首页 > 最新文献

2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)最新文献

英文 中文
Towards new hybrid approach of the reverse engineering of UML sequence diagram 面向UML序列图逆向工程的新混合方法
C. Baidada, A. Jakimi
To fully understand the behavior of a program, it is important to have automatic techniques that generate UML (Unified Modeling Language) models representing the behavior of the system. Reverse engineering techniques, either through dynamic analysis of the running application or static analysis of the source code, are used to help gain this understanding. Each type of technique has its limitations. The major limitation of dynamic analysis is the need of a system expert user who knows the different behaviors of the system. Static analysis has also limits especially with dynamic links and polymorphism states. In this paper, we propose an approach to automatically extract UML sequence diagrams from object-oriented programming languages. Our approach combines dynamic and static analyses to get the best of both approaches. Our method uses static analysis to identify all different system entries values that can be used to guide the dynamic analysis.
为了完全理解程序的行为,重要的是要有自动生成UML(统一建模语言)模型的技术来表示系统的行为。通过对运行的应用程序进行动态分析或对源代码进行静态分析,可以使用逆向工程技术来帮助获得这种理解。每种技术都有其局限性。动态分析的主要限制是需要了解系统不同行为的系统专家用户。静态分析也有限制,特别是动态链接和多态性状态。本文提出了一种从面向对象编程语言中自动提取UML序列图的方法。我们的方法结合了动态和静态分析,以获得两种方法的最佳效果。我们的方法使用静态分析来识别所有不同的系统条目值,这些值可以用来指导动态分析。
{"title":"Towards new hybrid approach of the reverse engineering of UML sequence diagram","authors":"C. Baidada, A. Jakimi","doi":"10.1109/CIST.2016.7805035","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805035","url":null,"abstract":"To fully understand the behavior of a program, it is important to have automatic techniques that generate UML (Unified Modeling Language) models representing the behavior of the system. Reverse engineering techniques, either through dynamic analysis of the running application or static analysis of the source code, are used to help gain this understanding. Each type of technique has its limitations. The major limitation of dynamic analysis is the need of a system expert user who knows the different behaviors of the system. Static analysis has also limits especially with dynamic links and polymorphism states. In this paper, we propose an approach to automatically extract UML sequence diagrams from object-oriented programming languages. Our approach combines dynamic and static analyses to get the best of both approaches. Our method uses static analysis to identify all different system entries values that can be used to guide the dynamic analysis.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115549729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Skeleton of a generic approach for the generation of health indicators of physical systems 生成物理系统健康指标的通用方法的框架
M. Sekkal, N. Berrached, K. Medjaher, C. Varnier
Predictive maintenance of physical systems can only be achieved by monitoring their most critical elements to track their health assessment during operation. The acquired data is processed to extract relevant features, which are used to estimate the state of the system at any time and detect any loss of performance that may occur due to the critical element. We propose in this work an architecture of generic method to supervise this critical element and generate a Health Indicator (HI) for the physical system. The generated HI takes into account the evolution in time of the healthy status of the physical systems. The proposed method is based on sensors data that allow us to extract in real time the values of features constituting themselves the HI construction bloc input, through several HI obtaining test. Block diagram of the approach is made, then checked using benchmark data taken from “NASA data repository prognosis” associated to an element used in different operating conditions are checked. This approach is classified as data driven method which use sensors data that inform us about the real-time values of features.
