M. Benaddy, B. E. Habil, M. E. Ouali, O. E. Meslouhi, S. Krit
{"title":"A mutlipath routing algorithm for wireless sensor networks under distance and energy consumption constraints for reliable data transmission","authors":"M. Benaddy, B. E. Habil, M. E. Ouali, O. E. Meslouhi, S. Krit","doi":"10.11648/J.IJSSN.S.2017050501.16","DOIUrl":"https://doi.org/10.11648/J.IJSSN.S.2017050501.16","url":null,"abstract":"Many applications of wireless sensor networks are critical such as, medical, crisis management, environmental, military, transportation, emergency, security applications. These applications require reliable data collection and achievement. Researchers have been investigated in this area proposing many techniques for WSN reliability meet, such as redundancy or retransmission mechanisms or multipaths routing protocols, some of these techniques dont care about the WSN limitation resources such as energy consumption. In this paper we propose a multi-path routing algorithm for WSN for reliability data transmission, considering distance and energy consumption constraints.","PeriodicalId":117908,"journal":{"name":"2017 International Conference on Engineering & MIS (ICEMIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129661556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Krit, M. Benaddy, B. E. Habil, M. E. Ouali, O. E. Meslouhi
{"title":"Security of hardware architecture, design and performance of low drop-out voltage regulator LDO to protect power mobile applications","authors":"S. Krit, M. Benaddy, B. E. Habil, M. E. Ouali, O. E. Meslouhi","doi":"10.11648/J.IJSSN.S.2017050501.15","DOIUrl":"https://doi.org/10.11648/J.IJSSN.S.2017050501.15","url":null,"abstract":"This paper present a new Low Drop-Out Voltage Regulator (LDO) and highlight the topologies and the advantages of the LDO for hardware security protection of Wireless Sensor Networks (WSNs), this integrated circuits are considered as an ideal solution in low power System on-chip applications (SOC) for their compact sizes and low cost. The advancement in low-power design makes it possible that ubiquitous device can be powered by low-power energy source such as ambient energy or small size batteries. In many well supplied devices the problem related to power is essentially related to cost. However for low-powered devices the problem of power is not only economics but also becomes very essential in terms of functionality. Due to the usual very small amount of energy or unstable energy available the way the engineer manages power becomes a key point in this area. Therefore, another focus of this dissertation is to try finding ways to improve the security of power management problems. Complementary metal oxide-semiconductor (CMOS) has become the predominant technology in integrated circuit design due to its high density, power savings and low manufacturing costs. The whole integrated circuit industry will still continue to benefit from the geometric downsizing that comes with every new generation of semiconductor manufacturing processes. Therefore, only several CMOS analog integrated circuit design techniques are proposed for low-powered ubiquitous device in this dissertation. This paper reviews the basics of LDO regulators and discusses the technology advances in the latest generation of LDOs that make them the preferred solution for many points of load power requirements. The paper will also introduce characteristics of CMOS LDO regulators and discuss their unique benefits in portable electronics applications. these new device offer a real advantages for the power management security of new applications mobile. Power efficiency and some practical issues for the CMOS implementation of these LDO structures are discussed.","PeriodicalId":117908,"journal":{"name":"2017 International Conference on Engineering & MIS (ICEMIS)","volume":"47 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114021168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. E. Asikri, S. Krit, H. Chaib, M. Kabrane, H. Ouadani, K. Karimi, Kaouthar Bendaouad, Hicham Elbousty
{"title":"Mining the Web for learning ontologies: State of art and critical review","authors":"M. E. Asikri, S. Krit, H. Chaib, M. Kabrane, H. Ouadani, K. Karimi, Kaouthar Bendaouad, Hicham Elbousty","doi":"10.11648/J.IJSSN.S.2017050501.13","DOIUrl":"https://doi.org/10.11648/J.IJSSN.S.2017050501.13","url":null,"abstract":"The aim of the paper is to investigate and present the subject of building ontologies using the Semantic Web Mining that is defined as the combination of the two fast-developing research areas Semantic Web and Web Mining. Web mining is the application of data mining techniques to the content, structure, and usage of Web resources and The Semantic Web is the second-generation WWW, enriched by machine-processable information which supports the user in his tasks. This can help to discover global as well as local structure “models” or “patterns” within and between Web pages and ontology extraction witch is the automatic or semi-automatic creation of ontologies, including extracting the corresponding domain's terms and the relationships between those concepts, and encoding them with an ontology language for easy retrieval. As building ontologies manually is extremely labor-intensive and time-consuming, there is great motivation to automate the process. This paper gives an overview of where the two areas meet today, and discuss ways of how a closer integration could be profitable.","PeriodicalId":117908,"journal":{"name":"2017 International Conference on Engineering & MIS (ICEMIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125357723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electro-thermal modeling of power IGBT modules by heat pipe systems","authors":"A. Driss, S. Maalej, M. Zaghdoudi","doi":"10.1109/ICEMIS.2017.8273068","DOIUrl":"https://doi.org/10.1109/ICEMIS.2017.8273068","url":null,"abstract":"This paper presents an electro-thermal model of an IGBT with its cooling system. A thermal model based on a Cauer Resistor-Capacitance (RC) thermal network, is developed in order to predict the IGBT junction temperature in transient operation. The thermal resistances and capacitances are obtained by a mathematical transformation that is applied to a model based on the Foster thermal network. An electrical model of the IGBT is also developed, and it takes into account the dependency of the static electrical parameters of the IGBT with the junction temperature. The electro-thermal model is considered in a boost converter applications, and two cooling modes are studied. The first one uses air convection technique, and the second one consists of a heat pipe cooling system of which the heat sink is cooled by cold plates using water circulation. The model predictions show the effectiveness of the heat pipe cooling system for different operating conditions such as the commutation frequency and the duty ratio. It is demonstrated that the heat pipe cooling system limits the junction temperature to low values which remain below the maximum admissible ones.","PeriodicalId":117908,"journal":{"name":"2017 International Conference on Engineering & MIS (ICEMIS)","volume":"35 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125615010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overview of firewalls: Types and policies: Managing windows embedded firewall programmatically","authors":"S. Krit, Elbachir Haimoud","doi":"10.1109/ICEMIS.2017.8273003","DOIUrl":"https://doi.org/10.1109/ICEMIS.2017.8273003","url":null,"abstract":"Due to the increasing threat of network attacks, Firewall has become crucial elements in network security, and have been widely deployed in most businesses and institutions for securing private networks. The function of a firewall is to examine each packet that passes through it and decide whether to letting them pass or halting them based on preconfigured rules and policies, so firewall now is the first defense line against cyber attacks. However most of people doesn't know how firewall works, and the most users of windows operating system doesn't know how to use the windows embedded firewall. This paper explains how firewall works, firewalls types, and all you need to know about firewall policies, then presents a novel application (QudsWall) developed by authors that manages windows embedded firewall and make it easy to use.","PeriodicalId":117908,"journal":{"name":"2017 International Conference on Engineering & MIS (ICEMIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128747923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aymen Ben Hammadi, Mongia Mhiri, F. Haddad, Sehmi Saad, K. Besbes
{"title":"Study of wide adjustable active inductor circuits: Design approaches and reconfiguration methods","authors":"Aymen Ben Hammadi, Mongia Mhiri, F. Haddad, Sehmi Saad, K. Besbes","doi":"10.1109/ICEMIS.2017.8273063","DOIUrl":"https://doi.org/10.1109/ICEMIS.2017.8273063","url":null,"abstract":"This paper provides a comprehensive review of reconfigurable active inductor circuit topologies. Three reported architectures with different reconfiguration techniques have been studied in order to properly select adequate solution for designing wide adjustable active inductor. The study of the different topologies is revealed from the point of view of simplicity of structure, frequency tuning and quality factor, and power consumption. A wide tuning range active inductor model implemented in 0.13 μm CMOS has been suggested and compared to other exiting topologies in terms of performances parameters.","PeriodicalId":117908,"journal":{"name":"2017 International Conference on Engineering & MIS (ICEMIS)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116039890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Oudani, S. Krit, M. Kabrane, K. Karimi, M. Elasikri, K. Bendaoud, H. E. Bousty, L. Elmaimouni
