Muteeah Aljawarneh, R. Hamdaoui, A. Zouinkhi, B. Boussaid, M. Abdelkrim
{"title":"Energy efficiency approaches in Wireless Sensor Networks","authors":"Muteeah Aljawarneh, R. Hamdaoui, A. Zouinkhi, B. Boussaid, M. Abdelkrim","doi":"10.1109/STA56120.2022.10019187","DOIUrl":"https://doi.org/10.1109/STA56120.2022.10019187","url":null,"abstract":"Wireless Sensor Networks (WSNs) send their data collaboratively across the network to the main base station responsible for analyzing and processing data. In WSNs, a battery with limited energy is used to drive the systems. Thus, energy consumption in WSNs is a serious problem that hinders their applications. The sensor will fail or be scrapped after consumption of the energy. This work gives an overview about the energy consumption problem in Wireless Sensor Networks (WSNs) and provides a survey on approaches used to optimize the sensors consumption on power. Different strategies used to rise the lifetime of the battery-based sensing nodes by energy minimization are analyzed and commented in this work.","PeriodicalId":430966,"journal":{"name":"2022 IEEE 21st international Ccnference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122227173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"System for coronavirus classification based on a new textural descriptor","authors":"Fathia Boubakri, Norhene Gargouri, Alima Damak Masmoudi","doi":"10.1109/STA56120.2022.10019167","DOIUrl":"https://doi.org/10.1109/STA56120.2022.10019167","url":null,"abstract":"The combination of Chest X-Ray imaging and Artificial Intelligence (AI) has proven its efficiency in coronavirus disease (COVID-19) detection [1]. The present paper proposes an efficient COVID-19 detection system based on a new textural features descriptor: Monogenic Local Binary Pattern Variance (MLBPV). An Artificial Neural Network (ANN) model is used for Regions Of Interest (ROIs) classification. Evaluating MLBPV, it outperforms other tested models by achieving an Area Under Curve $(A_{z})$ of 0.96263 and an accuracy of 99.9805%. Comparing our method with previous ones proves that ours provides the best performance. This model may be implemented in digital X-Ray machine for radiography and help radiologists.","PeriodicalId":430966,"journal":{"name":"2022 IEEE 21st international Ccnference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115227423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of the breast cancer cells by a smart camera connected to a cellular Microscopy","authors":"Naji Guedri, R. Gharbi","doi":"10.1109/STA56120.2022.10019095","DOIUrl":"https://doi.org/10.1109/STA56120.2022.10019095","url":null,"abstract":"Breast cancer (BC) is the second leading cause of cancer death in women, with a rate of 2.6%, after lung cancer the leading cause of death. It should be noted that these rates have decreased due to medical development in the treatment of BC, increase awareness, early examination and the disease is detected in the early stages. The later the diagnosis and the more advanced the disease, the more difficult it is to treat and the lower the chances of survival. There are currently many different approaches to BC screening. In this article, digital imaging was performed through the use of a smart camera (Scan) in contact with a microscope to diagnose and know if a person is sick or not. Also, know and assess the stage at which BC has advanced. The method mainly depends on the algorithm inside the Scan, through which the image containing the patient's blood test is analyzed. This method is considered safe and non-invasive it is characterized by high accuracy during direct examination. It allows the doctor to make an accurate diagnosis and effective treatment. Additionally, Scan processes the data and infers the results in real-time.","PeriodicalId":430966,"journal":{"name":"2022 IEEE 21st international Ccnference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124401745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Functional Interval-Observer-Based Fault Detection for Continuous-time Multivariable Linear Systems","authors":"Hanin Mizouri, R. Lamouchi, M. Amairi","doi":"10.1109/STA56120.2022.10019016","DOIUrl":"https://doi.org/10.1109/STA56120.2022.10019016","url":null,"abstract":"This paper deals with the problem of the functional interval observer design for continuous-time multivariable linear system applied to fault detection purpose. First, a set of existance conditions is deduced as well as a simple process to built the Luenberger-like interval observer. Then, by utilizing the interval estimation of residual signals a FD procedure is developed. Finally, the validity and the effectiveness of the suggested method is verified by a numerical example.","PeriodicalId":430966,"journal":{"name":"2022 IEEE 21st international Ccnference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126191308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things Security: Requirements, Attacks on SH-IoT Platform","authors":"Mona A. El. zuway, Hend M. Farkash","doi":"10.1109/STA56120.2022.10019124","DOIUrl":"https://doi.org/10.1109/STA56120.2022.10019124","url":null,"abstract":"Smart building security systems typically consist of sensors and controllers that monitor power operating systems, alarms, camera monitoring, access controls, and many other important information and security systems. These systems are managed and controlled through online platforms. A successful attack on one of these platforms may result in the failure of one or more critical intelligent systems in the building. In this paper, the security requirements in the application layer of any IoT system were discussed, in particular the role of IoT platforms in dealing with the security problems that smart buildings are exposed to and the extent of their strength to reduce the attacks they are exposed to, where an experimental platform was designed to test the presence of security vulnerabilities and This was done by using the Zed Attack Proxy (ZAP) tool, according to the OWASP standards and security level assessment, and the importance of this paper comes as a contribution to providing information about the most famous IoT platforms and stimulating work to explore security concerns in IoT-based platforms.","PeriodicalId":430966,"journal":{"name":"2022 IEEE 21st international Ccnference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116821472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Wound Rotor Induction Motors Operation under Unbalanced Supply","authors":"D. Kouchih, R. Hachelaf","doi":"10.1109/STA56120.2022.10019117","DOIUrl":"https://doi.org/10.1109/STA56120.2022.10019117","url":null,"abstract":"The intent of his work is to develop and validate a state model for the analysis of the electromagnetic effects of the stator interturn short-circuit faults in the three-phase induction machines. This model takes into account the increase of the neutral point voltage