首页 > 最新文献

2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)最新文献

英文 中文
Construction of New Finite Geometry Non-Binary LDPC Codes With Reduced Alphabets 用精简字母构建新的有限几何非二进制 LDPC 码
Zakaria M'rabet, F. Ayoub, Mostafa Belkasmi, Faissal El Bouanani
The finite Euclidean and Projective geometry codes are the most known among One-Step Majority-Logic Decodable codes that are Low-Density Parity-Check codes as well. Unfortunately, these codes are rare, and we do not have a great diversity when designing communication systems with a fixed code-length and code rate. Regarding the non-binary Euclidian and projective geometric Codes, each code is restricted to a unique alphabet. To offer a bigger range of possible alphabets for each code, we propose new construction by redefining the incidence vector of the lines of Euclidean and projective geometries over finite fields. This approach leads to an enrichment of the class of EG and PG codes. An error performance study of some new codes has been carried out and shows good results.
有限欧几里得编码和射影几何编码是一步多逻辑可解码编码中最著名的编码,它们也是低密度奇偶校验编码。遗憾的是,这些编码并不多见,而且在设计具有固定码长和码率的通信系统时,我们的编码种类并不多。至于非二进制欧几里得码和投影几何码,每种码都仅限于一种字母。为了给每种编码提供更多可能的字母,我们提出了新的构造,即重新定义有限域上欧几里得和投影几何线的入射向量。这种方法丰富了 EG 和 PG 编码的种类。我们对一些新编码进行了误差性能研究,结果显示良好。
{"title":"Construction of New Finite Geometry Non-Binary LDPC Codes With Reduced Alphabets","authors":"Zakaria M'rabet, F. Ayoub, Mostafa Belkasmi, Faissal El Bouanani","doi":"10.1109/CommNet60167.2023.10365279","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365279","url":null,"abstract":"The finite Euclidean and Projective geometry codes are the most known among One-Step Majority-Logic Decodable codes that are Low-Density Parity-Check codes as well. Unfortunately, these codes are rare, and we do not have a great diversity when designing communication systems with a fixed code-length and code rate. Regarding the non-binary Euclidian and projective geometric Codes, each code is restricted to a unique alphabet. To offer a bigger range of possible alphabets for each code, we propose new construction by redefining the incidence vector of the lines of Euclidean and projective geometries over finite fields. This approach leads to an enrichment of the class of EG and PG codes. An error performance study of some new codes has been carried out and shows good results.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"386 4-6","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison between Emergency Calls over VoLTE and VoWiFi using IMS network 使用 IMS 网络通过 VoLTE 和 VoWiFi 进行紧急呼叫的比较
M. Damasceno, J. A. Arnez, Walmir Acioli E Silva, Caio B. Bezerra De Souza, Renata K. Gomes Dos Reis, Lucas Beltrão Cavalcante Tribuzy
The emergency call (eCall) service is an important part of the mobile communication networks since helps mobile users to be able to communicate during alert circumstances. eCall services were already widely used by 3G networks and can be utilized by 4G Long-Term Evolution (LTE) networks as well as by Wireless Local Network (WLAN) networks, both of them using IP Multimedia Subsystem (IMS) core. The present paper provides a guideline about how eCall services are used in Voice over Long-Term Evolution (VoLTE) and Voice over Wi-Fi (VoWiFi) technologies over IMS. Furthermore, the work assesses the Quality of Service (QoS) of calls over VoLTE and VoWiFi. Additionally, using a packet analyzer software, there were analyzed in detail the Session Initiation Protocol (SIP) message headers, the way each technology collects the information of the user location and the signaling process for eCall over VoLTE and VoWiFi.