物理系统的预测性维护只能通过监测其最关键的元素来跟踪其运行期间的健康评估来实现。对获取的数据进行处理,提取相关特征,用于随时估计系统的状态,并检测由于关键因素可能导致的任何性能损失。在这项工作中,我们提出了一个通用方法的架构来监督这个关键元素,并为物理系统生成一个健康指标(HI)。生成的HI考虑了物理系统健康状态随时间的变化。该方法基于传感器数据,通过多次HI获取测试,可以实时提取构成HI构建块输入的特征值。制作了该方法的框图,然后使用取自“NASA数据存储库预测”的基准数据对不同操作条件下使用的元素进行检查。这种方法被归类为数据驱动方法,它使用传感器数据来告诉我们特征的实时值。
{"title":"Skeleton of a generic approach for the generation of health indicators of physical systems","authors":"M. Sekkal, N. Berrached, K. Medjaher, C. Varnier","doi":"10.1109/CIST.2016.7804960","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804960","url":null,"abstract":"Predictive maintenance of physical systems can only be achieved by monitoring their most critical elements to track their health assessment during operation. The acquired data is processed to extract relevant features, which are used to estimate the state of the system at any time and detect any loss of performance that may occur due to the critical element. We propose in this work an architecture of generic method to supervise this critical element and generate a Health Indicator (HI) for the physical system. The generated HI takes into account the evolution in time of the healthy status of the physical systems. The proposed method is based on sensors data that allow us to extract in real time the values of features constituting themselves the HI construction bloc input, through several HI obtaining test. Block diagram of the approach is made, then checked using benchmark data taken from “NASA data repository prognosis” associated to an element used in different operating conditions are checked. This approach is classified as data driven method which use sensors data that inform us about the real-time values of features.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116039875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Microfinance risk analysis using the business intelligence 利用商业智能进行小额信贷风险分析
Tarik Hajji, Sidi Yasser El Jasouli, J. Mbarki, E. Jaâra
This paper discusses the use of analytical software solutions in microfinance institutions and how it can improve the operations of the organization. The study has been conducted through a survey from MFIs located in various countries of Africa, Europe and Asia. The survey questions have been based on the kind of software solutions MFIs use and if they are able to benefit from it. Moreover, with this survey we have tried to find out if the MFIs are willing to adopt the new technologies in their system by using software solutions. The survey has been conducted with MFIs in located in different countries. Besides MFIs, the respondents included banks as well.
本文讨论了分析软件解决方案在小额信贷机构中的使用,以及它如何改善组织的运营。这项研究是通过对非洲、欧洲和亚洲各国的小额信贷机构进行调查而进行的。调查问题是基于小额信贷机构使用的软件解决方案的类型,以及他们是否能够从中受益。此外,通过这项调查,我们试图找出小额信贷机构是否愿意通过使用软件解决方案在其系统中采用新技术。这项调查是在不同国家的小额信贷机构进行的。除了小额信贷机构,受访者还包括银行。
{"title":"Microfinance risk analysis using the business intelligence","authors":"Tarik Hajji, Sidi Yasser El Jasouli, J. Mbarki, E. Jaâra","doi":"10.1109/CIST.2016.7804971","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804971","url":null,"abstract":"This paper discusses the use of analytical software solutions in microfinance institutions and how it can improve the operations of the organization. The study has been conducted through a survey from MFIs located in various countries of Africa, Europe and Asia. The survey questions have been based on the kind of software solutions MFIs use and if they are able to benefit from it. Moreover, with this survey we have tried to find out if the MFIs are willing to adopt the new technologies in their system by using software solutions. The survey has been conducted with MFIs in located in different countries. Besides MFIs, the respondents included banks as well.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116185814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Protection mechanisms for signaling DoS attacks on 3G mobile networks: Comparative study and future perspectives 3G移动网络信令DoS攻击的保护机制:比较研究和未来展望
Raja Ettiane, R. Elkouch, A. Chaoub
3G mobile networks have gained high user popularity due to the tremendous growth of the smart phone market. However, their complex signaling procedures and limited soft capacity made them vulnerable to new denial-of-service (DoS) attacks involving the control plane. More importantly, this type of frauds can also affect the successors of the 3G and their related paradigms such as smart cities. In this paper, we deeply examine the considerable signaling load of the IDLE-DCH state transitions that can be exploited by malicious entities to launch signaling DoS attacks. Besides, we investigate some state-of-art techniques proposed to combat the signaling attacks. A comparative analysis between these solutions has been conducted with regard to three pertinent criteria: cost, efficiency and overhead. The summary of results indicates that even though the randomization experiences some flaws related to the radio channel consumption, it presents the most optimal cost and overhead compared to the remaining solutions. This study opens up a new horizon for more secure 3G systems based on the randomization defense mechanisms.