during faulty conditions by using the line to line voltages as inputs. It is adapted for both wound rotor and squirrel cage induction machines. Machine inductances are calculated analytically using the machine datasheet. Different phenomenons such as magnetic saturation, skin effect, and slotting effects can be considered by appropriate calculation of the machine inductances. Electromagnetic characteristics are extracted such as the line currents, short-circuited current, electromagnetic torque, decrease and ripples in mechanical speed. The theoretical study is validated basing on the experimental analysis of stator currents and flu density. For this purpose, two flux sensors, which are located in the stator periphery according to stationary axes α-ß, are used to measure flux density. This model is less complicated to be implemented for condition monitoring or to validate fault tolerant control algorithms. Simulation and experimental results show the consistency of this approach comparatively with other approaches such as finite elements or symmetrical components methods.","PeriodicalId":430966,"journal":{"name":"2022 IEEE 21st international Ccnference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121806077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity Recognition based on Palmprints: The Preliminary Results","authors":"Nadia Amrouni, Amir Benzaoui, Insaf Adjabi","doi":"10.1109/STA56120.2022.10018986","DOIUrl":"https://doi.org/10.1109/STA56120.2022.10018986","url":null,"abstract":"Private and automatic recognition in many applications, such as forensic, access control, and surveillance systems, has become necessary in recent years. Biometrics, which treats individuals' identification based on physical or behavioral characteristics, has emerged as an effective automated identification technology, offering more properties and advantages than conventional protection. The use of palmprints in biometric authentication has dramatically increased and has been used extensively in management systems for businesses, Internet of Thinks, and individuals. In this field, the palmprint is considered a new modality, a unique entity that is stable over time and has a rich information structure. As part of this work, the local binary pattern descriptor (LBP) was used and tested under several configurations to extract the palmprint modality's optimal and efficient characteristics. As preliminary results, our experiments on the IITD Palmprint V1 database exhibit impressive performance.","PeriodicalId":430966,"journal":{"name":"2022 IEEE 21st international Ccnference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125694171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing Canny Edge Detection Algorithm for Different Blurred and Noisy Images","authors":"Touka Hafsia, Asma Belhaj, H. Tlijani, K. Nouri","doi":"10.1109/STA56120.2022.10019120","DOIUrl":"https://doi.org/10.1109/STA56120.2022.10019120","url":null,"abstract":"In the field of image processing, edge detection of visual data is one of the most important operations of image processing research. This operation is very useful in many applications like object recognition, feature detection of image, motion analysis in computer vision field, etc. Canny detector is an algorithm of these operations of edge detection which constitutes more information about object to other edge detection algorithms. This work consists of a comparison study of image edge detection methods by focusing on the Canny algorithm to present the efficiency and perfection of this methods compared to other. Moreover an improved execution of this methods for blurred and noisy images.","PeriodicalId":430966,"journal":{"name":"2022 IEEE 21st international Ccnference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125605243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Bouaziz, A. Abdelkafi, Abdelkarim Masmoudi, L. Krichen
{"title":"Using an FCL for the Improvement of the DFIG_WT LVRT Capability","authors":"F. Bouaziz, A. Abdelkafi, Abdelkarim Masmoudi, L. Krichen","doi":"10.1109/STA56120.2022.10019218","DOIUrl":"https://doi.org/10.1109/STA56120.2022.10019218","url":null,"abstract":"Fault ride through (FRT) ability is a critical criterion for the amelioration of WT availability under various operating situations. In order to enhance the FRT capabilities of grid-connected WT, an adaptive fault current limiter (FCL) topology is proposed in this study. An ideal resistor associated to a four Diodes Bridge connected to the grid makes up the proposed FCL. The voltage sag level is used to calculate the value of the optimum resistor in the FCL. In order to create an adaptive voltage sag compensation mechanism based on the pre-fault active power, these latter are introduced into the fault path.","PeriodicalId":430966,"journal":{"name":"2022 IEEE 21st international Ccnference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128943775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhor Diffallah, H. Ykhlef, Hafida Bouarfa, Nardjesse Diffallah
{"title":"Consistency Regularization-Based Polyphonic Audio Event Detection with Minimal Supervision","authors":"Zhor Diffallah, H. Ykhlef, Hafida Bouarfa, Nardjesse Diffallah","doi":"10.1109/STA56120.2022.10019247","DOIUrl":"https://doi.org/10.1109/STA56120.2022.10019247","url":null,"abstract":"Audio event detection refers to the task of specifying the nature of events happening in an audio stream, as well as locating these occurrences in time. Due to its wide applicability in a myriad of domains, this task has been gradually attracting interest over time. The development of the audio event detection task is largely dominated by modern deep learning techniques. Deep network architectures need a substantial amount of labeled audio clips that contain the start and end time of each event. However, collecting and annotating exhaustive datasets of audio recordings with the necessary information is both a costly and a laborious endeavour. To mend this, weakly-labeled semi-supervised learning methods have been adopted in an attempt to mitigate the labeling issue. In this work, we investigate the impact of incorporating weak labels and unlabeled clips into the training chain of audio event detectors. We have conducted our experiments on the Domestic Environment Sound Event Detection corpus (DESED); a large-scale heterogeneous dataset composed of several types of recordings and annotations. we have focused our study on methods based on consistency regularization; specifically: Mean Teacher and Interpolation Consistency Training. Our experimental results reveal that; with the proper parameterization, incorporating weakly-labeled and unlabeled data is beneficial for detecting polyphonic sound events.","PeriodicalId":430966,"journal":{"name":"2022 IEEE 21st international Ccnference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132812152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}