{"title":"Minimize energy consumption in wireless sensor network using hierarchical protocols","authors":"H. Oudani, S. Krit, M. Kabrane, K. Karimi, M. Elasikri, K. Bendaoud, H. E. Bousty, L. Elmaimouni","doi":"10.1109/ICEMIS.2017.8272969","DOIUrl":"https://doi.org/10.1109/ICEMIS.2017.8272969","url":null,"abstract":"Wireless Sensor Networks (WSNs) is a network containing a set of autonomous nodes that are randomly distributed in a region of interest. The role of each node is the periodic transmission of results to the sink. Improving the energy efficiency and maximizing the networking lifetime are the major challenges in this kind of networks. To deal with this, the hierarchical protocols (Cluster based-approach, chain based-approach) have been developed in order to reduce the network traffic toward the sink and therefore prolong the network lifetime. In this paper we will concentrate to the protocol LEACH (Low Energy Adaptive Clustering Hierarchy Protocol) in order to propose a new method of selection of cluster head. Our method is to conserve energy consumption when transmitting data to the Base Station (BS). We evaluated the performance of the LEACH protocol with our proposed method using Matlab as a simulation tool.","PeriodicalId":117908,"journal":{"name":"2017 International Conference on Engineering & MIS (ICEMIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126716422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Habbachi, H. Boussetta, M. Kallala, P. Pons, A. Boukabache, K. Besbes
{"title":"Leakage current effect on fixed and tunable solenoid RF MEMS inductors","authors":"N. Habbachi, H. Boussetta, M. Kallala, P. Pons, A. Boukabache, K. Besbes","doi":"10.1109/ICEMIS.2017.8273054","DOIUrl":"https://doi.org/10.1109/ICEMIS.2017.8273054","url":null,"abstract":"This paper investigates the performances of fixed and tunable solenoid RF MEMS inductors for two silicon substrates: regular and etched. We have modeled the current density distribution in silicon substrates and then in NiFe plate using FEM numerical tool. Moreover, we have studied the inductors performances in responses of frequency variation from 100 MHz to 30 GHz. The best quality factor and resonant frequency values are respectively Qmax = 19 and Fres = 15 GHz when substrate leakage current is reduced. In addition, the obtained tuning range increases and reaches Tr = 132.8% at 10 GHz instead of Tr = 96.8% at 5 GHz when the silicon substrate is etched.","PeriodicalId":117908,"journal":{"name":"2017 International Conference on Engineering & MIS (ICEMIS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125117703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A PSO algorithm applied to a PID controller for motion mobile robot in a complex dynamic environment","authors":"A. Aouf, L. Boussaid, A. Sakly","doi":"10.1109/ICEMIS.2017.8273012","DOIUrl":"https://doi.org/10.1109/ICEMIS.2017.8273012","url":null,"abstract":"In robot navigation problem, many variables should be controlled in order to obtain the best upshot at the end of task. Indeed, the mobile robot ought to avoid obstacles and reach its final destination with the nethermost time and the shortest trajectory. It should be stable, accurate and replies quickly. Motivated by these demands, Particle Swarm Optimization for optimal PID controller for motion planning in a real complex environment is developed. Comparing to a Fuzzy logic controller, simulation results shows the efficiency of our suggested method.","PeriodicalId":117908,"journal":{"name":"2017 International Conference on Engineering & MIS (ICEMIS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124394526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust PID controller design based on multi-objective Particle Swarm Optimization approach","authors":"Riadh Madiouni","doi":"10.1109/ICEMIS.2017.8273039","DOIUrl":"https://doi.org/10.1109/ICEMIS.2017.8273039","url":null,"abstract":"This paper presents a new method for the synthesis of a robust PID controller for SISO or MIMO systems based on concepts and Multi-Objective Particle Swarm Optimization (MOPSO). This work aims to satisfy several criteria and constraints for the design of a robust PID controller. The formulated optimization-based synthesis problem is solved with the developed MOPSO algorithm. The proposed method is based on the concepts of Pareto dominance to identify the non-dominated solutions. The adaptive grid method is used to produce well-distributed Pareto fronts in multi-objective formalism. The obtained simulation results are compared with the NSGA-II evolutionary algorithm and which shows the superiority of MOPSO algorithm in terms of performance and robustness.","PeriodicalId":117908,"journal":{"name":"2017 International Conference on Engineering & MIS (ICEMIS)","volume":"10 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113965148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}