由于智能手机市场的巨大增长,3G移动网络获得了很高的用户普及率。然而,它们复杂的信号过程和有限的软容量使它们容易受到涉及控制平面的新的拒绝服务(DoS)攻击。更重要的是,这种类型的欺诈也会影响3G的后继者及其相关范例,如智慧城市。在本文中,我们深入研究了IDLE-DCH状态转换的相当大的信令负载,恶意实体可以利用这些负载来发起信令DoS攻击。此外,我们还研究了一些最新提出的对抗信令攻击的技术。对这些解决办法进行了关于三个有关标准的比较分析:成本、效率和间接费用。结果表明,尽管随机化在无线电信道消耗方面存在一些缺陷,但与其他解决方案相比,它具有最优的成本和开销。本研究为基于随机化防御机制的更安全的3G系统开辟了新的视野。
{"title":"Protection mechanisms for signaling DoS attacks on 3G mobile networks: Comparative study and future perspectives","authors":"Raja Ettiane, R. Elkouch, A. Chaoub","doi":"10.1109/CIST.2016.7805009","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805009","url":null,"abstract":"3G mobile networks have gained high user popularity due to the tremendous growth of the smart phone market. However, their complex signaling procedures and limited soft capacity made them vulnerable to new denial-of-service (DoS) attacks involving the control plane. More importantly, this type of frauds can also affect the successors of the 3G and their related paradigms such as smart cities. In this paper, we deeply examine the considerable signaling load of the IDLE-DCH state transitions that can be exploited by malicious entities to launch signaling DoS attacks. Besides, we investigate some state-of-art techniques proposed to combat the signaling attacks. A comparative analysis between these solutions has been conducted with regard to three pertinent criteria: cost, efficiency and overhead. The summary of results indicates that even though the randomization experiences some flaws related to the radio channel consumption, it presents the most optimal cost and overhead compared to the remaining solutions. This study opens up a new horizon for more secure 3G systems based on the randomization defense mechanisms.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124792918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Personalized search and recommendation in a digital educational resources repository: The case of ORI-OAI 数字化教育资源库中的个性化搜索与推荐:以ORI-OAI为例
Hamid Slimani, N. E. Faddouli, Rachid Benslimane, S. Bennani
The profusion of digital resources, mainly educational ones, inside the Moroccan universities makes it difficult to satisfy students' information needs. Hence, this raises the issue of personalized search and recommendation of Digital Educational Resources (DER) within a repository. In this paper, we propose enriching the repository model ORI-OAI by the following functionalities: the filtering of results based on students' interests, the recommendation of digital educational resources based on their competences and adding of the Arabic language.
摩洛哥大学里大量的数字资源,主要是教育资源,很难满足学生的信息需求。因此,这提出了在存储库中对数字教育资源(DER)进行个性化搜索和推荐的问题。在本文中,我们提出通过以下功能来丰富知识库模型ORI-OAI:基于学生兴趣的结果过滤,基于学生能力的数字教育资源推荐和增加阿拉伯语。
{"title":"Personalized search and recommendation in a digital educational resources repository: The case of ORI-OAI","authors":"Hamid Slimani, N. E. Faddouli, Rachid Benslimane, S. Bennani","doi":"10.1109/CIST.2016.7805108","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805108","url":null,"abstract":"The profusion of digital resources, mainly educational ones, inside the Moroccan universities makes it difficult to satisfy students' information needs. Hence, this raises the issue of personalized search and recommendation of Digital Educational Resources (DER) within a repository. In this paper, we propose enriching the repository model ORI-OAI by the following functionalities: the filtering of results based on students' interests, the recommendation of digital educational resources based on their competences and adding of the Arabic language.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124899727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Robustness study in closed social networks using spanning tree approach 基于生成树方法的封闭社会网络鲁棒性研究
Hajar Sahbani, M. E. Marraki
The mathematical framework of networks is well suited to describe several systems consisting of a large number of entities interacting with each others. Every entity is represented by a network node and each interaction by a link between two nodes. It is therefore possible to model these networks as graphs. In this paper, we present a reliability study for chain topologies based on spanning tree in a social network considered as graph. Our approach consist on finding a general formulae that compute complexities in some special closed networks, which represent an important measure of robustness and reliability, then we compare which topology can be adopted for a more reliable routing.
