Pub Date : 2022-11-02DOI: 10.1109/EDiS57230.2022.9996528
Nassima Dif, A. Arioui, Ikhals Zeblah, S. Benslimane
With the arrival of the most recent coronavirus pandemic, it was a must to find solutions to detect this dangerous virus. Analyzing X-ray images was among the exploited techniques to control this disease. However, the doctor's subjectivity in analyzing X-rays was the first obstacle in detecting this virus accurately. Applying new deep learning techniques to x-ray images can be a potential solution to reduce this subjectivity. This paper aims to conduct a comparative study between six different CNN architectures (VGG16, VGG19, Inception, Xception, DenseNet, and ChexNet) for COVID-19 detection from X-rays. The obtained results based on the transfer learning strategy confirm the efficiency of the VGG 16, where its achieved 98.69 % of accuracy on the COVID-19 Radiography Dataset.
{"title":"COVID-19 Classification From X-rays : A Comparative Study","authors":"Nassima Dif, A. Arioui, Ikhals Zeblah, S. Benslimane","doi":"10.1109/EDiS57230.2022.9996528","DOIUrl":"https://doi.org/10.1109/EDiS57230.2022.9996528","url":null,"abstract":"With the arrival of the most recent coronavirus pandemic, it was a must to find solutions to detect this dangerous virus. Analyzing X-ray images was among the exploited techniques to control this disease. However, the doctor's subjectivity in analyzing X-rays was the first obstacle in detecting this virus accurately. Applying new deep learning techniques to x-ray images can be a potential solution to reduce this subjectivity. This paper aims to conduct a comparative study between six different CNN architectures (VGG16, VGG19, Inception, Xception, DenseNet, and ChexNet) for COVID-19 detection from X-rays. The obtained results based on the transfer learning strategy confirm the efficiency of the VGG 16, where its achieved 98.69 % of accuracy on the COVID-19 Radiography Dataset.","PeriodicalId":288133,"journal":{"name":"2022 3rd International Conference on Embedded & Distributed Systems (EDiS)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128358023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-02DOI: 10.1109/EDiS57230.2022.9996499
M. Belhamidi, F. Lakdja, L. Boumediene, H. Guentri
Networks are becoming more sophisticated with time, and stability issues have become more prevalent. In general, the problem of voltage instability increases as various energy sources, such as solar, wind, etc., are connected to the grid. The most notable issue is grid control. Controlling the flow of reactive power in the grid is essential for optimizing power system performance. When a system fails, is overloaded, and the voltage varies, unbalanced reactive power occurs. Connecting a device to the transmission line that can inject or absorb reactive power, depending on the system requirements, can restore reactive power balance. D-FACTS (Distributed Flexible AC Transmission System) is one of the most useful sources of reactive power. Distributed Static Var Compensation (D-SVC) and Distributed Static Synchronous Compensation (D-STATCOM) are the famous compensation methods of the D-FACTS families. The influence of D-SVC and D-STATCOM on increasing the dynamic voltage stability of distribution networks with distributed wind generation and variable load is investigated in this paper. Simulations using MATLAB/Simulink were used to observe the dynamic behavior of both devices. This article provides a comparison of simulation results between grids without D-FACTS and grids with D-FACTS.
