M. Gafsi, Nessrine Abbassi, Rim Amdouni, Mohamed Ali Hajjaji, A. Mtibaa
{"title":"Hardware implementation of a strong pseudo-random numbers generator with an application to image encryption","authors":"M. Gafsi, Nessrine Abbassi, Rim Amdouni, Mohamed Ali Hajjaji, A. Mtibaa","doi":"10.1109/SETIT54465.2022.9875453","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875453","url":null,"abstract":"This paper suggests a high-performance FPGA implementation of a strong pseudo-random numbers generator for several applications mainly in the security domain. An improved PRNG utilizing the Lorenz chaotic map is propounded. Then, using the Xilinx System Generator software of Xilinx society an FPGA architecture of the DPRNG is developed. Next, the hardware DPRNG is implemented on an FPGA-Zynq resulting in low resource utilization, a good frequency of 194.714 MHz, and high throughput of 25702 Mbps. The NIST 800-22 SP test suite result demonstrates that the suggested hardware DPRNG allows for generating high-quality random numbers. It provides a strong key with a high space. In addition, an application of the hardware DPRNG for image encryption is presented. The experimental results show better results when compared to other recent works.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115714751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysing ICT Initiatives towards Smart Policing to Assist African Law Enforcement in Combating Cybercrimes","authors":"Naftali Nakasole, Mercy Chitauro, Suama Hamunyela","doi":"10.1109/SETIT54465.2022.9875510","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875510","url":null,"abstract":"The Information and Communication Technology (ICT) revolution has become a critical component of every law enforcement when combating crimes. With the surge of cybercrimes, it has increasing pressure on law enforcement to guarantee that cybercrimes are successfully combated. To combat cybercrimes, there are initiatives such as Social Media, Open Data, Geographic Information System Crime Mapping, Science of Security (SoS), Electronic Safe for Kid, Cybersecurity Competition, Cybercrime Reporting Portals, and Artificial Intelligence solutions which are vital to law enforcement in deterring more cybercrimes. This study employed a systematic literature review to look at relevant ICT initiative at the disposal to African law enforcement and they can be of assist in combating cybercrimes.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114446281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Souhir Gabsi, Yassin Kortli, V. Beroulle, Yann Kieffer, H. Belgacem
{"title":"Adoption of a Secure ECC-based RFID Authentication Protocol","authors":"Souhir Gabsi, Yassin Kortli, V. Beroulle, Yann Kieffer, H. Belgacem","doi":"10.1109/SETIT54465.2022.9875855","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875855","url":null,"abstract":"A single RFID (Radio Frequency Identification) is a technology for the remote identification of objects or people. It integrates a reader that receives the information contained in an RFID tag through an RFID authentication protocol. RFID provides several security services to protect the data transmitted between the tag and the reader. However, these advantages do not prevent an attacker to access this communication and remaining various security and privacy issues in these systems. Furthermore, with the rapid growth of IoT, there is an urgent need of security authentication and confidential data protection. Authentication protocols based on elliptic curve cryptographic (ECC) were widely investigated and implemented to guarantee protection against the various attacks that can suffer an RFID system. In this paper, we are going to focus on a comparative study between the most efficient ECC-based RFID authentication protocols that are already published, and study their security against the different wireless attacks.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122872186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yassin Kortli, Souhir Gabsi, L. L. Y. Lew Yan Voon, M. Jridi
{"title":"Design of ADAS Fatigue Control System using Pynq z1 and Jetson Xavier NX","authors":"Yassin Kortli, Souhir Gabsi, L. L. Y. Lew Yan Voon, M. Jridi","doi":"10.1109/SETIT54465.2022.9875823","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875823","url":null,"abstract":"In recent years, driver fatigue and drowsiness have been presented as the main factors of road accidents with a high rate of passenger deaths, injuries and property losses. In this paper, we developed a monitoring system for vehicle drivers that detects and warns of the presence of fatigue and drowsiness through computer vision or machine vision. Our developed system consists of four steps: training of the classifier to perform the detection module, image acquisition and processing, detection and alarm activation. Firstly, training of classifier was performed using Haar technique to locate face features. Secondly, a Jetson Xavier NX or Pynq Z1 development board was used to perform real-time video using a 4K camera, thirdly, we use the training classifier to detect the face image and facial landmark algorithm proposed by Kazemi & Sullivan to detect face features. Finally, our system analyses the state characteristics of the eyes; once the processing is completed, the detection of drowsiness and fatigue is carried out.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123034902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Left ventricular assist device: CFD Simulation of Flow HeartWare","authors":"Houneida Sakly, Mourad Said, M. Tagina","doi":"10.1109/SETIT54465.2022.9875700","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875700","url":null,"abstract":"The development of further treatment techniques in the prognosis of terminal heart failure has recently been influenced by innovative mechanical circulatory systems in the medical profession. The need for cardiac intervention may be determined by the patient's condition. Implantable left ventricular assist devices may be used to replace it in some circumstances left ventricular assist devices. Mechanical assistance of the failing left ventricle enables optimal hemodynamic stability and recovery of secondary organ failure for patients suffering from heart failure. These devices can help the expert until a suitable cardiac allograft becomes available, but they are also used as a last resort for individuals who are not transplant candidates. Furthermore, left ventricular assist devices implantation, requires a second heart procedure, which comes with its own set of dangers and perioperative difficulties during the waiting period. The surgical problem arises when a left ventricular assist devices is already installed after a heart transplant at home. Implementation of the HeartWare System When compared to pulsatile devices, tracking is thought to be more versatile and long-lasting. Our key contribution in this regard is to use of computational fluid dynamics modules to assess the velocity behavior as well as the flow heart rate while taking into account the physical features of blood flow.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123671561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Cimino, Manel Ennahedh, Federico A. Galatolo, N. Hariga-Tlatli, I. Nouiri, N. Perilli, J. Tarhouni
{"title":"A machine learning approach for groundwater modeling","authors":"M. Cimino, Manel Ennahedh, Federico A. Galatolo, N. Hariga-Tlatli, I. Nouiri, N. Perilli, J. Tarhouni","doi":"10.1109/SETIT54465.2022.9875601","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875601","url":null,"abstract":"This paper introduces a novel method and tools for groundwater modeling. The purpose is to perform numerical approximations of a groundwater system, for unlocking and paving water management problems and supporting decision-making processes. In the last decade, Data-driven Models (DdMs) have attracted increasing attention for their efficient development made possible by modern remote and ground sensing and learning technologies. With respect to conventional Process-driven Models (PdMs), based on mathematical modeling of core physical processes into a system of equations, a DdM requires less human effort and process-specific knowledge. The paper covers the design and simulation of a deep learning modeling tool based on Convolutional Neural Networks, integrated with the design and simulation of the workflow based on the Business Process Model and Notation (BPMN). Experimental results clearly show the potential of the novel approach for scientists and policy makers.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126075247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}