Pub Date : 2020-04-01DOI: 10.1109/IRASET48871.2020.9092276
L. Charaf, Imam Alihamidi, A. Addaim, A. Madi
IoT (Internet of Things) is the new technological revolution that enables the high connectivity of intelligent objects or devices both to each other or/and to humans. However, the major difficulty found in the use of this IoT technology is the lack of networking reference architectures and standards for this new paradigm. Moreover, security and privacy protection are foremost important issue to gain trust of IoT users. In this paper, we firstly present a comparative study of IoT security architectures previously proposed in the literature, then we investigate different works done in the field, based on the CIA triad (Confidentiality, Integrity and Availability) and the associated algorithms. The last part of this paper is devoted to study the proposed distributed model in order to face the IoT access control problems using the XACML language.
{"title":"A Distributed XACML based Access Control Architecture for IoT Systems","authors":"L. Charaf, Imam Alihamidi, A. Addaim, A. Madi","doi":"10.1109/IRASET48871.2020.9092276","DOIUrl":"https://doi.org/10.1109/IRASET48871.2020.9092276","url":null,"abstract":"IoT (Internet of Things) is the new technological revolution that enables the high connectivity of intelligent objects or devices both to each other or/and to humans. However, the major difficulty found in the use of this IoT technology is the lack of networking reference architectures and standards for this new paradigm. Moreover, security and privacy protection are foremost important issue to gain trust of IoT users. In this paper, we firstly present a comparative study of IoT security architectures previously proposed in the literature, then we investigate different works done in the field, based on the CIA triad (Confidentiality, Integrity and Availability) and the associated algorithms. The last part of this paper is devoted to study the proposed distributed model in order to face the IoT access control problems using the XACML language.","PeriodicalId":271840,"journal":{"name":"2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125154058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tumor segmentation from magnetic resonance images (MRI) is an error-prone and time-absorbing process. In this paper, we propose a novel architecture adapting the Optical Scanning Holography (OSH) to the detection of tumors regions in MRI. The proposed method combines an off-axis optical scan, performed by a heterodyne fringe pattern, and a MR image display ensured by a spatial light modulator. The output quadrature component of the scanned current is collected digitally. Hence, a high-precision distribution of biological tissues is extracted. Its maximum position is exactly the one of the tumor. Meanwhile, this position is used in an Active Contour Model (ACM) to perform a fast segmentation of the extent corresponding to the tumors. Several images of brain tumors from BRATS database, with tumors having different contrast and form, are used to test the proposed system. Parameters reverted by the optical process are used to investigate the detection performance. Further, in terms of tumor segmentation, the proposed OSH-ACM process has high performance metrics compared to some of recently published method. The underlying physics of the precision superiority, presented by the OSH-ACM, is the high-precision extraction of the abnormal tissue regions by the quadrature component of the scanned current.
{"title":"Optical based approach for brain tumor segmentation","authors":"Essadike Abdelaziz, Ouabida Elhoussaine, Boublouh Souhaila, Halaq Hanan, Bouzid Abdenbi","doi":"10.1109/IRASET48871.2020.9092288","DOIUrl":"https://doi.org/10.1109/IRASET48871.2020.9092288","url":null,"abstract":"Tumor segmentation from magnetic resonance images (MRI) is an error-prone and time-absorbing process. In this paper, we propose a novel architecture adapting the Optical Scanning Holography (OSH) to the detection of tumors regions in MRI. The proposed method combines an off-axis optical scan, performed by a heterodyne fringe pattern, and a MR image display ensured by a spatial light modulator. The output quadrature component of the scanned current is collected digitally. Hence, a high-precision distribution of biological tissues is extracted. Its maximum position is exactly the one of the tumor. Meanwhile, this position is used in an Active Contour Model (ACM) to perform a fast segmentation of the extent corresponding to the tumors. Several images of brain tumors from BRATS database, with tumors having different contrast and form, are used to test the proposed system. Parameters reverted by the optical process are used to investigate the detection performance. Further, in terms of tumor segmentation, the proposed OSH-ACM process has high performance metrics compared to some of recently published method. The underlying physics of the precision superiority, presented by the OSH-ACM, is the high-precision extraction of the abnormal tissue regions by the quadrature component of the scanned current.","PeriodicalId":271840,"journal":{"name":"2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127755296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/IRASET48871.2020.9092298
Bellat Abdelouahad, Ech-chhibat My El houssine, L. Zahiri, Raihani Abdelhadi, K. Mansouri
Wind energy is currently one of the most profitable renewable energy sources in electricity generation. However, much remains to be done to improve wind energy production. In this work, we will focus on the influence of wake models on the efficiency of wind farm design and their comparisons. this study showed the inability of wake models to predict exactly the energy produced in wind farms due to assumptions to facilitate the calculations and uncertainties of the different variables. In the rest of this work we tried to discuss the possibility standardize and adjust the loss of wake for optimal production and lifetime of a wind farm.
