Rabiaa Elkori, Meryem Baha, A. Hachim, K. Elhad, Amal Lamarti
{"title":"Comparison of the mechanical behavior of two thermo-plastic polymers by static tests (numerically and experimentally): High-Density Polyethylene (HDPE) and High Impact Polystyrene (HIPS)","authors":"Rabiaa Elkori, Meryem Baha, A. Hachim, K. Elhad, Amal Lamarti","doi":"10.1145/3454127.3456569","DOIUrl":"https://doi.org/10.1145/3454127.3456569","url":null,"abstract":"Tensile testing identifies the properties and mechanical characteristics of materials of different kinds (metals, polymers, etc.) [9]. Polymers are macromolecules bound together by large numbers of small molecule chains [3], polymers can be classified according to their origins, chemical structure, mode of synthesis or properties (Thermoplastics, elastomers, thermosets) [5]. The identification of polymer behavior depends on several factors, such as the type of load, temperature and morphology of the polymer. In this work we are interested in studying and characterizing two types of thermoplastic polymers, high-density polyethylene ‘HDPE’ and high-impact polystyrene ‘HIPS’ under experimental tensile testing and simulated tensile testing to understand the effect of nature and physical properties on the behavior of these polymers. The experimental and numerical results show that the two thermoplastics studied are ductile, the stress at break and the elastic limit of the HIPS are greater than those of the HDPE.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127219276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ECG signal diagnosis using Discrete Wavelet Transform and K-Nearest Neighbor classifier.","authors":"Youssef Toulni, T. B. Drissi, B. Nsiri","doi":"10.1145/3454127.3457628","DOIUrl":"https://doi.org/10.1145/3454127.3457628","url":null,"abstract":"Early detection of heart problems can save the lives of many people around the world; the electrical activity of the heart represented by electrocardiograms (ECGs) gives us important information about the health of the heart and it useful tool to detect certain cardiovascular diseases. Efficient analysis of ECG signals to extract features can be a good tool to diagnosis of these diseases; this features help us to identify the ECG signal and make the good decision in the diagnosis. The purpose of this work is to process the ECG signals using the wavelet analysis; this tool allows in the same time to denoising the signal and better locate any abnormalities that this signal presents. The features used for the characterization of the signal are obtained by extracting the statistical features from wavelet coefficients. The distinction between the signals is made by a classification of the signals, among the different existing classification methods we have adopted in this study the K Nearest Neighbors KNN method .The use of the discrete wavelet transform DWT with the Symlet 8 as a mother wavelet and the K Nearest Neighbors classifier allowed us to establish a model which is used to identify these ECG signals with an accuracy which reaches 91.60%.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126955272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. M. Kossingou, Edgard Ndassimba, Nadege Gladys Ndassimba, S. Ouya
{"title":"Contribution of the Internet of Things to agricultural education and breeding in rural areas of African countries in conflict: case of the Central African Republic","authors":"G. M. Kossingou, Edgard Ndassimba, Nadege Gladys Ndassimba, S. Ouya","doi":"10.1145/3454127.3456586","DOIUrl":"https://doi.org/10.1145/3454127.3456586","url":null,"abstract":"In this article, we propose a distance learning platform, coupled with traditional pedagogical programs to students and teacher-researchers of the University of Bangui, in particular the Higher Institute of Rural Development (ISDR) of M'Baiki. This platform guarantees data security thanks to WireGuard, which uses proven encryption protocols and algorithms to protect data. Access to resources is efficient thanks to the coupling of the WireGuard VPN server and the Guacamole server. The Moodle LMS platform allows remote access to course materials. BigBlueButton allows the realization of virtual classes. The realization of a part of the distance education programs requires that the actors are in the same local network. In our case, the actors are in different subnetworks which have different public and private addresses. In the logic, the actors who are geographically distant in different subnetworks do not have to communicate and carry out practical and other work. To overcome this limitation, we have configured the tunnel of the WireGuard VPN server coupled to the VXLAN. In some cases of practical work, we will have to be at layer 2 of the OSI model or the WireGuard VPN server uses layer 3 of the OSI model. To move the WireGuard VPN server tunnel from Layer 3 to Layer 2 of the OSI model, we used the coupling of the WireGuard VPN server with VXLAN technology. The features of this platform allow students and teachers to follow courses, tutorials and practical work at a distance applied to the Internet of Things technology. The inclusion of this distance learning platform in the ISRD's pedagogical program makes it possible to have part of the teaching program both face-to-face and at a distance. It also makes it possible to keep all the traditional teaching modalities.