13 research outputs found

    A Study for Remote Monitoring of Water Points in Mauritania Based on IoT (LoRa) Technology

    Get PDF
    Wetlands in Mauritania contain the most important water sources necessary for the survival of rural communities in the country. In these areas, the main rural activities such as animal husbandry, agriculture, and fishing take place. Lack of water or flooding must be monitored to plan solutions in advance. After a comparative study of IoT wireless technologies, we proposed that LoRa technology is the most suitable for our field of application. However, in certain areas where access to the cellular network is difficult, we propose the addition of satellite communication in the LoRamonitoring system to achieve information collected at any point in the world via the cloud and the Internet. We carried out a practical case for the areas covered by the UMTS (3G) cellular network using devices integrating LoRaWAN to evaluate the performance of this technology. The results show the success of the communication over a distance of 14 km

    Importance of Machine Learning Techniques to Improve the Open Source Intrusion Detection Systems

    Get PDF
    Nowadays, it became difficult to ensure data security because of the rapid development of information technology according to the Vs of Big Data. To secure a network against malicious activities and to ensure data protection, an intrusion detection system played a very important role. The main objective was to obtain a high-performance solution capable of detecting different types of attacks around the system. The main aim of this paper is to study the lacks of traditional and open source Intrusion Detection Systems and the Machine Learning techniques commonly used to overcome these lacks. A comparison of some existing works by Intrusion Detection System type, detection method, algorithm and accuracy was provided

    Blockchain logging for process mining: a systematic review

    Get PDF
    Considerable progress was forcasted for collaborative business processes with the rise of blockchain programmable platforms. One of the saliant promises was auditable traces of business process execution, but practically that has posed challenges specially with regard to blockchain logs’ structure who turned out to be inadequate for process mining techniques. Approaches to answer this issue have started to emerge in the literature, some focusing on the creation process of event logs and others dealing with their retrieval from the blockchain. This work outlines the generic steps required to solve these challenges and analyzes findings in these approaches with a consideration for efficiency and future research directions

    Extracting Artifact-Centric Event Logs From Blockchain Applications

    No full text
    International audienc

    Inference of a clear channel assessment based conflict graph

    No full text
    International audienceWe consider an IEEE 802.11 network composed of several Access Points (APs) managed by one controller. The controller relies on pieces of information describing the network state as channels, load, associated stations, conflicts, etc. to configure and optimize the network. In this paper, we propose a method that infers the way the different channels are shared between APs according to the Clear Channel Assessment (CCA) mechanism. It is represented through a conflict graph where an edge exists if two APs are able to detect each other. As this detection is sometimes partial, the links are weighted. Our method relies on measures already available on most of Wi‐Fi products and does not generate any traffic except the transmission of these measures to the controller. A Markov network and an optimization problem are then proposed to infer the weights of the conflict graph. Our solution is shown accurate on a large set of simulations performed with the network simulator ns‐3
    corecore