{"title":"wind farms power estimation based on the different wake models and their optimization","authors":"Bellat Abdelouahad, Ech-chhibat My El houssine, L. Zahiri, Raihani Abdelhadi, K. Mansouri","doi":"10.1109/IRASET48871.2020.9092298","DOIUrl":"https://doi.org/10.1109/IRASET48871.2020.9092298","url":null,"abstract":"Wind energy is currently one of the most profitable renewable energy sources in electricity generation. However, much remains to be done to improve wind energy production. In this work, we will focus on the influence of wake models on the efficiency of wind farm design and their comparisons. this study showed the inability of wake models to predict exactly the energy produced in wind farms due to assumptions to facilitate the calculations and uncertainties of the different variables. In the rest of this work we tried to discuss the possibility standardize and adjust the loss of wake for optimal production and lifetime of a wind farm.","PeriodicalId":271840,"journal":{"name":"2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)","volume":"318 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126860609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/IRASET48871.2020.9092222
Youssef Mnaoui, Aouatif Najoua, H. Ouajji
This paper presents a new training approach based on artificial intelligence for air traffic management. A first objective is to provide a conceptual and theoretical connotation on how to treat the Concept of accident causation by establishing a critical approach to the concept. Also, we propose a Design of a Training /Evaluating system based on voice recognition based on temporal and qualitative modelling which can be used in two ways:A training system for air emergency managers where the acquired skills and professional attitudes will be developed and consolidated under the supervision of an instructor.An evolving training system for the benefit of natural or anthropogenic crisis managers allowing the injection of new scenarios.Our contribution proposes improvements that could be implemented in the training of Emergency Situation Managers in order to be more efficient and use less time to manage emergency situation.
{"title":"Conception of a Training System for Emergency Situation Managers","authors":"Youssef Mnaoui, Aouatif Najoua, H. Ouajji","doi":"10.1109/IRASET48871.2020.9092222","DOIUrl":"https://doi.org/10.1109/IRASET48871.2020.9092222","url":null,"abstract":"This paper presents a new training approach based on artificial intelligence for air traffic management. A first objective is to provide a conceptual and theoretical connotation on how to treat the Concept of accident causation by establishing a critical approach to the concept. Also, we propose a Design of a Training /Evaluating system based on voice recognition based on temporal and qualitative modelling which can be used in two ways:A training system for air emergency managers where the acquired skills and professional attitudes will be developed and consolidated under the supervision of an instructor.An evolving training system for the benefit of natural or anthropogenic crisis managers allowing the injection of new scenarios.Our contribution proposes improvements that could be implemented in the training of Emergency Situation Managers in order to be more efficient and use less time to manage emergency situation.","PeriodicalId":271840,"journal":{"name":"2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)","volume":"44 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113956655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/IRASET48871.2020.9092191
Abderazzak Ziat, M. Sallaou, H. Zaghar, Abdelmajid AITTALEB
This work is a contribution to the integration of the concepts of reliability and robustness in the design phase of a product optimization, However, the lack of information and the high degree of uncertainty during the early design phases hinder the use of these tools. To overcome this problem, we have proposed a structured approach based on the evaluation under uncertainty of two main phases of the design process (conceptual design and embodiment design).
