{"title":"Dynamic Circuit Model of SiC VJFET For Power Integrated Circuit Design","authors":"S. Ghedira, H. Morel, K. Besbes","doi":"10.1145/3234698.3234746","DOIUrl":"https://doi.org/10.1145/3234698.3234746","url":null,"abstract":"This paper presents a novel dynamic model of the vertical SiC JFET with a lateral channel for power-integrated-circuit design. The terminal capacitances of the normally-on SiC JFET device present a critical influence on switching waveforms and switching losses for dynamic models. This fundamental parameter is firstly taking into account in our suggested approach. The proposed capacitance model is based on a comparison between C-V measurements and numerical TCAD simulations and implemented in the VHDL-AMS hardware description language. The effectiveness of our approach is proved with experimental results under inductive-resistive switching conditions and under capacitance--voltage measurements.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126676399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GPU-based Face Recognition Acceleration Techniques: A Survey","authors":"Zeyneb Boubeguira, S. Ghanemi","doi":"10.1145/3234698.3234744","DOIUrl":"https://doi.org/10.1145/3234698.3234744","url":null,"abstract":"Face recognition is a recent active research field that regroups many disciplines: image-processing, security, face detection, computer vision...etc. Due to their complexity, face recognition applications require large computations and memory space. The emergence of modern GPU with high parallel computational capabilities had permitted overcoming this issue, and exploiting the inherent of these applications. Although, several ongoing research works have made some progress on making the recognition process faster and more accurate in real time application, nevertheless, there are still more to do. In this paper, we will present a survey on face recognition accelerating methods, precisely on Graphic Processing Units.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115715136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DC-DC power converters & charge pump circuits converters for battery operated system","authors":"Kaoutar Bendaud, S. Krit, L. Elmaimouni","doi":"10.1145/3234698.3234702","DOIUrl":"https://doi.org/10.1145/3234698.3234702","url":null,"abstract":"The consumer electronic industry has been undergoing severe pressures to adapt and to respond to new social and market demands, Nowadays, the demand of mobile and battery-powered consumer electronics is growing exponentially; The demand for gadgets with improved battery life is also growing at a very fast pace. The users requirements and expectations are significantly higher towards the consumer electronic industry and their range of different devices. The portable devices usually include a variety of loads such as LCD display, memories, mini microprocessor, Universal Series Bus (USB), and a hard disk drive. These loads require different operating voltages and load currents, and are powered by the rechargeable batteries such as Lithium-ion (Li-Ion) batteries, Nickel Metal Hydride (NiMH) batteries and Silver-Zinc batteries through DC-DC converters. In this context, the efficiency of DC-DC converters becomes an important issue in order to maintain long working times for batteries and smaller size in mobiles devices. This paper reviews DC-DC converters and charge pump circuits converters.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115733232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The applications of wavelet transform on signals and imagery","authors":"L. Inouri, A. Khireddine","doi":"10.1145/3234698.3234768","DOIUrl":"https://doi.org/10.1145/3234698.3234768","url":null,"abstract":"The treatment of the signal is an essential discipline nowadays. It has for object the development or the interpretation of signals carrying information. Often, the signals resulting from the physical phenomena are of nature non-stationary their classical temporal representations do not give a good perception of the multiple oscillating components, while the frequently representation (The transform of Fourier) does not allow of it the temporal localization of these components. To cure this problem, the wavelet transform at summer shouted. It makes it possible to carry out an analysis of the local structures of a signal with a zoom which depends on the scale considered. I.e. an analysis of which the frequently resolution (temporal representation) varies with the temporal localization (frequently representation).","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124579282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samia Chehbi-Gamoura, Ridha Derrouiche, M. Malhotra, H. Koruca
{"title":"Adaptive Management Approach for more Availability of Big Data Business Analytics","authors":"Samia Chehbi-Gamoura, Ridha Derrouiche, M. Malhotra, H. Koruca","doi":"10.1145/3234698.3234758","DOIUrl":"https://doi.org/10.1145/3234698.3234758","url":null,"abstract":"With the Big Data management, and the propagation of business lines into complex networks, activities are ever more subject to disasters than ever. It is nearly impossible to forecast their happening and degree of related costs. Accordingly, organizations try to collaborate in risk management. This paper outlines and discusses a generic approach based on Fuzzy Cognitive Maps (FCM) for cross-management of Disaster Recovery Plans (DRP). A set of basics of disaster planning is also provided. The proposed approach is focused on risk assessment methodology. The method is able to aggregate all assessment variables of the whole stakeholders involved in the business network. The main outcomes of this study aim to support networked enterprises in improving risk readiness capability and disaster recovery. Finally, we indicate the open challenges for further researches and an outlook on our future research.