网络的数学框架非常适合描述由大量相互作用的实体组成的若干系统。每个实体由一个网络节点表示,每个交互由两个节点之间的链接表示。因此,可以将这些网络建模为图。本文提出了一种基于生成树的链式拓扑的可靠性研究方法。我们的方法包括在一些特殊的封闭网络中找到计算复杂性的一般公式,这代表了鲁棒性和可靠性的重要度量,然后我们比较哪种拓扑结构可以采用更可靠的路由。
{"title":"Robustness study in closed social networks using spanning tree approach","authors":"Hajar Sahbani, M. E. Marraki","doi":"10.1109/CIST.2016.7805023","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805023","url":null,"abstract":"The mathematical framework of networks is well suited to describe several systems consisting of a large number of entities interacting with each others. Every entity is represented by a network node and each interaction by a link between two nodes. It is therefore possible to model these networks as graphs. In this paper, we present a reliability study for chain topologies based on spanning tree in a social network considered as graph. Our approach consist on finding a general formulae that compute complexities in some special closed networks, which represent an important measure of robustness and reliability, then we compare which topology can be adopted for a more reliable routing.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128943757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and deployment of the model ‘TSI’ for modeling the processes of the IRFT chain between Morocco and Spain 设计和部署用于模拟摩洛哥和西班牙之间IRFT链过程的“TSI”模型
Kawtar Akoudad, F. Jawab
The objective of this article is to model the processes of an International Road Freight Transport chain (IRFT, henceforth) for an eventual monitoring and optimization of their deadlines. In order to achieve this goal, we have designed an integrated model, that we have named `TSI', by combining three methods; namely, the Top-down approach, the tool `Supplier, Input, Process, Output, Customer' (SIPOC) and method `Integration Definition Language 0' (IDF0). Then we have deployed the model obtained at the level of IRFT chain between Morocco and Spain. This implementation allowed us to decline the chain into three levels (from the chain to macro processes, from macro processes to processes and from processes to activities).
本文的目的是模拟国际公路货运链(IRFT,从今往后)的过程,以便最终监测和优化其最后期限。为了实现这一目标,我们结合三种方法设计了一个集成模型,我们将其命名为“TSI”;即,自顶向下的方法,工具“供应商、输入、过程、输出、客户”(SIPOC)和方法“集成定义语言0”(IDF0)。然后,我们在摩洛哥和西班牙之间的IRFT链层面部署了模型。这个实现允许我们将链分解为三个层次(从链到宏观过程,从宏观过程到过程,从过程到活动)。
{"title":"Design and deployment of the model ‘TSI’ for modeling the processes of the IRFT chain between Morocco and Spain","authors":"Kawtar Akoudad, F. Jawab","doi":"10.1109/CIST.2016.7804980","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804980","url":null,"abstract":"The objective of this article is to model the processes of an International Road Freight Transport chain (IRFT, henceforth) for an eventual monitoring and optimization of their deadlines. In order to achieve this goal, we have designed an integrated model, that we have named `TSI', by combining three methods; namely, the Top-down approach, the tool `Supplier, Input, Process, Output, Customer' (SIPOC) and method `Integration Definition Language 0' (IDF0). Then we have deployed the model obtained at the level of IRFT chain between Morocco and Spain. This implementation allowed us to decline the chain into three levels (from the chain to macro processes, from macro processes to processes and from processes to activities).","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117059130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A probabilistic method for business process verification: Reachability, Liveness and deadlock detection 用于业务流程验证的概率方法:可达性、活动性和死锁检测
Mohamed Naoum, Outman El Hichami, Mohammed Al Achhab, Badr Eddine El Mohajir
In this paper we deal with business process verification for reachability, liveness and deadlock-freeness properties. Actual business process verification techniques use formal methods such as model checking that checks exhaustively temporal logics properties, however, in this case, the business process model must be mapped to an abstract mathematical model (like Petri nets, timed automata or process algebra) on which the verification process could be done. The fact that the verification is done on this second representation can fake the results if the transformation is either erroneous or over-constrained as well as if the proprieties are misspecified. In this article we illustrate that probability calculation can be used in business process verification by evaluating a disjunctive normal form of its conditions, moreover, the verification process could be done directly on the business process model and can handle all its functional elements. We have developed an application that numerically shows the performance of our proposed technique by verifying several workflows with various “known” flaws.