紧急呼叫(eCall)服务是移动通信网络的重要组成部分,可帮助移动用户在紧急情况下进行通信。eCall 服务已在 3G 网络中广泛使用,并可在 4G 长期演进(LTE)网络和无线局域网(WLAN)网络中使用,这两种网络都使用 IP 多媒体子系统(IMS)核心。本文就如何将 eCall 服务用于 IMS 上的长期演进语音(VoLTE)和 Wi-Fi 语音(VoWiFi)技术提供了指导。此外,本文还评估了 VoLTE 和 VoWiFi 通话的服务质量(QoS)。此外,还使用数据包分析软件详细分析了会话启动协议(SIP)信息头、每种技术收集用户位置信息的方式以及 VoLTE 和 VoWiFi eCall 的信令过程。
{"title":"Comparison between Emergency Calls over VoLTE and VoWiFi using IMS network","authors":"M. Damasceno, J. A. Arnez, Walmir Acioli E Silva, Caio B. Bezerra De Souza, Renata K. Gomes Dos Reis, Lucas Beltrão Cavalcante Tribuzy","doi":"10.1109/CommNet60167.2023.10365304","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365304","url":null,"abstract":"The emergency call (eCall) service is an important part of the mobile communication networks since helps mobile users to be able to communicate during alert circumstances. eCall services were already widely used by 3G networks and can be utilized by 4G Long-Term Evolution (LTE) networks as well as by Wireless Local Network (WLAN) networks, both of them using IP Multimedia Subsystem (IMS) core. The present paper provides a guideline about how eCall services are used in Voice over Long-Term Evolution (VoLTE) and Voice over Wi-Fi (VoWiFi) technologies over IMS. Furthermore, the work assesses the Quality of Service (QoS) of calls over VoLTE and VoWiFi. Additionally, using a packet analyzer software, there were analyzed in detail the Session Initiation Protocol (SIP) message headers, the way each technology collects the information of the user location and the signaling process for eCall over VoLTE and VoWiFi.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"50 9","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DoS Attack Detection with NIDS in Docker Environment 在 Docker 环境中使用 NIDS 检测 DoS 攻击
Nadia El Ghabri, E. Belmekki, Mostafa Bellafkih
In recent years, Docker containers have become very popular due to their interesting properties that lie in isolation, portability, and scalability. Like any technology, Docker containers can be vulnerable to attacks. For this reason, attack simulation is a good practice for testing the security of a system, including Docker containers. In this paper, we show how this attack simulation can be executed using the hping3 tool to launch the attack and official Docker images to run containers. The results show that the Snort container can quickly identify and report the simulated attack.
近年来,Docker 容器因其在隔离性、可移植性和可扩展性方面的有趣特性而变得非常流行。与任何技术一样,Docker 容器也可能受到攻击。因此,攻击模拟是测试系统(包括 Docker 容器)安全性的一种好方法。在本文中,我们展示了如何使用 hping3 工具发起攻击和官方 Docker 镜像运行容器来执行攻击模拟。结果表明,Snort 容器可以快速识别并报告模拟攻击。
{"title":"DoS Attack Detection with NIDS in Docker Environment","authors":"Nadia El Ghabri, E. Belmekki, Mostafa Bellafkih","doi":"10.1109/CommNet60167.2023.10365272","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365272","url":null,"abstract":"In recent years, Docker containers have become very popular due to their interesting properties that lie in isolation, portability, and scalability. Like any technology, Docker containers can be vulnerable to attacks. For this reason, attack simulation is a good practice for testing the security of a system, including Docker containers. In this paper, we show how this attack simulation can be executed using the hping3 tool to launch the attack and official Docker images to run containers. The results show that the Snort container can quickly identify and report the simulated attack.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"48 10","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hardware Validation Framework for a Networked Dynamic Multi-factor Security Protocol 网络动态多因素安全协议的硬件验证框架
Cheng-Yen Lee, Kyler R. Scott, Sunil P. Khatri, Ali Ghrayeb
As the use of low-power Internet of Things (IoT) devices becomes widespread, the volume of data generated and transmitted is increasing rapidly. However, transmitting sensitive data over unreliable wireless networks gives rise to an increased attack surface due to the lack of secure communication. Accordingly, a lightweight and secure communication protocol is required for transmitting data between IoT devices. In this paper, we present results of experiments to conduct the hardware validation of a novel secure communication protocol which was introduced in [1]. This previously developed protocol utilizes multiple factors for authentication, which are updated after every protocol iteration. Ensuring that the same factors are not reused for authentication reduces the risk of potential attacks. Our implementation of this protocol utilizes a True Random Number Generator (TRNG) for factor updates to ensure that the factors are not based on a deterministic algorithm. In addition, our experiments validate the unicast and multicast communication features of the protocol. Our hardware platform is based on a network of Raspberry Pi boards and is designed to be both fast and computationally lightweight. We present results of experiments we conducted to assess the ability of our implementation to withstand network errors and delays. We also present an approach to choose the timeout value for a hardware implementation of the protocol. Our results demonstrate that our unicast and multicast implementations are scalable, while exhibiting good power, energy, and delay characteristics, thereby making our approach suitable for secure communication for smart IoT applications.