{"title":"Examining the effects of utilizing “D-STATCOM and D-SVC” in the grid power connected to the wind farm","authors":"M. Belhamidi, F. Lakdja, L. Boumediene, H. Guentri","doi":"10.1109/EDiS57230.2022.9996499","DOIUrl":"https://doi.org/10.1109/EDiS57230.2022.9996499","url":null,"abstract":"Networks are becoming more sophisticated with time, and stability issues have become more prevalent. In general, the problem of voltage instability increases as various energy sources, such as solar, wind, etc., are connected to the grid. The most notable issue is grid control. Controlling the flow of reactive power in the grid is essential for optimizing power system performance. When a system fails, is overloaded, and the voltage varies, unbalanced reactive power occurs. Connecting a device to the transmission line that can inject or absorb reactive power, depending on the system requirements, can restore reactive power balance. D-FACTS (Distributed Flexible AC Transmission System) is one of the most useful sources of reactive power. Distributed Static Var Compensation (D-SVC) and Distributed Static Synchronous Compensation (D-STATCOM) are the famous compensation methods of the D-FACTS families. The influence of D-SVC and D-STATCOM on increasing the dynamic voltage stability of distribution networks with distributed wind generation and variable load is investigated in this paper. Simulations using MATLAB/Simulink were used to observe the dynamic behavior of both devices. This article provides a comparison of simulation results between grids without D-FACTS and grids with D-FACTS.","PeriodicalId":288133,"journal":{"name":"2022 3rd International Conference on Embedded & Distributed Systems (EDiS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125320675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study is an attempt to contribute to the design, development, and production of a myoelectric hand prosthesis. This prosthetic device is controlled by an EMG signal captured using surface electrodes on a stump's muscle. The realization of customized electronics allowed us to operate the prosthesis's five fingers with five servo motors. Force sensors on the tip of each finger made this prosthesis tactile, allowing the intelligent system in place to grab or drop an object as the amputee desired.
{"title":"Design and realization of a myoelectric prosthesis for a tactile hand","authors":"Talha Wafa Hana, Madaoui Lotfi, Kedir-Talha Malika, Sadi-Ahmed Nafissa, Bessekri Besma, Ghazli Khaoula","doi":"10.1109/EDiS57230.2022.9996512","DOIUrl":"https://doi.org/10.1109/EDiS57230.2022.9996512","url":null,"abstract":"This study is an attempt to contribute to the design, development, and production of a myoelectric hand prosthesis. This prosthetic device is controlled by an EMG signal captured using surface electrodes on a stump's muscle. The realization of customized electronics allowed us to operate the prosthesis's five fingers with five servo motors. Force sensors on the tip of each finger made this prosthesis tactile, allowing the intelligent system in place to grab or drop an object as the amputee desired.","PeriodicalId":288133,"journal":{"name":"2022 3rd International Conference on Embedded & Distributed Systems (EDiS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116478595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-02DOI: 10.1109/EDiS57230.2022.9996516
Wissam Bouzi, Samia Bentaieb, A. Ouamri
Detection and classification of vehicle types is one of the most important applications in field of road safety. In this paper, we propose a deep learning process to detect and classify vehicles by using Single shot Detector (SSD) for detection and Di-lated Multi-Column Convolutional Neural Network (DMCCNN) for classification. Rather than using a fixed-scale convolutional layer, the second model we use is capable to extract features from various scales of an image employing different dilated filters to improve the performance classification, especially for similar-looking vehicles like Suv and Sedan. An embedded Raspberry Pi vehicle detection and classification system is developed using a built-in Pi camera. The results are comparable with desktop-based results in the literature yielding an accuracy of 95.93 % on BIT dataset.
{"title":"Embedded Raspberry Pi Vehicle Detection and Classification using Single Shot Detector and Dilated Multi-Column Convolutional Neural Network","authors":"Wissam Bouzi, Samia Bentaieb, A. Ouamri","doi":"10.1109/EDiS57230.2022.9996516","DOIUrl":"https://doi.org/10.1109/EDiS57230.2022.9996516","url":null,"abstract":"Detection and classification of vehicle types is one of the most important applications in field of road safety. In this paper, we propose a deep learning process to detect and classify vehicles by using Single shot Detector (SSD) for detection and Di-lated Multi-Column Convolutional Neural Network (DMCCNN) for classification. Rather than using a fixed-scale convolutional layer, the second model we use is capable to extract features from various scales of an image employing different dilated filters to improve the performance classification, especially for similar-looking vehicles like Suv and Sedan. An embedded Raspberry Pi vehicle detection and classification system is developed using a built-in Pi camera. The results are comparable with desktop-based results in the literature yielding an accuracy of 95.93 % on BIT dataset.","PeriodicalId":288133,"journal":{"name":"2022 3rd International Conference on Embedded & Distributed Systems (EDiS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132699855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-02DOI: 10.1109/EDiS57230.2022.9996470
