{"title":"Learning for Time Series Differential Phase-Shift Keying-based Non-coherent Receivers","authors":"Omnia Mahmoud, A. El-Mahdy","doi":"10.1109/SETIT54465.2022.9875876","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875876","url":null,"abstract":"In this paper, using the recurrent neural network (RNN) for non-coherent differential phase-shift keying (DPSK) signal detection is proposed. While deep-learning has been utilized for estimating the channel and detecting the signal in various communication systems models, making use of the time series encoding of DPSK modulation along with the time series feature of the recurrent neural networks for Rayleigh fading communication channel has not been studied before. The use of both of deep neural network (DNN) and recurrent neural network to detect the differential encoded time series signal is considered and compared. Both of the DNN-based and RNN-based detectors are compared to conventional non-coherent DPSK detection, coherent phase-shift keying (PSK) detection, and the analytical error rate of coherent and non-coherent detection. Extensive simulation results exhibit that the proposed RNN-based signal detector outperforms both of conventional non-coherent differential detection, and the DNN-based detector in terms of symbol error rate performance. In addition, it does not need any statistical information about the channel or require complex online calculations.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127550782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QOE-based intelligent intrusion detection Use case: University video surveillance","authors":"T. Abar, A. Letaifa, S. El Asmi","doi":"10.1109/SETIT54465.2022.9875657","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875657","url":null,"abstract":"A smart university is supposed to be a safe university. At this moment we observe multiple cameras in different locations in the Hall University and rooms to detect suspicious behavior such as violation, larceny or persons in a state of alcohol or drug intoxication. Samples of the video footage is monitored 24/7 by operators in control rooms. Currently the recorded videos are visual assessed after a suspicious event has occurred. There is a requirement for real-time surveillance with smart cameras which can detect, track and analyze suspicious behavior over place and time. The expanding number of cameras requires an enormous measure of observing operators. This paper proposes a distributed intelligent surveillance system based on smart cameras. We seek to improve the Quality of Experience QoE operator side or QoE-video surveillance expressed in function of i- resource availability constraints, ii- false detection of suspicious behavior, iii- define an optimal perimeter for intrusion detection (subset of cameras, network parameters required …).","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123741769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal voltage control in interconnected power distribution systems by a self-adaptive fuzzy logic controller","authors":"Haitam Alilouch, F. Slaoui-Hasnaoui, S. Georges","doi":"10.1109/SETIT54465.2022.9875790","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875790","url":null,"abstract":"The high penetration of distributed generation (DG) is changing the energy flows in the grid, as well as the energy losses and voltage profile of the system. To solve these problems, the impact of the connection of Renewable Energy Generators (REGs) on the grid is being studied. This work is intended to present the voltage variation of each node of the distribution grid before and after the insertion of a wind turbine or solar panel and the combination of both. The proposed method is self-adaptive regulation by combining settings in P/Q or P/V mode with a setpoint decision making block (setpoint adaptation block) based on fuzzy logic in order to maintain a stable and optimal voltage profile.The simulation results obtained using Matlab®/Simulink® clearly show the efficiency of the controllers used and their optimal control capacity.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"1976 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130283026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast wsn localization method based on three Anchors and simple geometric technique: Mathematical modeling","authors":"M. Zaidi, Imen Bouazzi, V. P. T. Ijyas","doi":"10.1109/SETIT54465.2022.9875903","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875903","url":null,"abstract":"A significant issue in achieving position calculation is to reduce and simplify the instructions that the Unknown Sensor Node (USN) has to accomplish in the location determination algorithm. That’s why most of the research works in the field of mobile node localization is mainly based on geometric techniques. Therefore we present in this paper a new geometrical approach of unknown nodes localization. A mathematical development of the new approach will be detailed. The validation of this technique is made based on simulations of ten different scenarios showing the different locations of the three anchors and the unknown node. The high precision and the fast convergence of the proposed approach will be provided in the result section. According to results, proposed method has at least three major advantages which are the less number of anchors used to determine the USN location, the rapid convergence of its algorithm and the higher localization accuracy.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124481923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahdi Hermassi, Saber Krim, Y. Krim, Mohamed Ali Hajjaji, A. Mtibaa, M. Mimouni
{"title":"Hardware FPGA implementation of an intelligent vector control technique of three-phase rectifier for wind turbine connected to the grid","authors":"Mahdi Hermassi, Saber Krim, Y. Krim, Mohamed Ali Hajjaji, A. Mtibaa, M. Mimouni","doi":"10.1109/SETIT54465.2022.9875830","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875830","url":null,"abstract":"In this work, a comprehensive study of various wind energy conversion system control methodologies is proposed more precisely a comparative study of an intelligent vector control technique of a three-phase rectifier for a wind turbine linked to the grid. Its goal is to ensure a stable control technique that performs well in the face of external perturbations. The system under consideration consists of two converters connected by the DC bus, a permanent magnet synchronous generator, and a wind turbine. A resistor–inductor filter connects the system to the grid. In our system, we use a vector control strategy which is generally based on a proportional–integral controller. However, because of the control sensitivity to external disturbances and parameter modifications, a control method based on a Fuzzy Logic-Control (FLC) mode has been developed. Such a technique provides high performances, like the insensitivity to system non-linearity. Indeed, this study emphasizes the significance of implementing the proposed FLC utilizing the Field-Programmable Gate Array (FPGA). Because of obvious parallelism provided by the FPGA, the fundamental advantage of the FPGA implementation is the growth of the control loop latency. This suggested control algorithm’s performance is investigated utilizing digital simulation through the use of a Xilinx System Generator (XSG) tool, in addition to the implementation with a Zynq-FPGA. In reality, the XSG tool is used to design the hardware structures of the rectifier vector control. The collected results demonstrate that FLC simulation provides superior tracking and precision.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117037005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Gafsi, Rim Amdouni, Nessrine Abbassi, Mohamed Ali Hajjaji, A. Mtibaa
