2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)最新文献

筛选
英文 中文
Hardware implementation of a strong pseudo-random numbers generator with an application to image encryption 硬件实现的一个强伪随机数生成器,用于图像加密
M. Gafsi, Nessrine Abbassi, Rim Amdouni, Mohamed Ali Hajjaji, A. Mtibaa
{"title":"Hardware implementation of a strong pseudo-random numbers generator with an application to image encryption","authors":"M. Gafsi, Nessrine Abbassi, Rim Amdouni, Mohamed Ali Hajjaji, A. Mtibaa","doi":"10.1109/SETIT54465.2022.9875453","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875453","url":null,"abstract":"This paper suggests a high-performance FPGA implementation of a strong pseudo-random numbers generator for several applications mainly in the security domain. An improved PRNG utilizing the Lorenz chaotic map is propounded. Then, using the Xilinx System Generator software of Xilinx society an FPGA architecture of the DPRNG is developed. Next, the hardware DPRNG is implemented on an FPGA-Zynq resulting in low resource utilization, a good frequency of 194.714 MHz, and high throughput of 25702 Mbps. The NIST 800-22 SP test suite result demonstrates that the suggested hardware DPRNG allows for generating high-quality random numbers. It provides a strong key with a high space. In addition, an application of the hardware DPRNG for image encryption is presented. The experimental results show better results when compared to other recent works.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115714751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysing ICT Initiatives towards Smart Policing to Assist African Law Enforcement in Combating Cybercrimes 分析实现智能警务的信息通信技术举措,以协助非洲执法部门打击网络犯罪
Naftali Nakasole, Mercy Chitauro, Suama Hamunyela
{"title":"Analysing ICT Initiatives towards Smart Policing to Assist African Law Enforcement in Combating Cybercrimes","authors":"Naftali Nakasole, Mercy Chitauro, Suama Hamunyela","doi":"10.1109/SETIT54465.2022.9875510","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875510","url":null,"abstract":"The Information and Communication Technology (ICT) revolution has become a critical component of every law enforcement when combating crimes. With the surge of cybercrimes, it has increasing pressure on law enforcement to guarantee that cybercrimes are successfully combated. To combat cybercrimes, there are initiatives such as Social Media, Open Data, Geographic Information System Crime Mapping, Science of Security (SoS), Electronic Safe for Kid, Cybersecurity Competition, Cybercrime Reporting Portals, and Artificial Intelligence solutions which are vital to law enforcement in deterring more cybercrimes. This study employed a systematic literature review to look at relevant ICT initiative at the disposal to African law enforcement and they can be of assist in combating cybercrimes.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114446281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adoption of a Secure ECC-based RFID Authentication Protocol 采用一种安全的基于ecc的RFID认证协议
Souhir Gabsi, Yassin Kortli, V. Beroulle, Yann Kieffer, H. Belgacem
{"title":"Adoption of a Secure ECC-based RFID Authentication Protocol","authors":"Souhir Gabsi, Yassin Kortli, V. Beroulle, Yann Kieffer, H. Belgacem","doi":"10.1109/SETIT54465.2022.9875855","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875855","url":null,"abstract":"A single RFID (Radio Frequency Identification) is a technology for the remote identification of objects or people. It integrates a reader that receives the information contained in an RFID tag through an RFID authentication protocol. RFID provides several security services to protect the data transmitted between the tag and the reader. However, these advantages do not prevent an attacker to access this communication and remaining various security and privacy issues in these systems. Furthermore, with the rapid growth of IoT, there is an urgent need of security authentication and confidential data protection. Authentication protocols based on elliptic curve cryptographic (ECC) were widely investigated and implemented to guarantee protection against the various attacks that can suffer an RFID system. In this paper, we are going to focus on a comparative study between the most efficient ECC-based RFID authentication protocols that are already published, and study their security against the different wireless attacks.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122872186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of ADAS Fatigue Control System using Pynq z1 and Jetson Xavier NX 基于pynqz1和jetsonxavier NX的ADAS疲劳控制系统设计
Yassin Kortli, Souhir Gabsi, L. L. Y. Lew Yan Voon, M. Jridi