M. Chetto
The recent and rapid development of the Internet of Things (IoT’) leads to the need for embedded devices that comprise one or more resource-constrained computing elements and sensors. Energy Harvesting (EH) technology provides the ability for any low-power embedded device to operate thanks to the generation of electricity from the energy available in the device's immediate surroundings such as light or motion. Energy neutrality is the central requirement of autonomous real-time computing systems that should be designed to correctly function for long times with no possible manual intervention to charge or replace batteries. Unfortunately, most of environmental energy sources are fluctuating and not controllable. It means that a stable power supply cannot be relied upon that makes challenging the issue of compliance with hard real-time constraints. Specific power management and scheduling solutions have to be conceived in order to prevent energy starvation and guarantee real-time responsiveness. Task scheduling should take into account not only the timing parameters of the deadline constrained tasks such as worst-case execution times but also energy consumptions, profile of the energy source and capacity of the energy storage unit. The classical greedy scheduler Earliest Deadline First (EDF) or Rate Monotonic (RM) used in battery powered devices should be revisited for this novel operational context. This keynote discusses the state of the art as well as our findings in real-time scheduling and dynamic processor management for autonomous embedded systems. Short biography: Maryline Chetto is currently a full professor in computer engineering with Nantes Université, France and researcher with CNRS. She received the degree of Docteur de 3ème cycle in control engineering and the degree of Habilitee á Diriger des Recherches in Computer Science from the University of Nantes, France, in 1984 and 1993, respectively. From 1984 to 1985, she held the position of Assistant professor of Computer Science at the University of Rennes, while her research was with the Institut de Recherche en Informatique et Systemics Aléatoires (IRISA), Rennes. In 1986, she returned to Nantes and has been from 2002 a full professor with the University of Nantes. She is conducting her research at Laboratoire des Sciences du Numérique de Nantes (LS2N, UMR CNRS no 6004) in the Real Time System group.
物联网(IoT)最近的快速发展导致对嵌入式设备的需求,这些设备包括一个或多个资源受限的计算元件和传感器。能量收集(EH)技术为任何低功耗嵌入式设备提供了运行的能力,这要归功于从设备的直接环境(如光或运动)中可用的能量发电。能量中立性是自主实时计算系统的核心要求,该系统应被设计为在不需要人工干预充电或更换电池的情况下长时间正常运行。不幸的是,大多数环境能源是波动的,不可控的。这意味着不能依赖稳定的电力供应,这使得符合硬实时约束的问题具有挑战性。必须构思特定的电源管理和调度解决方案,以防止能源短缺并保证实时响应。任务调度不仅要考虑受最后期限约束的任务的最坏情况执行时间等时序参数,还要考虑能量消耗、能源分布和储能单元容量等因素。在这种新的操作环境中,应该重新审视电池供电设备中使用的经典贪婪调度程序最早截止日期优先(EDF)或速率单调(RM)。本主题讨论了自主嵌入式系统在实时调度和动态处理器管理方面的最新进展。简介:Maryline Chetto目前是法国南特大学计算机工程专业的正教授,也是法国国家科学研究中心的研究员。她分别于1984年和1993年在法国南特大学获得控制工程博士学位和计算机科学研究博士学位。从1984年到1985年,她担任雷恩大学计算机科学助理教授,同时她的研究在雷恩信息与系统研究所(IRISA)进行。1986年,她回到南特,自2002年起担任南特大学正教授。她在实时系统组的Nantes numsamrique科学实验室(LS2N, UMR CNRS no 6004)进行研究。
{"title":"Challenges in Real-time Scheduling for Energy Harvesting Embedded Systems","authors":"M. Chetto","doi":"10.1109/EDiS57230.2022.9996470","DOIUrl":"https://doi.org/10.1109/EDiS57230.2022.9996470","url":null,"abstract":"The recent and rapid development of the Internet of Things (IoT’) leads to the need for embedded devices that comprise one or more resource-constrained computing elements and sensors. Energy Harvesting (EH) technology provides the ability for any low-power embedded device to operate thanks to the generation of electricity from the energy available in the device's immediate surroundings such as light or motion. Energy neutrality is the central requirement of autonomous real-time computing systems that should be designed to correctly function for long times with no possible manual intervention to charge or replace batteries. Unfortunately, most of environmental energy sources are fluctuating and not controllable. It means that a stable power supply cannot be relied upon that makes challenging the issue of compliance with hard real-time constraints. Specific power management and scheduling solutions have to be conceived in order to prevent energy starvation and guarantee real-time responsiveness. Task scheduling should take into account not only the timing parameters of the deadline constrained tasks such as worst-case execution times but also energy consumptions, profile of the energy source and capacity of the energy storage unit. The classical greedy scheduler