法使系统结构紧凑、鲁棒性强、可靠性高,尤其在工业现场保证了多次操作的质量检验和验证。提出的解决方案是设计一个工业嵌入式视觉系统,将可扩展的硬件架构与自适应算法相匹配。本文提出了一种有效的自动化工业生产线质量控制模型。这项工作旨在通过提供一整套基于简单硬件实现、光学设置和深度学习算法的各种检测操作,从表面到尺寸检测,将多任务图像处理的概念整合到制造领域。
{"title":"Design and Implementation of an Embedded Vision System for Industrial Inspection","authors":"Intissar Sayahi, Sarra Ismail","doi":"10.1109/SETIT54465.2022.9875471","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875471","url":null,"abstract":"Nowadays, the advantages offered by image processing and deep learning increased their efficiency popularity. Thus, vision systems are widely motivating researchers to develop new protocols and features to optimize existing ones. Of course, technical challenges do not lack since the integration of image acquisition and processing units industrial environment poses considerable problems. In context, we adopted in our work the hybrid approach combining hardware design and software development. This approach makes the system compact, robust and reliable, especially in industrial field to ensure several operations quality inspection and verification. The proposed solution is to design an industrial embedded vision system that matches scalable hardware architectures to adaptable algorithms. this paper, we propose an efficient model to automate quality control in an industrial production line. This work aims to integrate the concept of the multi-tasking image processing in the manufacturing field by offering a whole pack of various inspection operations, from surface to dimensional inspections, based on simple hardware implementations, optical setups, and deep learning algorithms.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114862134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TD-MQTT: Transparent Distributed MQTT Brokers for Horizontal IoT Applications TD-MQTT:用于水平物联网应用的透明分布式MQTT代理
Fatma Hmissi, Sofiane Ouni
MQTT (Message Queuing Telemetry Transport) has become the perfect messaging protocol for IoT (Internet of Things) systems since it is the lightest protocol designed for low bandwidth, high-latency, unreliable networks. Today, the strategy of distributing several MQTT brokers on the networks is widely used because the strategy of using a single broker is no longer efficient. However, in the distributing architectures of MQTT brokers, a subscriber should have prior knowledge about the address of the broker that publishes the data on the topics of interest. In this paper, we tackle this challenge by proposing a mechanism that connects the subscribers to the brokers in a transparent way. The proposed approach, known as TD-MQTT (Transparent Distributed MQTT brokers), requires no prior knowledge of the brokers by the subscribers. The data will be carried automatically from brokers that can change their configuration and location. The transparency will help to use IoT data without worrying about their location and dynamic configuration changes. To evaluate our approach, we compared it with the basic distributed MQTT and the EMMA (MQTT Middle-ware for Edge Computing Applications) approach. The results of the evaluation show that TD-MQTT is much better than the standard MQTT, especially in terms of response time.
MQTT(消息队列遥测传输)已经成为IoT(物联网)系统的完美消息传递协议,因为它是为低带宽,高延迟,不可靠的网络设计的最轻的协议。如今,在网络上分布多个MQTT代理的策略被广泛使用,因为使用单个代理的策略不再有效。但是,在MQTT代理的分布式体系结构中,订阅者应该事先知道发布有关感兴趣主题的数据的代理的地址。在本文中,我们通过提出一种以透明的方式将订阅者连接到代理的机制来解决这一挑战。所建议的方法称为TD-MQTT(透明分布式MQTT代理),它不需要订阅者事先了解代理。数据将从可以更改其配置和位置的代理自动传输。透明度将有助于使用物联网数据,而无需担心其位置和动态配置变化。为了评估我们的方法,我们将其与基本的分布式MQTT和EMMA(用于边缘计算应用程序的MQTT中间件)方法进行了比较。评估结果表明,TD-MQTT比标准MQTT要好得多,特别是在响应时间方面。
{"title":"TD-MQTT: Transparent Distributed MQTT Brokers for Horizontal IoT Applications","authors":"Fatma Hmissi, Sofiane Ouni","doi":"10.1109/SETIT54465.2022.9875881","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875881","url":null,"abstract":"MQTT (Message Queuing Telemetry Transport) has become the perfect messaging protocol for IoT (Internet of Things) systems since it is the lightest protocol designed for low bandwidth, high-latency, unreliable networks. Today, the strategy of distributing several MQTT brokers on the networks is widely used because the strategy of using a single broker is no longer efficient. However, in the distributing architectures of MQTT brokers, a subscriber should have prior knowledge about the address of the broker that publishes the data on the topics of interest. In this paper, we tackle this challenge by proposing a mechanism that connects the subscribers to the brokers in a transparent way. The proposed approach, known as TD-MQTT (Transparent Distributed MQTT brokers), requires no prior knowledge of the brokers by the subscribers. The data will be carried automatically from brokers that can change their configuration and location. The transparency will help to use IoT data without worrying about their location and dynamic configuration changes. To evaluate our approach, we compared it with the basic distributed MQTT and the EMMA (MQTT Middle-ware for Edge Computing Applications) approach. The results of the evaluation show that TD-MQTT is much better than the standard MQTT, especially in terms of response time.