随着低功耗物联网(IoT)设备的广泛使用,生成和传输的数据量也在迅速增加。然而,由于缺乏安全通信,在不可靠的无线网络上传输敏感数据会增加攻击面。因此,物联网设备之间需要一种轻量级的安全通信协议来传输数据。本文介绍了对 [1] 中介绍的新型安全通信协议进行硬件验证的实验结果。这个先前开发的协议利用多个因素进行身份验证,这些因素在每次协议迭代后都会更新。确保同一因素不被重复用于验证,可降低潜在的攻击风险。我们对该协议的实现采用了真随机数生成器(TRNG)进行因子更新,以确保因子不是基于确定性算法。此外,我们的实验还验证了该协议的单播和组播通信功能。我们的硬件平台基于树莓派(Raspberry Pi)电路板网络,旨在实现快速和计算轻量级。我们展示了实验结果,以评估我们的实施方案抵御网络错误和延迟的能力。我们还介绍了一种为协议的硬件实施选择超时值的方法。我们的结果表明,我们的单播和组播实现具有可扩展性,同时表现出良好的功耗、能耗和延迟特性,从而使我们的方法适用于智能物联网应用的安全通信。
{"title":"A Hardware Validation Framework for a Networked Dynamic Multi-factor Security Protocol","authors":"Cheng-Yen Lee, Kyler R. Scott, Sunil P. Khatri, Ali Ghrayeb","doi":"10.1109/CommNet60167.2023.10365286","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365286","url":null,"abstract":"As the use of low-power Internet of Things (IoT) devices becomes widespread, the volume of data generated and transmitted is increasing rapidly. However, transmitting sensitive data over unreliable wireless networks gives rise to an increased attack surface due to the lack of secure communication. Accordingly, a lightweight and secure communication protocol is required for transmitting data between IoT devices. In this paper, we present results of experiments to conduct the hardware validation of a novel secure communication protocol which was introduced in [1]. This previously developed protocol utilizes multiple factors for authentication, which are updated after every protocol iteration. Ensuring that the same factors are not reused for authentication reduces the risk of potential attacks. Our implementation of this protocol utilizes a True Random Number Generator (TRNG) for factor updates to ensure that the factors are not based on a deterministic algorithm. In addition, our experiments validate the unicast and multicast communication features of the protocol. Our hardware platform is based on a network of Raspberry Pi boards and is designed to be both fast and computationally lightweight. We present results of experiments we conducted to assess the ability of our implementation to withstand network errors and delays. We also present an approach to choose the timeout value for a hardware implementation of the protocol. Our results demonstrate that our unicast and multicast implementations are scalable, while exhibiting good power, energy, and delay characteristics, thereby making our approach suitable for secure communication for smart IoT applications.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"3 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fractal analysis to BEMD’s IMFs: Application CT-Scan 对 BEMD 的 IMF 进行分形分析:应用 CT 扫描
F. Ghazil, A. Benkuider, F. Ayoub, M. Zraidi, K. Ibrahimi
Osteoporosis is a serious disease due to the fractures it causes which can lead to pain, impotence, loss of independence and excess mortality (femoral neck fractures). In addition, it is a disease with a high recurrence rate and is age-specific. Therefore, the impact of osteoporosis on the already sensitive healthcare system will increase, and thus several preventive measures can be taken to reduce its impact Based on texture analysis, which is crucial for image interpretation in the biomedical domain. We propose a fresh approach for classifying medical images in this context using bidimensional empirical multimodal decomposition (BEMD), this approach is based on the fractal analysis of BIMFs. BEMD is an extension of the one-dimensional case because it has proven to be an adaptive way to represent non-stationary and non-linear signals. Its application to image processing breaks down a image into the total of a number of hierarchical elements “bidimensional intrinsic mode functions (BIMFs)” and residues and the decomposition procedure is iterative. In order to objectively assess the effectiveness of the various BIMF modes and to characterize two states: osteoporotic and healthy, the fractal dimension was calculated for each BIMF using the DBC “Differential Box Counting” method. This novel strategy was applied on a database of CT-Scan medical images of bone textures which contains images of normal and pathological cases. Experimental results indicate that the third mode BIMF achieves higher separation rates compared to the other mode between normal and osteoporotic cases. We use classification rate evaluation criteria, such that the classification rate is given by KNN