Earliest Deadline First (EDF) or Rate Monotonic (RM) used in battery powered devices should be revisited for this novel operational context. This keynote discusses the state of the art as well as our findings in real-time scheduling and dynamic processor management for autonomous embedded systems. Short biography: Maryline Chetto is currently a full professor in computer engineering with Nantes Université, France and researcher with CNRS. She received the degree of Docteur de 3ème cycle in control engineering and the degree of Habilitee á Diriger des Recherches in Computer Science from the University of Nantes, France, in 1984 and 1993, respectively. From 1984 to 1985, she held the position of Assistant professor of Computer Science at the University of Rennes, while her research was with the Institut de Recherche en Informatique et Systemics Aléatoires (IRISA), Rennes. In 1986, she returned to Nantes and has been from 2002 a full professor with the University of Nantes. She is conducting her research at Laboratoire des Sciences du Numérique de Nantes (LS2N, UMR CNRS no 6004) in the Real Time System group.","PeriodicalId":288133,"journal":{"name":"2022 3rd International Conference on Embedded & Distributed Systems (EDiS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129875067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-02DOI: 10.1109/EDiS57230.2022.9996495
Fulvio Risso
The creation of a computing (and storage) continuum that spans across multiple infrastructures has been recently proposed with the aim at breaking the barriers of current cloud computing silos. While the potential of this vision is clear, such as possible energy efficiency improvements, application transparency, better quality of service, the problems in realizing this vision are challenging. In fact, the necessity (a) to consider WAN latencies, network bottlenecks and possible network outages, (b) to support different administrative boundaries (hence, security), (c) to define novel orchestration algorithms are only a first portion of the ingredients required to create this continuum. Even more important are the necessity to achieve an economic sustainability and the necessity to migrate applications to the new paradigm, which are often not considered by the current research efforts. Starting from the experience achieved in the open-source liqo.io project, this talk will introduce the potentials and the challenges in the creation of the edge-to-cloud computing continuum, and it will present what are the major blocking points along our way.
{"title":"Creating an Edge-to-Cloud Computing Continuum: Status and Perspective","authors":"Fulvio Risso","doi":"10.1109/EDiS57230.2022.9996495","DOIUrl":"https://doi.org/10.1109/EDiS57230.2022.9996495","url":null,"abstract":"The creation of a computing (and storage) continuum that spans across multiple infrastructures has been recently proposed with the aim at breaking the barriers of current cloud computing silos. While the potential of this vision is clear, such as possible energy efficiency improvements, application transparency, better quality of service, the problems in realizing this vision are challenging. In fact, the necessity (a) to consider WAN latencies, network bottlenecks and possible network outages, (b) to support different administrative boundaries (hence, security), (c) to define novel orchestration algorithms are only a first portion of the ingredients required to create this continuum. Even more important are the necessity to achieve an economic sustainability and the necessity to migrate applications to the new paradigm, which are often not considered by the current research efforts. Starting from the experience achieved in the open-source liqo.io project, this talk will introduce the potentials and the challenges in the creation of the edge-to-cloud computing continuum, and it will present what are the major blocking points along our way.","PeriodicalId":288133,"journal":{"name":"2022 3rd International Conference on Embedded & Distributed Systems (EDiS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134601266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-02DOI: 10.1109/edis57230.2022.9996502
Wahab Hamou-Lhadj
Modern computing systems expand on the challenges of traditional monolithic applications by relying on a combination of servers, embedded and sensory devices, diverse architectural models, and various communication mechanisms to drive new ways of creating value and stimulating growth in diverse sectors of modern society. The fragmented and distributed nature of these systemscallfor advanced system analysis and fault diagnosis methods -timely detection and prevention of crashes and anomalies are of paramount importance. In this talk, we will start by discussing the concept of system observability, which we present as the umbrella field for the current research that aim to gain insight into runtime data (traces, logs, profiling metrics, etc.). we will then dive into the research opportunities and challenges in system observability using log analytics with an emphasis on software and hardware system analysis.