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124143854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A literature survey on anti-phishing in websites","authors":"Rania Zaimi, Mohamed Hafidi, Mahnane Lamia","doi":"10.1145/3454127.3456580","DOIUrl":"https://doi.org/10.1145/3454127.3456580","url":null,"abstract":"Abstract. Phishing and fraud sites have been widespread on the internet in recent times, which's become a source of great concern and a serious cybersecurity problem, as internet fraudsters target sensitive data and personal information of users, especially the username and password. Numerous approaches have been proposed and used to prevent and reduce these phishing websites and attacks, and protect users and their privacy. In this paper, we categorized the present anti-phishing approaches into two main classes: Content-based and Non-content-based. The content-based approach is also classified into URL content analysis and webpage content analysis. This helps in finding out numerous anti-phishing techniques and algorithms to choose the best approach in future contributions.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126163928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT and AI based intelligent system to fight against COVID-19","authors":"Asmae Bouchareb, Abdelhak Boulaalam, I. Bellamine","doi":"10.1145/3454127.3457618","DOIUrl":"https://doi.org/10.1145/3454127.3457618","url":null,"abstract":"In this global health crisis, several efforts have been launched to monitor and control the spread of the COVID-19 pandemic. Those efforts require the support of new technologies like the Internet of Things, Artificial Intelligence, Image and Video Processing, Big Data, and Machine Learning to tackle various problems related to this viral pandemic. In these circumstances, public places such as hospitals, public transportation, and supermarkets need a more scientific and practical system/guidance to identify the probable COVID-19 cases. In this paper, we design an Internet of Things-Artificial Intelligence IoT-AI based intelligent system to monitor the suspect cases in public places. Based on implicit/Explicit data acquisition flow, the system provides information to public authorities. In a public place, the actions of suspicious people are collected by sensors such as thermal cameras, connected cameras, and Smartphone embedded sensors. Subsequently, this data is sent to the system for analysis. Thanks to artificial intelligence technology, the system can extract useful information to determine suspicious COVID-19 cases. In this article, we will describe the proposed global system. The design of this type of system is a trend for the future wider application to deal with COVID-19.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124593767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposal for an alert and monitoring solution based on the SIP and IoT protocol: the case of agriculture","authors":"L. Ndiaye, Kéba Gueye, S. Ouya","doi":"10.1145/3454127.3457617","DOIUrl":"https://doi.org/10.1145/3454127.3457617","url":null,"abstract":"The increase in the world's population is forcing a shift towards smart agricultural practices. This, together with dwindling natural resources, limited availability of arable land and increasing unpredictable weather conditions, makes food security a major concern for most countries. As a result, the use of Internet of Things (IoT), ToIP and data analytics (DA) are helping to improve operational efficiency and productivity in the agricultural sector. There is a paradigm shift from the use of Wireless Sensor Network (WSN) as a major driver of smart agriculture to the use of IoT and DA. In this article, we are going to couple the robustness of connected objects with IP telephony (the SIP protocol) to set up a system allowing an agronomist to consult but also to be informed about the state of the soil of his plants in moisture matter. He does not have to be present in the field but simply have his phone to check the condition of the soil in the plants. He will dial a number and the system will communicate the water level in the ground to him and he can make decisions. In case he does not consult for a certain time and the ground level reaches a defined value, the system sends him an alert by automatic call and a channel will communicate to him the state of the garden soil, he can in turn call his sensible gardener will water to restore the condition of the soil to normal.