骨质疏松症是一种严重的疾病,因为骨折会导致疼痛、阳痿、丧失独立能力和过高的死亡率(股骨颈骨折)。此外,骨质疏松症的复发率很高,而且具有年龄特异性。因此,骨质疏松症对本已敏感的医疗保健系统的影响将会增加,因此可以采取几种预防措施来减少其影响 基于纹理分析,这对生物医学领域的图像解读至关重要。在此背景下,我们提出了一种使用二维经验多模态分解(BEMD)对医学图像进行分类的全新方法,这种方法基于 BIMF 的分形分析。BEMD 是一维情况的扩展,因为它已被证明是表示非稳态和非线性信号的一种自适应方法。它在图像处理中的应用是将图像分解为若干层次元素 "二维本征模态函数(BIMF)"和残差的总和,分解过程是迭代的。为了客观地评估各种 BIMF 模式的有效性,并描述骨质疏松和健康这两种状态,使用 DBC "差分盒计数 "方法计算了每个 BIMF 的分形维度。这种新颖的策略被应用于包含正常和病理病例图像的骨纹理 CT 扫描医学图像数据库。实验结果表明,与其他模式相比,第三种模式 BIMF 在正常病例和骨质疏松病例之间实现了更高的分离率。我们使用分类率评价标准,分类率由 KNN 给出
{"title":"Fractal analysis to BEMD’s IMFs: Application CT-Scan","authors":"F. Ghazil, A. Benkuider, F. Ayoub, M. Zraidi, K. Ibrahimi","doi":"10.1109/CommNet60167.2023.10365292","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365292","url":null,"abstract":"Osteoporosis is a serious disease due to the fractures it causes which can lead to pain, impotence, loss of independence and excess mortality (femoral neck fractures). In addition, it is a disease with a high recurrence rate and is age-specific. Therefore, the impact of osteoporosis on the already sensitive healthcare system will increase, and thus several preventive measures can be taken to reduce its impact Based on texture analysis, which is crucial for image interpretation in the biomedical domain. We propose a fresh approach for classifying medical images in this context using bidimensional empirical multimodal decomposition (BEMD), this approach is based on the fractal analysis of BIMFs. BEMD is an extension of the one-dimensional case because it has proven to be an adaptive way to represent non-stationary and non-linear signals. Its application to image processing breaks down a image into the total of a number of hierarchical elements “bidimensional intrinsic mode functions (BIMFs)” and residues and the decomposition procedure is iterative. In order to objectively assess the effectiveness of the various BIMF modes and to characterize two states: osteoporotic and healthy, the fractal dimension was calculated for each BIMF using the DBC “Differential Box Counting” method. This novel strategy was applied on a database of CT-Scan medical images of bone textures which contains images of normal and pathological cases. Experimental results indicate that the third mode BIMF achieves higher separation rates compared to the other mode between normal and osteoporotic cases. We use classification rate evaluation criteria, such that the classification rate is given by KNN","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"256 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Low-Profile Dual-Band Eight-Port MIMO PIFA Antenna for 5G/WLAN Sub-6 GHz Mobile Terminal 用于 5G/WLAN Sub-6 GHz 移动终端的扁平双频八端口 MIMO PIFA 天线
Rachida Boufouss, A. Najid
In this article, an 8-port, 8-element dual-band multiple input and multiple output (MIMO) Planar Inverted F-Antenna (PIFA) having a height of 2.5 mm is proposed for the 5G/WLAN sub-6 GHz mobile terminal. For achieving dual-band operation with wide bandwidth, a parasitic element and L-slot are added to the PIFA, whereas a rectangular open-ended ring is printed on the top substrate next to the parasitic element. The results show that the proposed MIMO antenna system operates at 3.43–3.8 GHz and 5.15–5.85 GHz with −6dB impedance bandwidth condition. The minimum isolation achieved between two adjacent antenna elements is better than 12.1 dB in the lower band, while in the upper band is 16 dB without using any extra decoupling techniques. Moreover, radiation efficiency, radiation pattern, envelop correlation coefficient and diversity gain are all presented in this article, showing good MIMO performances of the proposed antenna which makes it promising for 5G sub-6 GHz mobile terminal.