{"title":"Observability of Software Computing Systems: Challenges and Opportunities","authors":"Wahab Hamou-Lhadj","doi":"10.1109/edis57230.2022.9996502","DOIUrl":"https://doi.org/10.1109/edis57230.2022.9996502","url":null,"abstract":"Modern computing systems expand on the challenges of traditional monolithic applications by relying on a combination of servers, embedded and sensory devices, diverse architectural models, and various communication mechanisms to drive new ways of creating value and stimulating growth in diverse sectors of modern society. The fragmented and distributed nature of these systemscallfor advanced system analysis and fault diagnosis methods -timely detection and prevention of crashes and anomalies are of paramount importance. In this talk, we will start by discussing the concept of system observability, which we present as the umbrella field for the current research that aim to gain insight into runtime data (traces, logs, profiling metrics, etc.). we will then dive into the research opportunities and challenges in system observability using log analytics with an emphasis on software and hardware system analysis.","PeriodicalId":288133,"journal":{"name":"2022 3rd International Conference on Embedded & Distributed Systems (EDiS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122355291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-02DOI: 10.1109/EDiS57230.2022.9996483
Mehdi Rouan-Serik, Mejdi Kaddour
Visual sensor networks (VSN) have a wide range of applications in real-world scenarios. As a result, deployment, coverage, energy harvesting, and many other challenges are tough to deal with. The cost of deploying VSNs to cover targets with particular constraints, such as targets coverage, barrier walls and capture quality, are explored in this study. For a Mixed Integer mathematical formulation, an exact and an approximation solution were presented. Exact resolution of appropriate size instances is difficult because this is an NP-hard problem. Several studies attempt to solve these issues by providing approximation methods, heuristics, and metaheuristics. The Particle Swarm Optimization (PSO) metaheuristic is a well-known based metaheuristic which we adopt in this paper. While dealing with difficult optimization problems, this technique provided excellent results. According to experiments and results, the proposed PSO method performed efficiently in both small and large instances of the problem.
{"title":"Adaptive Particle Swarm Optimization of Cost Deployment in Visual Sensor Networks","authors":"Mehdi Rouan-Serik, Mejdi Kaddour","doi":"10.1109/EDiS57230.2022.9996483","DOIUrl":"https://doi.org/10.1109/EDiS57230.2022.9996483","url":null,"abstract":"Visual sensor networks (VSN) have a wide range of applications in real-world scenarios. As a result, deployment, coverage, energy harvesting, and many other challenges are tough to deal with. The cost of deploying VSNs to cover targets with particular constraints, such as targets coverage, barrier walls and capture quality, are explored in this study. For a Mixed Integer mathematical formulation, an exact and an approximation solution were presented. Exact resolution of appropriate size instances is difficult because this is an NP-hard problem. Several studies attempt to solve these issues by providing approximation methods, heuristics, and metaheuristics. The Particle Swarm Optimization (PSO) metaheuristic is a well-known based metaheuristic which we adopt in this paper. While dealing with difficult optimization problems, this technique provided excellent results. According to experiments and results, the proposed PSO method performed efficiently in both small and large instances of the problem.","PeriodicalId":288133,"journal":{"name":"2022 3rd International Conference on Embedded & Distributed Systems (EDiS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129993104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Beekeeping or modern Apiculture is the act of rearing beehives for the purpose of cultivating honey, a nutrient that is also used in several industries, and its derivatives. Smart apiculture is a relatively new domain seeking to improve modern beekeeping using novel technologies. In this paper we seek to shed light on both the intricacies of modern beekeeping, the used technologies in intelligent apiculture and survey the challenges and issues that face them as a basis for building better solutions. The aim is to offer a full-fledged and summarized survey of the domain thus opening the door for future solution adaptation and/or proposal.