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126272747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of security regarding Z-Wave wireless protocol","authors":"M. B. Yassein, W. Mardini, Taha Almasri","doi":"10.1145/3234698.3234730","DOIUrl":"https://doi.org/10.1145/3234698.3234730","url":null,"abstract":"In the early adoptions of Z-Wave protocol for smart home automation, security issues were not taken into consideration. As this protocols got higher adoption rates, more security studies were performed to increase the security level of this protocol and solve many of the security bugs founds. The first issue, the protocols has no encryption and weak security procedures adopted to protect the commands during transmissions. There were significant improvements in order to make this protocol security levels reach AES 128-bit encryption, which is the same level of protection major banks use. In this paper, our researcher is focused on vulnerabilities, weakness and how the administrators can protect their home area networks (HANs) that uses Z-wave protocol with an additional security.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127922322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Efficient Wavelet-Based Adaptive Algorithm for Automatic Speech Quality Enhancement","authors":"M. Djendi","doi":"10.1145/3234698.3234752","DOIUrl":"https://doi.org/10.1145/3234698.3234752","url":null,"abstract":"In this paper, we address the problem of speech enhancement by adaptive filtering algorithm. A particular attention has been made for the backward blind source separation (BBSS) algorithm and its use in speech enhancement application. In this paper, we propose to implement the BBSS algorithm in the Wavelet-domain. The proposed backward wavelet BBSS (WBBSS) algorithm is then used in speech enhancement test. The new WBBSS shows better performances in terms of convergence speed and steady state in comparison with BBSS one. The obtained results have been evaluated in terms of segmental SNR and cepstral distance criteria and confirm the best performance of the proposed WBBSS algorithm.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131350730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Viewpoints Ontological Knowledge Representation: A Fuzzy Description Logics Based Approach","authors":"M. Hemam, M. Djezzar, Z. A. Seghir","doi":"10.1145/3234698.3234761","DOIUrl":"https://doi.org/10.1145/3234698.3234761","url":null,"abstract":"Description Logics (DLs) play a key role in the design of ontologies. An ontology is a formal description of important concepts in a particular domain. In practice, a set of a specific-domain applications use different representations of the same real world entity due to various viewpoints, context, and specific interest. In this paper, we are interested in the problem of representing an ontology in a heterogeneous domain by taking into consideration different viewpoints and different terminologies of various users, groups or even communities in the organisation. This type of ontology, called multi-viewpoints ontology, confers to the same universe of discourse, several partial descriptions, where each one is relative to a particular viewpoint. Moreover, these partial descriptions share at global level, fuzzy ontological elements allowing the representation of vague/imprecise knowledge between the various viewpoints. So, our goal is to propose a fuzzy multi-viewpoints ontology Web language, which is an extension of OWL-DL language, to allow the multi-viewpoints ontologies representation.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"478 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115875774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Two-Sensor Fast Adaptive Algorithm for Blind Speech Enhancement","authors":"Akila Sayoud, M. Djendi, A. Guessoum","doi":"10.1145/3234698.3234722","DOIUrl":"https://doi.org/10.1145/3234698.3234722","url":null,"abstract":"This paper presents the enhancement of speech signals in a noisy environment by using a Two-Sensor Fast Normalized Least Mean Square adaptive algorithm combined with the backward blind source separation structure. A comparative study with other competitive algorithms shows the superiority of the proposed algorithm in terms of various objective criteria such as the segmental signal to noise ratio (SegSNR), the cepstral distance (CD), the system mismatch (SM) and the segmental mean square error (SegMSE).","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124744060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Extensive Survey on Intrusion Detection- Past, Present, Future","authors":"Arun Nagaraja, T. Kumar","doi":"10.1145/3234698.3234743","DOIUrl":"https://doi.org/10.1145/3234698.3234743","url":null,"abstract":"Intrusion Detection is the most eminent fields in the network which can also be called as anomaly detection. Various methods used by early research tells that, the kind of measures used to detect the intrusion is not specified. Research has grown extensively in Anomaly intrusion detection by using different data mining techniques. Most researchers have not briefed on the kinds of distances measures used, the classification and feature selection techniques used in identifying intrusion detection. Intrusion detection is classified with problems as Outlier problems, Sparseness problem and Data Distribution. One of the important observations made is, High Dimensional Data Reduction is not performed, and conventional dataset is not used or maintained by any researchers. A survey is performed to identify the type of distance measures used and the type of datasets used in the early research. In this extended survey, the measures like Distance measure, pattern behaviors are used in identifying the Network Intrusion Detection. In this paper, we present the various methods used by authors to obtain feature selection methods. Also, the discussion is towards, Computation of High Dimensional Data, how to decide the Choice of Learning algorithm, Efficient Distance and similarity measures to identify the intrusion detection from different datasets.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"626 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115107334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}