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127759912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Traffic Sign recognition for smart vehicles based on lightweight CNN implementation on mobile devices 基于移动设备上轻量级CNN实现的智能车辆交通标志识别
R. Ayachi, Mouna Afif, Y. Said, A. B. Abdelali
The concept of smart vehicles is becoming an essential feature that ensures driver comfort and security. Smart vehicles are equipped with intelligent systems based on advanced technologies that perform a set of tasks for the mentioned purposes. Recognizing Traffic sign is one the most important systems that guarantee a high-security level. However, it is difficult to develop the best traffic sign recognition system due to numerous obstacles. such as weather conditions, geometric deformation, and most important is the material limitation. In this work, we proposed the implementation of a lightweight convolutional neural network (CNN) model on a mobile device to overcome the mentioned challenges. The proposed CNN combines high performances and low computation complexity. Evaluating the proposed model on publicly available datasets proved its efficiency. Besides, the implementation of the CNN model on the pynq platform demonstrates the possibility of using a wide range of mobile devices for the inference of the proposed model.
智能汽车的概念正在成为确保驾驶员舒适和安全的基本特征。智能车辆配备了基于先进技术的智能系统,可以执行上述目的的一系列任务。交通标志识别是保证交通安全的重要系统之一。然而,由于障碍众多,很难开发出最佳的交通标志识别系统。如天气条件,几何变形,最重要的是材料的限制。在这项工作中,我们提出了在移动设备上实现轻量级卷积神经网络(CNN)模型来克服上述挑战。本文提出的CNN结合了高性能和低计算复杂度。通过对公开数据集的评估,证明了该模型的有效性。此外,CNN模型在pynq平台上的实现证明了使用广泛的移动设备对所提出的模型进行推理的可能性。
{"title":"Traffic Sign recognition for smart vehicles based on lightweight CNN implementation on mobile devices","authors":"R. Ayachi, Mouna Afif, Y. Said, A. B. Abdelali","doi":"10.1109/SETIT54465.2022.9875912","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875912","url":null,"abstract":"The concept of smart vehicles is becoming an essential feature that ensures driver comfort and security. Smart vehicles are equipped with intelligent systems based on advanced technologies that perform a set of tasks for the mentioned purposes. Recognizing Traffic sign is one the most important systems that guarantee a high-security level. However, it is difficult to develop the best traffic sign recognition system due to numerous obstacles. such as weather conditions, geometric deformation, and most important is the material limitation. In this work, we proposed the implementation of a lightweight convolutional neural network (CNN) model on a mobile device to overcome the mentioned challenges. The proposed CNN combines high performances and low computation complexity. Evaluating the proposed model on publicly available datasets proved its efficiency. Besides, the implementation of the CNN model on the pynq platform demonstrates the possibility of using a wide range of mobile devices for the inference of the proposed model.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126550429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Low-Noise Injection-Locked Ring Oscillator for biomedical implants applications 用于生物医学植入物的低噪声注射锁定环形振荡器
Nadia Gargouri, M. Samet, Z. Sakka
This paper presents an Injection Locked Ring Oscillator (ILRO) for use in biomedical implants applications. A pulse injection locking method has been desired for ring oscillator performance enhancement and phase noise cancellation. In addition, the frequency is controlled independently of the biasing circuit using an inversion mode MOS voltage controlled capacitor (varactor).Designed in a 0.18-μm CMOS, this ILRO works inthe ISM band of 902–928 GHz and consumes a lowpower of 4.62 mW under 1.8V power supply. The phase noise of -121.6dBc /Hz at 1MHzoffset frequency was obtained at 76 MHz inputinjection pulse.The proposed circuit can achieve a FoM of -174.19 dBc/Hz.