在本文中,我们对业务流程的可达性、活动性和无死锁特性进行验证。实际的业务流程验证技术使用正式的方法,例如模型检查,它彻底检查时间逻辑属性,然而,在这种情况下,业务流程模型必须映射到一个抽象的数学模型(如Petri网、时间自动机或过程代数),验证过程可以在其上完成。如果转换是错误的或过度约束的,以及如果属性被错误指定,那么在第二个表示上进行验证的事实可能会伪造结果。在本文中,我们通过评估其条件的析取范式来说明概率计算可以用于业务流程验证,并且验证过程可以直接在业务流程模型上完成,并且可以处理其所有功能元素。我们已经开发了一个应用程序,该应用程序通过验证具有各种“已知”缺陷的几个工作流,在数字上显示了我们提出的技术的性能。
{"title":"A probabilistic method for business process verification: Reachability, Liveness and deadlock detection","authors":"Mohamed Naoum, Outman El Hichami, Mohammed Al Achhab, Badr Eddine El Mohajir","doi":"10.1109/CIST.2016.7805029","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805029","url":null,"abstract":"In this paper we deal with business process verification for reachability, liveness and deadlock-freeness properties. Actual business process verification techniques use formal methods such as model checking that checks exhaustively temporal logics properties, however, in this case, the business process model must be mapped to an abstract mathematical model (like Petri nets, timed automata or process algebra) on which the verification process could be done. The fact that the verification is done on this second representation can fake the results if the transformation is either erroneous or over-constrained as well as if the proprieties are misspecified. In this article we illustrate that probability calculation can be used in business process verification by evaluating a disjunctive normal form of its conditions, moreover, the verification process could be done directly on the business process model and can handle all its functional elements. We have developed an application that numerically shows the performance of our proposed technique by verifying several workflows with various “known” flaws.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126089227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
High speed efficient FPGA implementation of pipelined AES S-Box 高速高效的FPGA实现流水线AES S-Box
Soufiane Oukili, S. Bri, A. V. S. Kumar
Smart City is becoming a commonly-used term to describe the concept of utilizing information and communication technologies (ICT) to enhance urban services and improve the quality of life for citizens. All communications should be fast and properly protected against unauthorized eavesdropping, interception, and modification. Therefore high speed and strong cryptography is required. Advanced Encryption Standard (AES) is the most widely and secure symmetric key encryption algorithms today. S-box substitution is the only non-linear step in this algorithm. It is one of the most complicated and costly part of the system. In this article, we present high speed efficient S-box AES architecture using combinational logic. We have used 5-stage pipeline design in order to increase the speed and the maximum operation frequency. Therefore registers are inserted in optimal placements. The implementation has been successfully done by virtex-6 (xc6vlx240t) FPGA device using Xilinx ISE 14.7. Our proposed design achieves a frequency of 842.744 MHz and occupied 20 slices, whereas the highest operation frequency reported in the literature is 696.37 MHz using 32 slices.