本文为 5G/WLAN sub-6 GHz 移动终端提出了一种高度为 2.5 毫米的 8 端口、8 元件双频多输入多输出(MIMO)平面反向 F 天线(PIFA)。为实现宽带双频工作,在 PIFA 上添加了寄生元件和 L 型槽,并在寄生元件旁边的顶部基板上印刷了一个矩形开口环。结果表明,拟议的多输入多输出天线系统可在 3.43-3.8 GHz 和 5.15-5.85 GHz 频率下工作,阻抗带宽条件为 -6dB。在不使用任何额外去耦技术的情况下,两个相邻天线元件之间的最小隔离度在低频段优于 12.1 dB,而在高频段为 16 dB。此外,本文还介绍了辐射效率、辐射模式、包络相关系数和分集增益,显示了所提天线良好的多输入多输出性能,使其有望应用于 5G sub-6 GHz 移动终端。
{"title":"A Low-Profile Dual-Band Eight-Port MIMO PIFA Antenna for 5G/WLAN Sub-6 GHz Mobile Terminal","authors":"Rachida Boufouss, A. Najid","doi":"10.1109/CommNet60167.2023.10365263","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365263","url":null,"abstract":"In this article, an 8-port, 8-element dual-band multiple input and multiple output (MIMO) Planar Inverted F-Antenna (PIFA) having a height of 2.5 mm is proposed for the 5G/WLAN sub-6 GHz mobile terminal. For achieving dual-band operation with wide bandwidth, a parasitic element and L-slot are added to the PIFA, whereas a rectangular open-ended ring is printed on the top substrate next to the parasitic element. The results show that the proposed MIMO antenna system operates at 3.43–3.8 GHz and 5.15–5.85 GHz with −6dB impedance bandwidth condition. The minimum isolation achieved between two adjacent antenna elements is better than 12.1 dB in the lower band, while in the upper band is 16 dB without using any extra decoupling techniques. Moreover, radiation efficiency, radiation pattern, envelop correlation coefficient and diversity gain are all presented in this article, showing good MIMO performances of the proposed antenna which makes it promising for 5G sub-6 GHz mobile terminal.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"414 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Backstepping Control of a Double-Stage Photovoltaic System Connected to the Tree-Phase Grid Under Partial Shading Conditions 部分遮光条件下与树相电网连接的双级光伏系统的反步进控制
Khadija Sabri, O. E. Maguiri, A. Farchi
This paper solves the problem of controlling maximum power in photovoltaic systems connected to the grid in order to track changes and meet energy demand. Our work focuses on two crucial objectives: i. extracting the maximum available power (MPPT) in case of partial shading, ii. unifying the power factor (FPU). To accomplish this, we integrated a non-linear backstepping controller to extract the Maximum Power Point (MPP) using the Particle Swarming Algorithm (PSO), influencing the duty cycle of the DC/DC converter. Additionally, we applied this approach to the three-phase voltage-source inverter for achieving a unified power factor (FPU). We validated the efficacy of the introduced system through modeling and simulation in MATLAB/Simulink. The controlled system’s asymptotic stability is demonstrated mathematically, and simulation results show that the controller has successfully accomplished all of its goals with excellent dynamic performance even in the partial shading conditions. The suggested controller also exhibits excellent robustness against system disturbances, which is its primary advantage over alternative control systems.