{"title":"Optimization approach under uncertainty in preliminary design for mechanical engineering","authors":"Abderazzak Ziat, M. Sallaou, H. Zaghar, Abdelmajid AITTALEB","doi":"10.1109/IRASET48871.2020.9092191","DOIUrl":"https://doi.org/10.1109/IRASET48871.2020.9092191","url":null,"abstract":"This work is a contribution to the integration of the concepts of reliability and robustness in the design phase of a product optimization, However, the lack of information and the high degree of uncertainty during the early design phases hinder the use of these tools. To overcome this problem, we have proposed a structured approach based on the evaluation under uncertainty of two main phases of the design process (conceptual design and embodiment design).","PeriodicalId":271840,"journal":{"name":"2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124035531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/IRASET48871.2020.9092062
E. Akoro, G. J. Tevi, M. E. Faye, F. Hamoud, A. S. Maiga, M. Doumbia
In this paper, a comparative study of power losses in single and parallel photovoltaic inverter systems is presented. The voltage source inverters (VSI) use power semiconductor as a switch. The insulated-gate bipolar transistor (IGBT) is the most used. These semiconductor devices generate significant power losses thus reducing the efficiency in high-power grid-connected photovoltaic (PV) systems. In this case, paralleling several PV inverters to share the load could improve the efficiency of the system. Using the polynomial approximation method, the losses in the IGBT module have been calculated. A theoretical comparative study in terms of power losses is first carried out and then, it would be validated by simulation using Matlab / Simulink software. The results show that, the parallel inverter structure in high power PV systems improves the efficiency of the system by reducing the power losses generated by the IGBT modules.
{"title":"Comparative Study of Power Losses in Single and Parallel High-Power Photovoltaic Inverter Systems","authors":"E. Akoro, G. J. Tevi, M. E. Faye, F. Hamoud, A. S. Maiga, M. Doumbia","doi":"10.1109/IRASET48871.2020.9092062","DOIUrl":"https://doi.org/10.1109/IRASET48871.2020.9092062","url":null,"abstract":"In this paper, a comparative study of power losses in single and parallel photovoltaic inverter systems is presented. The voltage source inverters (VSI) use power semiconductor as a switch. The insulated-gate bipolar transistor (IGBT) is the most used. These semiconductor devices generate significant power losses thus reducing the efficiency in high-power grid-connected photovoltaic (PV) systems. In this case, paralleling several PV inverters to share the load could improve the efficiency of the system. Using the polynomial approximation method, the losses in the IGBT module have been calculated. A theoretical comparative study in terms of power losses is first carried out and then, it would be validated by simulation using Matlab / Simulink software. The results show that, the parallel inverter structure in high power PV systems improves the efficiency of the system by reducing the power losses generated by the IGBT modules.","PeriodicalId":271840,"journal":{"name":"2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124123883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/IRASET48871.2020.9092230
Mariem Bounabi, K. E. Moutaouakil, K. Satori
Representation of knowledge remains a problem for models of machine learning (ML). The Paragraph vector is one of the current methods for embedding the text, where many parameters govern the utility of representation. In this context, we are addressing the effect, on the text classification area, of Paragraph Vector-Distributed Memory (PV-DM) as variant of doc2vec. In comparison, we apply other classification systems focused on doc2vec forms, and a collection of classifiers with current practices in this article. Then, we incorporate hybrid ML methods to improve the quality of classification. The experiments, on benchmarking dataset, prove that the results obtained are excellent, with 99% accuracy in the system based on the PV-DM with average method, and majority voting as a classifier.
{"title":"Neural Embedding & Hybrid ML Models for Text Classification","authors":"Mariem Bounabi, K. E. Moutaouakil, K. Satori","doi":"10.1109/IRASET48871.2020.9092230","DOIUrl":"https://doi.org/10.1109/IRASET48871.2020.9092230","url":null,"abstract":"Representation of knowledge remains a problem for models of machine learning (ML). The Paragraph vector is one of the current methods for embedding the text, where many parameters govern the utility of representation. In this context, we are addressing the effect, on the text classification area, of Paragraph Vector-Distributed Memory (PV-DM) as variant of doc2vec. In comparison, we apply other classification systems focused on doc2vec forms, and a collection of classifiers with current practices in this article. Then, we incorporate hybrid ML methods to improve the quality of classification. The experiments, on benchmarking dataset, prove that the results obtained are excellent, with 99% accuracy in the system based on the PV-DM with average method, and majority voting as a classifier.","PeriodicalId":271840,"journal":{"name":"2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126479578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/iraset48871.2020.9092320
{"title":"[Copyright notice]","authors":"","doi":"10.1109/iraset48871.2020.9092320","DOIUrl":"https://doi.org/10.1109/iraset48871.2020.9092320","url":null,"abstract":"","PeriodicalId":271840,"journal":{"name":"2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134546714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.1109/IRASET48871.2020.9092173
Ikram Abourahim, M. Amghar, M. Eleuldj
Today interoperability in railway systems is a worldwide necessity especially in Europe. Indeed, multiple systems control the mobility of trains through borders from one country to another one, yet the communication of railway signaling interlocking between these borders is still a challenge. Some projects deal with the interoperability issue. ERTMS is one of them: it ensures an exchange between interlocking and the train. EULYNX is another project that standardises interfaces between field equipment and computer interlocking. Our paper presents an approach for interlocking communication all along the architecture of computer interlocking. Indeed, due to the evolution of computer interlocking technology, we are faced to many architectures depending on signaling principles of each country and also the proposition of each actor in the industry. Our approach will dress a vision of interoperability that relies on the architecture of Functional Blocks (FB) related to IEC 61499 standard and Service Oriented Architecture (SOA); this architecture allows an easy communication of relevant information but requires a high level of security.