{"title":"IoT for Smart Apiculture: Issues and Solutions","authors":"Amina Bourouis, Tariq Benahmed, Kamal A.Madjid Mokeddem, Khelifa Benahmed, Abouboubaker Saddik Lairedj","doi":"10.1109/EDiS57230.2022.9996511","DOIUrl":"https://doi.org/10.1109/EDiS57230.2022.9996511","url":null,"abstract":"Beekeeping or modern Apiculture is the act of rearing beehives for the purpose of cultivating honey, a nutrient that is also used in several industries, and its derivatives. Smart apiculture is a relatively new domain seeking to improve modern beekeeping using novel technologies. In this paper we seek to shed light on both the intricacies of modern beekeeping, the used technologies in intelligent apiculture and survey the challenges and issues that face them as a basis for building better solutions. The aim is to offer a full-fledged and summarized survey of the domain thus opening the door for future solution adaptation and/or proposal.","PeriodicalId":288133,"journal":{"name":"2022 3rd International Conference on Embedded & Distributed Systems (EDiS)","volume":"453 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122892960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-02DOI: 10.1109/EDiS57230.2022.9996473
Sarra Benadla, Omar Rafik Merad-Boudia, M. Lehsaini
With the emergence of vehicular fog networks (VFC), the transportation system is increasingly improving traffic management and road safety. However, secure and reliable data transmissions have become crucial to ensure a better quality of service (QoS). In this direction, several conditional privacy-preserving authentication schemes have been proposed. In the literature, most schemes suffer from key escrow problems. Even the schemes that reside in this concern, they have the problem of storage and centralization; since the trusted authority (TA) must register for each vehicle all the pseudonyms that will be used. Likewise, the vehicle must store all the pseudonyms and the keys that will be used in its memory. To address all these problems, we propose a conditional privacy-preserving authentication mechanism for vehicular fog networks that allows the vehicle to generate its own private/public keys with its pseudonym when needed, and without being stored at the TA. The proposal uses elliptic curve cryptography for authentication and blockchain technology for storing registration and authentication results. The performance evaluation and security analysis show that our proposed mechanism provides improved security features compared to related work with reduced computational and communication overhead. Our mechanism has reduced the registration time of vehicles to only 0.024 ms.
{"title":"Blockchain-Based Conditional Privacy-Preserving Authentication Mechanism for Vehicular Fog Networks","authors":"Sarra Benadla, Omar Rafik Merad-Boudia, M. Lehsaini","doi":"10.1109/EDiS57230.2022.9996473","DOIUrl":"https://doi.org/10.1109/EDiS57230.2022.9996473","url":null,"abstract":"With the emergence of vehicular fog networks (VFC), the transportation system is increasingly improving traffic management and road safety. However, secure and reliable data transmissions have become crucial to ensure a better quality of service (QoS). In this direction, several conditional privacy-preserving authentication schemes have been proposed. In the literature, most schemes suffer from key escrow problems. Even the schemes that reside in this concern, they have the problem of storage and centralization; since the trusted authority (TA) must register for each vehicle all the pseudonyms that will be used. Likewise, the vehicle must store all the pseudonyms and the keys that will be used in its memory. To address all these problems, we propose a conditional privacy-preserving authentication mechanism for vehicular fog networks that allows the vehicle to generate its own private/public keys with its pseudonym when needed, and without being stored at the TA. The proposal uses elliptic curve cryptography for authentication and blockchain technology for storing registration and authentication results. The performance evaluation and security analysis show that our proposed mechanism provides improved security features compared to related work with reduced computational and communication overhead. Our mechanism has reduced the registration time of vehicles to only 0.024 ms.","PeriodicalId":288133,"journal":{"name":"2022 3rd International Conference on Embedded & Distributed Systems (EDiS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115137516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}