本文解决的问题是控制与电网相连的光伏系统的最大功率,以跟踪变化并满足能源需求。我们的工作侧重于两个关键目标:i. 在部分遮光的情况下提取最大可用功率 (MPPT);ii. 统一功率因数 (FPU)。为此,我们集成了一个非线性反步进控制器,利用粒子群算法 (PSO) 提取最大功率点 (MPP),影响 DC/DC 转换器的占空比。此外,我们还将这种方法应用于三相电压源逆变器,以实现统一功率因数(FPU)。我们通过 MATLAB/Simulink 建模和仿真验证了所引入系统的功效。仿真结果表明,即使在部分遮阳条件下,控制器也能成功实现其所有目标,并具有出色的动态性能。所建议的控制器还对系统干扰表现出卓越的鲁棒性,这是它与其他控制系统相比的主要优势。
{"title":"Backstepping Control of a Double-Stage Photovoltaic System Connected to the Tree-Phase Grid Under Partial Shading Conditions","authors":"Khadija Sabri, O. E. Maguiri, A. Farchi","doi":"10.1109/CommNet60167.2023.10365289","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365289","url":null,"abstract":"This paper solves the problem of controlling maximum power in photovoltaic systems connected to the grid in order to track changes and meet energy demand. Our work focuses on two crucial objectives: i. extracting the maximum available power (MPPT) in case of partial shading, ii. unifying the power factor (FPU). To accomplish this, we integrated a non-linear backstepping controller to extract the Maximum Power Point (MPP) using the Particle Swarming Algorithm (PSO), influencing the duty cycle of the DC/DC converter. Additionally, we applied this approach to the three-phase voltage-source inverter for achieving a unified power factor (FPU). We validated the efficacy of the introduced system through modeling and simulation in MATLAB/Simulink. The controlled system’s asymptotic stability is demonstrated mathematically, and simulation results show that the controller has successfully accomplished all of its goals with excellent dynamic performance even in the partial shading conditions. The suggested controller also exhibits excellent robustness against system disturbances, which is its primary advantage over alternative control systems.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"52 12","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving IoT Botnet Detection Using Ensemble Learning 利用集合学习改进物联网僵尸网络检测
Youssra Baja, Khalid Chougdali, A. Kobbane
With the increasing use of Internet of Things (IoT) devices in various domains, including offices, homes, hospitals, cities, and transportation, cyberattacks using malicious attacks have become more frequent and complex, posing new challenges and risks. Therefore, it is crucial to enhance the speed and accuracy of security measures. In this paper, we propose an ensemble machine-learning model that utilizes various techniques, such as Stacking and Bagging, in combination with individual classifiers based on machine learning models to detect botnet attacks using the N-BaIoT dataset. Our results demonstrate the efficiency and efficacy of the proposed stacking model, which outperformed other techniques for every evaluation metric. We conclude that the selected model can achieve a very good accuracy rate.
随着物联网(IoT)设备在办公室、家庭、医院、城市和交通等各个领域的应用日益广泛,利用恶意攻击进行的网络攻击变得更加频繁和复杂,带来了新的挑战和风险。因此,提高安全措施的速度和准确性至关重要。在本文中,我们提出了一种集合机器学习模型,该模型利用堆叠(Stacking)和装袋(Bagging)等多种技术,结合基于机器学习模型的单个分类器,利用 N-BaIoT 数据集检测僵尸网络攻击。我们的结果证明了所提出的堆叠模型的效率和功效,该模型在每个评估指标上都优于其他技术。我们的结论是,所选模型可以达到非常高的准确率。
{"title":"Improving IoT Botnet Detection Using Ensemble Learning","authors":"Youssra Baja, Khalid Chougdali, A. Kobbane","doi":"10.1109/CommNet60167.2023.10365268","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365268","url":null,"abstract":"With the increasing use of Internet of Things (IoT) devices in various domains, including offices, homes, hospitals, cities, and transportation, cyberattacks using malicious attacks have become more frequent and complex, posing new challenges and risks. Therefore, it is crucial to enhance the speed and accuracy of security measures. In this paper, we propose an ensemble machine-learning model that utilizes various techniques, such as Stacking and Bagging, in combination with individual classifiers based on machine learning models to detect botnet attacks using the N-BaIoT dataset. Our results demonstrate the efficiency and efficacy of the proposed stacking model, which outperformed other techniques for every evaluation metric. We conclude that the selected model can achieve a very good accuracy rate.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"71 4","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Object Localization Using a Beamsteering mmWave Communication System 利用波束转向毫米波通信系统增强物体定位功能
Ekaterina Sedunova, N. Maletic, D. Cvetkovski, E. Grass
This work focuses on object localization algorithms using channel impulse responses (CIR) of beamsteering millimeter wave (mmWave) communication systems. Without limiting generality, the transmitter and receiver are considered to reside in the two focal points of ellipses, while objects are positioned at the perimeter of those ellipses. The idea is inspired by bistatic RADAR systems, using a communication link that can simultaneously serve for sensing in a joint communication and sensing (JCAS) scenario. For experimental verification, we performed the channel measurements in an anechoic chamber. The main contribution of this work is developing an approach for enhancing object identification using antenna pattern deconvolution and improving the visual representation of the obtained data. Furthermore, the paper investigates the impact of the angular step size on the resolution of found objects for a fixed beam width. Our proposed method enhances object identification and reconstruction compared to prior research.