{"title":"Interoperability of signaling interlocking and its Cyber-Security requirements*","authors":"Ikram Abourahim, M. Amghar, M. Eleuldj","doi":"10.1109/IRASET48871.2020.9092173","DOIUrl":"https://doi.org/10.1109/IRASET48871.2020.9092173","url":null,"abstract":"Today interoperability in railway systems is a worldwide necessity especially in Europe. Indeed, multiple systems control the mobility of trains through borders from one country to another one, yet the communication of railway signaling interlocking between these borders is still a challenge. Some projects deal with the interoperability issue. ERTMS is one of them: it ensures an exchange between interlocking and the train. EULYNX is another project that standardises interfaces between field equipment and computer interlocking. Our paper presents an approach for interlocking communication all along the architecture of computer interlocking. Indeed, due to the evolution of computer interlocking technology, we are faced to many architectures depending on signaling principles of each country and also the proposition of each actor in the industry. Our approach will dress a vision of interoperability that relies on the architecture of Functional Blocks (FB) related to IEC 61499 standard and Service Oriented Architecture (SOA); this architecture allows an easy communication of relevant information but requires a high level of security.","PeriodicalId":271840,"journal":{"name":"2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133011514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Privacy is a concern of social network users. Social networks are a source of valuable data for scientific or commercial analysis. Therefore, anonymizing social network data before releasing it becomes an important issue. The nodes in the network represent the individuals and the links among them denote their relationships. Nevertheless, publishing a social graph directly by simply removing the names of people who contributed to this graph raises important privacy issues. In particular, some inference attacks on the published graph can lead to de-anonymizing certain nodes, learning the existence of a social relation between two nodes or even using the structure of the graph itself to deduce the value of certain sensitive attributes. In this paper, we present a brief yet systematic review of the existing anonymization techniques for privacy preserving publishing of social network data. We identify the challenges in privacy preserving publishing of social network data comparing to the extensively studied relational case. We survey the existing anonymization methods for privacy preservation in three categories: graph modification approaches, generalization approaches and differential privacy methods.
{"title":"Data Anonymization in Social Networks State of the Art, Exposure of Shortcomings and Discussion of New Innovations","authors":"Baida Ouafae, Ramdi Mariam, Louzar Oumaima, Lyhyaoui Abdelouahid","doi":"10.1109/IRASET48871.2020.9092064","DOIUrl":"https://doi.org/10.1109/IRASET48871.2020.9092064","url":null,"abstract":"Privacy is a concern of social network users. Social networks are a source of valuable data for scientific or commercial analysis. Therefore, anonymizing social network data before releasing it becomes an important issue. The nodes in the network represent the individuals and the links among them denote their relationships. Nevertheless, publishing a social graph directly by simply removing the names of people who contributed to this graph raises important privacy issues. In particular, some inference attacks on the published graph can lead to de-anonymizing certain nodes, learning the existence of a social relation between two nodes or even using the structure of the graph itself to deduce the value of certain sensitive attributes. In this paper, we present a brief yet systematic review of the existing anonymization techniques for privacy preserving publishing of social network data. We identify the challenges in privacy preserving publishing of social network data comparing to the extensively studied relational case. We survey the existing anonymization methods for privacy preservation in three categories: graph modification approaches, generalization approaches and differential privacy methods.","PeriodicalId":271840,"journal":{"name":"2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134308259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}