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127533195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on Embedded Systems and the Internet of Things: Comparative Study","authors":"A. Cherkaoui, S. Merzouk, A. Marzak, M. Hain","doi":"10.1145/3454127.3457636","DOIUrl":"https://doi.org/10.1145/3454127.3457636","url":null,"abstract":"Nowadays, thanks to the explosion of the Internet of Things or IoT, any object for public or industrial use can be connected to the Internet and become connected. Which requires companies to follow this explosion and to make improvements on their products to meet the evolving needs of human society. Going back before the explosion of the IoT, the business life was based on the embedded system concept. The latter is the combination of software and hardware, with fixed or programmable capabilities and it is specifically designed for a type of a particular application. This article presents a definition and a comparative study of a set of microcontrollers, boards, and operating systems the most used in IoT projects. Additionally, this comparative study helps us focus on the transition from embedded to IoT, by discussing the evolution of embedded systems.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130209827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on SDN based energy-efficiency approaches in IoT: Systematic survey on energy conservation methods in IoT","authors":"Taki Eddine Chaib Ainou, Soheyb Ayad, L. Terrissa","doi":"10.1145/3454127.3456577","DOIUrl":"https://doi.org/10.1145/3454127.3456577","url":null,"abstract":"The Internet of Things, enabled by the rapid spread of telecommunication technologies, has become an integral part of our lives. However, it still faces some challenges that hinder its wide deployment. the number of connected things is counting in billions which theoretically generates massive data that leads to important energy consumption and expands the CO2 emission in Cloud infrastructures and backbone networks, also reduce the life-time of things at the Edge level. Software-Defined Networking is a new paradigm based on the centralization of large-scale network infrastructure control, which offers the flexibility of software and hardware device management. In this survey paper, we highlight the main energy-efficiency existing approaches and their limits in SDN architectures for IoT infrastructures.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132459271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DNN2FPGA: Generic Design Flow to Implement DNNs on FPGAs","authors":"El Hadrami Cheikh Tourad, M. Eleuldj","doi":"10.1145/3454127.3456597","DOIUrl":"https://doi.org/10.1145/3454127.3456597","url":null,"abstract":"Deep Neural Networks (DNNs) have recently indicated a considerable advantage in many deep learning tasks such as image classification and speech recognition. However, the achievement of high-performance DNNs has accompanied an expansion in computing and memory requirements. Due to these features, the Field-Programmable Gate Arrays (FPGA) devices are ideal for deploying DNNs, and they have the required flexibility, power efficiency, and computing performance. The implementation of DNN on FPGA is usually done using a high-level language such as python, followed by a manual transformation to Hardware Description Language (HDL), and finally, the synthesis using a vendor tool. This transformation is time-consuming and requires HDL expertise, which limits the relevance of FPGAs. The paper reviews some related works, shows the proposed design flow, then the hardware implementation, and shows two case study results: A Multi-Layer Perceptron (MLP) used to solve the classical XOR problem DNN for MNIST dataset classification. Finally, we present the conclusion and future works. This paper presents a new generic design flow of implementing DNN models automatically from the high-level language to FPGA devices, which takes the model in graph presentation as input and automatically generates the FPGA’s hardware implementations.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128858146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Already 6G? Why?","authors":"Oumaima El Rhazal, T. Mazri","doi":"10.1145/3454127.3456619","DOIUrl":"https://doi.org/10.1145/3454127.3456619","url":null,"abstract":"Recently, 5th generation of mobile networks started its commercialization after about 10 years of researches, which gave the world a new technology dimensions and turn a lot of 2010 dreams and goals into reality. The step where the world arrived today gives so much ambition to think about more technology ideas and goals for the next decade. The expectations for the world of 2030 have already started, more precisely we are talking about the 6th generation of wireless communications. The need for a 6G comes from the world's expectations and device growth after 10 years from now, such need creates various challenges and questions in research fields to step toward next decade with steady pace. In this article we will answer interrogations about the 6G obligatory, how it will look like and challenges to reach such huge innovation in mobile network. Also, we will discuss important axes to deal with such challenges.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"489 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123158220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}