{"title":"Implementation of a symmetric chaos-based cryptosystem for image security in real time","authors":"M. Gafsi, Rim Amdouni, Nessrine Abbassi, Mohamed Ali Hajjaji, A. Mtibaa","doi":"10.1109/SETIT54465.2022.9875573","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875573","url":null,"abstract":"This paper puts forward a real-time architecture of a chaos-based encryption system dedicated to perform image encryption and decryption. An evolutionary Pseudo Random Number Generator (PRNG) was designed and implemented to generate sensitive pseudo-random numbers based on the Lorenz chaotic system. We propose a new image security approach based on XORing image pixels with the generated key sequence. To increase complexity R’ cycles of encryption could be done. The proposed design was implemented, and validated using a platform Xilinx Zynq FPGA. In addition, the applied synthesis shows that the hardware design provides high frequency and throughput performance.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122485777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Models and Solvers for Coverage Optimisation in Cellular Networks: Review and Analysis","authors":"Z. Dahi, José Á. Morell","doi":"10.1109/SETIT54465.2022.9875463","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875463","url":null,"abstract":"Cellular phone networks are one of the most widely-used means of communication whose design is a quality-determining task. During the former step many engineering problems must be solved and where coverage optimisation is one of the most critical ones. The latter was proven to be NP-hard which has led to proposing several scattered and non-unified mathematical models to solve it. This models’ heterogeneity hinders comparing or linking works to accelerate advances in this field and it also hardens choosing the adequate model for a given case study. In order to cope with these issues, this work presents a systematic survey on coverage optimisation models. It analyses 80 works done from 1995 to 2021. The comparison considers 6 comparison metrics and 3 classes of coverage models. Our work’s contributions aim at (I) coping with the lack of models’ standardisation, (II) providing practitioners with a repository of coverage models, (III) sketching guidelines of a unified model, and (IV) opening future research perspectives in this axis.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122975207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accurate diagnosis of non-Hodgkin lymphoma on whole-slide images using deep learning","authors":"Hathem Khelil, Abd El Moumene Zerari, L. Djerou","doi":"10.1109/SETIT54465.2022.9875482","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875482","url":null,"abstract":"Digital Pathology is the technique of digitizing histology slides to create high-resolution images. One of the important applications for digital pathology is tissue level classification, such as the identification of the three most common kinds of non-Hodgkin lymphomas; Mantle Cell Lymphoma, Follicular Lymphoma and Chronic Lymphocytic Leukemia, which pose a significant problem for pathologists due to their inherent complexity. In this research, deep learning ideas are combined with an improvement of the CNN algorithm to propose a Non-Hodgkin Lymphoma model which is able, effectively, to categorize these subtypes of non-Hodgkin lymphomas. The proposed model was trained using NIA-curated dataset images and achieved a classification accuracy of 98.7%, about 0.6% better than current classification strategies for non-Hodgkin’s lymphomas based on deep learning.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115798320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying Algebraic Virtual Machine to Cybersecurity Tasks","authors":"O. Letychevskyi, V. Peschanenko","doi":"10.1109/SETIT54465.2022.9875895","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875895","url":null,"abstract":"The paper presents the formal methods for application within the cybersecurity domain in the scope of the program system AVM (Algebraic Virtual Machine). It was developed on the basis of behavior algebra and the theory of interaction of agents and environments. AVM allows the use of different methods for verification of system properties, detection of the behavior given as algebraic patterns, and the definition of equivalency of the formal systems. Two case studies are considered as the application of the algebraic approach for resolving the problem of vulnerability detection and checking resistance to cyber-attacks. It can be efficiently used in model-driven development of safety-critical systems correspondingly to requirements in standards to apply formal methods for verification and testing.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124153991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Partial & Full MIMO for Orbital Angular Momentum Mode Group Division Multiplexing via Optical Fibers","authors":"Alaaeddine Rjeb, H. Fathallah, M. Machhout","doi":"10.1109/SETIT54465.2022.9875938","DOIUrl":"https://doi.org/10.1109/SETIT54465.2022.9875938","url":null,"abstract":"The use of Orbital Angular Momentum (OAM) of light as a further degree of freedom to encode information has shown great potential in enhancing the capacity transmission and in unleashing the spectral efficiency of optical fibers. Some implications of the use of OAM in mode division multiplexing (MDM) system could degrade the scalability of the system include the complexities and the heaviness of multiple input multiple output MIMO DSP. In this paper, we discuss the MDM system incorporating OAM modes as data carriers. We focus on the employing of MIMO DSP at the receiver side of an OAM-MDM system. Our analysis shows that a small-scale MIMO DSP (i.e. partial blocks) could reduce the computational complexities and minimize the overall system complexity using either time-domain equalization (TDE) or frequency-domain equalization (FDE) approaches.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131532099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}