{"title":"Design of ADAS Fatigue Control System using Pynq z1 and Jetson Xavier NX","authors":"Yassin Kortli, Souhir Gabsi, L. L. Y. Lew Yan Voon, M. Jridi","doi":"10.1109/SETIT54465.2022.9875823","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875823","url":null,"abstract":"In recent years, driver fatigue and drowsiness have been presented as the main factors of road accidents with a high rate of passenger deaths, injuries and property losses. In this paper, we developed a monitoring system for vehicle drivers that detects and warns of the presence of fatigue and drowsiness through computer vision or machine vision. Our developed system consists of four steps: training of the classifier to perform the detection module, image acquisition and processing, detection and alarm activation. Firstly, training of classifier was performed using Haar technique to locate face features. Secondly, a Jetson Xavier NX or Pynq Z1 development board was used to perform real-time video using a 4K camera, thirdly, we use the training classifier to detect the face image and facial landmark algorithm proposed by Kazemi & Sullivan to detect face features. Finally, our system analyses the state characteristics of the eyes; once the processing is completed, the detection of drowsiness and fatigue is carried out.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123034902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Left ventricular assist device: CFD Simulation of Flow HeartWare 左心室辅助装置:Flow HeartWare的CFD模拟
Houneida Sakly, Mourad Said, M. Tagina
{"title":"Left ventricular assist device: CFD Simulation of Flow HeartWare","authors":"Houneida Sakly, Mourad Said, M. Tagina","doi":"10.1109/SETIT54465.2022.9875700","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875700","url":null,"abstract":"The development of further treatment techniques in the prognosis of terminal heart failure has recently been influenced by innovative mechanical circulatory systems in the medical profession. The need for cardiac intervention may be determined by the patient's condition. Implantable left ventricular assist devices may be used to replace it in some circumstances left ventricular assist devices. Mechanical assistance of the failing left ventricle enables optimal hemodynamic stability and recovery of secondary organ failure for patients suffering from heart failure. These devices can help the expert until a suitable cardiac allograft becomes available, but they are also used as a last resort for individuals who are not transplant candidates. Furthermore, left ventricular assist devices implantation, requires a second heart procedure, which comes with its own set of dangers and perioperative difficulties during the waiting period. The surgical problem arises when a left ventricular assist devices is already installed after a heart transplant at home. Implementation of the HeartWare System When compared to pulsatile devices, tracking is thought to be more versatile and long-lasting. Our key contribution in this regard is to use of computational fluid dynamics modules to assess the velocity behavior as well as the flow heart rate while taking into account the physical features of blood flow.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123671561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A machine learning approach for groundwater modeling 地下水建模的机器学习方法
M. Cimino, Manel Ennahedh, Federico A. Galatolo, N. Hariga-Tlatli, I. Nouiri, N. Perilli, J. Tarhouni
{"title":"A machine learning approach for groundwater modeling","authors":"M. Cimino, Manel Ennahedh, Federico A. Galatolo, N. Hariga-Tlatli, I. Nouiri, N. Perilli, J. Tarhouni","doi":"10.1109/SETIT54465.2022.9875601","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875601","url":null,"abstract":"This paper introduces a novel method and tools for groundwater modeling. The purpose is to perform numerical approximations of a groundwater system, for unlocking and paving water management problems and supporting decision-making processes. In the last decade, Data-driven Models (DdMs) have attracted increasing attention for their efficient development made possible by modern remote and ground sensing and learning technologies. With respect to conventional Process-driven Models (PdMs), based on mathematical modeling of core physical processes into a system of equations, a DdM requires less human effort and process-specific knowledge. The paper covers the design and simulation of a deep learning modeling tool based on Convolutional Neural Networks, integrated with the design and simulation of the workflow based on the Business Process Model and Notation (BPMN). Experimental results clearly show the potential of the novel approach for scientists and policy makers.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126075247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信