这项工作的重点是利用毫米波(mmWave)通信系统波束转向的信道脉冲响应(CIR)进行物体定位算法。在不限制一般性的前提下,发射器和接收器被认为位于椭圆的两个焦点,而物体则位于这些椭圆的周边。这一想法受到双稳态雷达系统的启发,在联合通信和传感(JCAS)场景中使用可同时用于传感的通信链路。为了进行实验验证,我们在消声室中进行了信道测量。这项工作的主要贡献在于开发了一种利用天线模式解卷积增强目标识别的方法,并改进了所获数据的可视化表示。此外,本文还研究了在固定波束宽度下,角度步长对所发现物体分辨率的影响。与之前的研究相比,我们提出的方法增强了物体识别和重建能力。
{"title":"Enhanced Object Localization Using a Beamsteering mmWave Communication System","authors":"Ekaterina Sedunova, N. Maletic, D. Cvetkovski, E. Grass","doi":"10.1109/CommNet60167.2023.10365256","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365256","url":null,"abstract":"This work focuses on object localization algorithms using channel impulse responses (CIR) of beamsteering millimeter wave (mmWave) communication systems. Without limiting generality, the transmitter and receiver are considered to reside in the two focal points of ellipses, while objects are positioned at the perimeter of those ellipses. The idea is inspired by bistatic RADAR systems, using a communication link that can simultaneously serve for sensing in a joint communication and sensing (JCAS) scenario. For experimental verification, we performed the channel measurements in an anechoic chamber. The main contribution of this work is developing an approach for enhancing object identification using antenna pattern deconvolution and improving the visual representation of the obtained data. Furthermore, the paper investigates the impact of the angular step size on the resolution of found objects for a fixed beam width. Our proposed method enhances object identification and reconstruction compared to prior research.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"61 6","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementing and Evaluating a P4-based Access Gateway Function on a Tofino Switch 在 Tofino 交换机上实施和评估基于 P4 的接入网关功能
El-Mehdi Makhroute, Mohammed-Ayoub Elharti, Vincent Brouillard, Yvon Savaria, Tarek Ould-Bachir
This paper introduces an Access Gate Function (AGF) that has been implemented using the P4 language and evaluates its performance when running on a Tofino switch. Through the process of translating specifications from the Broadband Forum (BBF) for Fixed Mobile Convergence in the 5G Core into a P4 code and by conducting data plane simulations on software switch models, we provide evidence that the AGF solution conforms to industry standards and exhibits efficient and scalable performance characteristics. Subsequently, we assess the prototype’s implementation on a Tofino switch, analyzing its capabilities and limitations. The reported results demonstrate that the programmable P4 Tofino switch efficiently handles a significant number of sessions, further reinforcing the potential and practicality of the proposed solution for industrial deployment in fixed-mobile convergence scenarios.
本文介绍了一种使用 P4 语言实现的接入网关功能(AGF),并对其在 Tofino 交换机上运行时的性能进行了评估。通过将宽带论坛(BBF)的 5G 核心固定移动融合规范转化为 P4 代码,并在软件交换机模型上进行数据平面仿真,我们证明 AGF 解决方案符合行业标准,并具有高效、可扩展的性能特点。随后,我们评估了原型在 Tofino 交换机上的实施情况,分析了其能力和局限性。报告结果表明,可编程 P4 Tofino 交换机可有效处理大量会话,进一步增强了拟议解决方案在固定-移动融合场景中进行工业部署的潜力和实用性。
{"title":"Implementing and Evaluating a P4-based Access Gateway Function on a Tofino Switch","authors":"El-Mehdi Makhroute, Mohammed-Ayoub Elharti, Vincent Brouillard, Yvon Savaria, Tarek Ould-Bachir","doi":"10.1109/CommNet60167.2023.10365266","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365266","url":null,"abstract":"This paper introduces an Access Gate Function (AGF) that has been implemented using the P4 language and evaluates its performance when running on a Tofino switch. Through the process of translating specifications from the Broadband Forum (BBF) for Fixed Mobile Convergence in the 5G Core into a P4 code and by conducting data plane simulations on software switch models, we provide evidence that the AGF solution conforms to industry standards and exhibits efficient and scalable performance characteristics. Subsequently, we assess the prototype’s implementation on a Tofino switch, analyzing its capabilities and limitations. The reported results demonstrate that the programmable P4 Tofino switch efficiently handles a significant number of sessions, further reinforcing the potential and practicality of the proposed solution for industrial deployment in fixed-mobile convergence scenarios.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"30 2","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1