本文介绍了一种用于生物医学植入物的注射锁环振荡器(ILRO)。为了提高环形振荡器的性能和消除相位噪声,需要一种脉冲注入锁定方法。此外,频率控制独立于偏置电路,使用反转模式MOS压控电容器(变容管)。该ILRO采用0.18 μm CMOS设计,工作在902-928 GHz的ISM频段,在1.8V电源下功耗为4.62 mW。在76 MHz输入注入脉冲下,在1mhz偏置频率下得到-121.6dBc /Hz的相位噪声。该电路可实现-174.19 dBc/Hz的波形。
{"title":"A Low-Noise Injection-Locked Ring Oscillator for biomedical implants applications","authors":"Nadia Gargouri, M. Samet, Z. Sakka","doi":"10.1109/SETIT54465.2022.9875516","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875516","url":null,"abstract":"This paper presents an Injection Locked Ring Oscillator (ILRO) for use in biomedical implants applications. A pulse injection locking method has been desired for ring oscillator performance enhancement and phase noise cancellation. In addition, the frequency is controlled independently of the biasing circuit using an inversion mode MOS voltage controlled capacitor (varactor).Designed in a 0.18-μm CMOS, this ILRO works inthe ISM band of 902–928 GHz and consumes a lowpower of 4.62 mW under 1.8V power supply. The phase noise of -121.6dBc /Hz at 1MHzoffset frequency was obtained at 76 MHz inputinjection pulse.The proposed circuit can achieve a FoM of -174.19 dBc/Hz.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129894902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bibliometric study about chaotic cryptography in developing countries 发展中国家混沌密码学文献计量学研究
Salma Ben Mamia, J. Kasperiūnienė, W. Puech, K. Bouallegue
In this paper, an analyse of scientific journal articles related to chaotic cryptography from 2015 to 2021, is presented. In doing so, the study uses the Web of Science Core Collection database to analyze the data. ‘biblioshiny’ a web-interface of the ‘bibliometrix 3.0’ package of R-studio has been deployed to conduct bibliometric analysis. Also, a graphical mapping of the bibliometric material by using the visualization of similarities (VOS) viewer software, was developed. The study relies on the proposed approach to explore the influence of developing countries on Chaos-based encryption. We found out that developing countries are the most active on chaotic cryptography.
本文对2015年至2021年与混沌密码学相关的科学期刊文章进行了分析。在此过程中,该研究使用Web of Science Core Collection数据库来分析数据。“biblioshiny”是R-studio的“bibliometrix 3.0”软件包的一个网络界面,用于进行文献计量分析。此外,利用相似度可视化(VOS)查看器软件,开发了文献计量资料的图形映射。该研究依赖于提出的方法来探索发展中国家对基于混沌的加密的影响。我们发现,发展中国家对混沌密码最为活跃。
{"title":"Bibliometric study about chaotic cryptography in developing countries","authors":"Salma Ben Mamia, J. Kasperiūnienė, W. Puech, K. Bouallegue","doi":"10.1109/SETIT54465.2022.9875676","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875676","url":null,"abstract":"In this paper, an analyse of scientific journal articles related to chaotic cryptography from 2015 to 2021, is presented. In doing so, the study uses the Web of Science Core Collection database to analyze the data. ‘biblioshiny’ a web-interface of the ‘bibliometrix 3.0’ package of R-studio has been deployed to conduct bibliometric analysis. Also, a graphical mapping of the bibliometric material by using the visualization of similarities (VOS) viewer software, was developed. The study relies on the proposed approach to explore the influence of developing countries on Chaos-based encryption. We found out that developing countries are the most active on chaotic cryptography.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131581005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1