智慧城市正在成为一个常用术语,用来描述利用信息和通信技术(ICT)增强城市服务和提高市民生活质量的概念。所有的通信都应该快速和适当地防止未经授权的窃听、拦截和修改。因此,需要高速和强密码。高级加密标准(AES)是目前应用最广泛、最安全的对称密钥加密算法。s盒替换是该算法中唯一的非线性步骤。它是系统中最复杂和最昂贵的部分之一。在本文中,我们采用组合逻辑提出了高速高效的S-box AES架构。为了提高速度和最大运行频率,我们采用了5级管道设计。因此,寄存器被插入到最佳位置。采用Xilinx ISE 14.7,采用virtex-6 (xc6vlx240t) FPGA器件成功实现。我们提出的设计实现了842.744 MHz的频率,占用了20个片,而文献中报道的最高工作频率是696.37 MHz,占用了32个片。
{"title":"High speed efficient FPGA implementation of pipelined AES S-Box","authors":"Soufiane Oukili, S. Bri, A. V. S. Kumar","doi":"10.1109/CIST.2016.7805015","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805015","url":null,"abstract":"Smart City is becoming a commonly-used term to describe the concept of utilizing information and communication technologies (ICT) to enhance urban services and improve the quality of life for citizens. All communications should be fast and properly protected against unauthorized eavesdropping, interception, and modification. Therefore high speed and strong cryptography is required. Advanced Encryption Standard (AES) is the most widely and secure symmetric key encryption algorithms today. S-box substitution is the only non-linear step in this algorithm. It is one of the most complicated and costly part of the system. In this article, we present high speed efficient S-box AES architecture using combinational logic. We have used 5-stage pipeline design in order to increase the speed and the maximum operation frequency. Therefore registers are inserted in optimal placements. The implementation has been successfully done by virtex-6 (xc6vlx240t) FPGA device using Xilinx ISE 14.7. Our proposed design achieves a frequency of 842.744 MHz and occupied 20 slices, whereas the highest operation frequency reported in the literature is 696.37 MHz using 32 slices.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114293834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
New routing process in VANET VANET中新的路由过程
M. Laanaoui, S. Raghay
Numerous efforts are currently under progress to enhance the safety and efficiency of vehicular traffic through intelligent transportation systems. In addition, the growing demand for access to data and information from human users on the go has created the need for advanced vehicle-to-vehicle and vehicle to roadside communication systems capable of high data rates and amenable to high degrees of node mobility. The importance of inter-vehicle communication is increasing due to its role in organizing road. In this paper we present our proposition witch consisting of a new routing protocol VANET (vehicle AdHoc Network). This protocol is based on the localization of the node, and also the score assigned to each vehicle and the cost for each junction. We evaluate the performance of our protocol IRUV by comparing it with the VANET protocols: LAR and GyTAR in terms of: End to End Delay, and Delivery Ratio.
目前正在进行许多努力,以通过智能交通系统提高车辆交通的安全性和效率。此外,对人类用户在旅途中获取数据和信息的需求不断增长,这就产生了对先进的车对车和车对路边通信系统的需求,这些系统能够实现高数据速率,并适应高度的节点移动性。由于车际通信在道路组织中的作用,其重要性日益凸显。本文提出了一种新的路由协议VANET (vehicle AdHoc Network)。该协议基于节点的定位,以及分配给每辆车的分数和每个路口的成本。我们通过将我们的协议IRUV与VANET协议LAR和GyTAR在端到端延迟和传输比方面进行比较来评估其性能。
{"title":"New routing process in VANET","authors":"M. Laanaoui, S. Raghay","doi":"10.1109/CIST.2016.7805012","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805012","url":null,"abstract":"Numerous efforts are currently under progress to enhance the safety and efficiency of vehicular traffic through intelligent transportation systems. In addition, the growing demand for access to data and information from human users on the go has created the need for advanced vehicle-to-vehicle and vehicle to roadside communication systems capable of high data rates and amenable to high degrees of node mobility. The importance of inter-vehicle communication is increasing due to its role in organizing road. In this paper we present our proposition witch consisting of a new routing protocol VANET (vehicle AdHoc Network). This protocol is based on the localization of the node, and also the score assigned to each vehicle and the cost for each junction. We evaluate the performance of our protocol IRUV by comparing it with the VANET protocols: LAR and GyTAR in terms of: End to End Delay, and Delivery Ratio.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122356864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1