10 research outputs found

    Visual Object Tracking Approach Based on Wavelet Transforms

    Get PDF
    In this Thesis, a new visual object tracking (VOT) approach is proposed to overcome the main challenging problem encountered within the existing approaches known as the significant appearance changes which is due mainly to the heavy occlusion and illumination variations. Indeed, the proposed approach is based on combining the deep convolutional neural networks (CNN), the histograms of oriented gradients (HOG) features, and the discrete wavelet packet transform to ensure the implementation of three ideas. Firstly, solving the problem of illumination variation by incorporating the coefficients of the image discrete wavelet packet transform instead of the image template to handle the case of images with high saturation in the input of the used CNN, whereas the inverse discrete wavelet packet transform is used at the output for extracting the CNN features. Secondly, by combining four learned correlation filters with convolutional features, the target location is deduced using multichannel correlation maps at the CNNs output. On the other side, the maximum value of the resulting maps from correlation filters with convolutional features produced by HOG feature of the image template previously obtained are calculated and which are used as an updating parameter of the correlation filters extracted from CNN and from HOG where the major aim is to ensure long-term memory of target appearance so that the target item may be recovered if tracking fails. Thirdly, to increase the performance of HOG, the coefficients of the discrete packet wavelet transform are employed instead of the image template. Finally, for the validation and the evaluation of the proposed tracking approach performance based on specific performance metrics in comparison to the state-of-the-art counterparts, extensive simulation experiments on benchmark datasets have been conducted out, such as OTB50, OTB100 , TC128 ,and UAV20. The obtained results clearly prove the validity of the proposed approach in solving the encountered problems of visual object tracking in almost the experiment cases presented in this thesis compared to other existing tracking approaches

    Smart Monitoring for Semantic Wireless (SCADA/DCS) Systems with Semantic SNMP Protocol.

    No full text
    International audiencen this paper we propose a new implementation of SNMP protocol through (WS) and SOAP protocol, for wireless semantic (SCADA/DCS) systems and (IT-SCADA) platform monitoring. (WS) and SOAP may run on top of secure transport services implemented through protocols like HTTPS combined with industrial protocols as (DNP3, SOAP, ISM BAND, and ZIGBEE).We chose ZIGBBE wireless protocol for implementing our semantic security (IT-SCADA) management platform with semantic SNMP protocol via WS. To detect and infiltrate wireless radio network and semantic attacks, the use of (WS) gateways is needed to include SNMP devices into (WS) based management architecture. The evaluation shows that (WS) gateways created with SNMP and SOAP resolve a lot of new semantic attacks and vulnerabilities. We integrate security mechanism in the header of (SNMP/SOAP/ZIGBEE) frame; we obtained new semantic security intelligent monitoring protocol named (SNMP/SOAP/ZIGBEE/SECURITY). We work for implementing our solution in SONELGAZ group Algeria, SCADA and DCS system

    Cyber Security for Wireless Semantic (SCADA/DCS) Systems

    No full text
    International audienceSupervisory Control and Data Acquisition and Distributed Control Systems named (SCADA/DCS) have played a key role in the design of modern power smart applications, particularly in the automatic management of real time energetic platforms. In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in semantic wireless (SCADA/DCS) systems, focusing on the semantic attacks. In this work, we present a new security semantic wireless protocol as a secure communication support for these modern semantic wireless systems named (ZIGBEE/SOAP/SECURITY), obtained by the combination between wireless ZIGBEE protocol, SOAP protocol and the integration of our security mechanism, in the global message header obtained by the fusion between ZIGBEE message and SOAP message

    SECURE SOLUTION FOR MODERN SEMANTIC SCADA

    No full text
    International audienceNOUS TRAVAILLONS SUR LA SECURITE DES SYSTEMES SCADA (SUPERVI-SORY CONTROL AND DATA AQUISITION) MODERNE EXPLOITANT DES EQUI-PEMENTS MODRNE AVEC DE L’INTELLIGENCE EMBARQUE COMME LES RTU (REMOTE TERMINAL UNIT), LES CAPTEURSINTELLIGENTS, LES ACTIONNEURS INTELLIGENTS, LES EQUIPEMENTS DE L’INSTRUMENTATION GAZIERE MODERNE COMME LES COMPTEURS NUME-RIQUE, LES CORECTEURS ELECTONIQUE, LES POMPES DOSEUSES AVEC CARTE ELECTRONIQUE, LES CHROMATOGRAPHES...ECT. AVEC LES AVANCES TECHNLOGIQUES DE L’INFORMATIQUE EMBARQUE COMME LES SERVICES WEB ET LES APPLICATION CONCU SELON LES ARCHITECTURES MODERNE (SOA- SERVICE ORIENTED ARCHITECTURE), LES ONTOLOGIES ET LE WEB SEMANTIQUE, LES BASES DE DONNES XML ET LES SYSTEMES D’EXPLOI-TATIONS UNIX EMBAQUES, BOUCOUP DE FAILLES ET VULNERABILITES S’AJOUTE AU ATTAQUES CLASSIQUES CONNU DANS LE MONDE DES SYSTE-MES INFORMATQUES ET DES RESEAUX. NOUS PROPOSONS UNE SOLUTION GLOBALE DE LA SECURITE DES SCADA MODERNE ET SEMENTIQUE PAR L’UTILISATION DE BLOC COMPOSE PAR DES FIREWALL ET DES (IDS-INTRU-SION DETECTION SYSTEM) SEMANTIQUE DOTE D’ONTOLOGIE DE SECURITE IMPLEMENTE AVEC LE STANDARD (OWL-S) ET L’EDITEUR PROTEGE4. NOUS UTILISONS UNE PILE DE PROTOCOLES DE SECURITE, COMME (SSL/TLS), WS-SECURITY, IPSEC ET LES RESEAUX VIRTUEL (SSL/VPN). NOUS OPTI-MISONS TOUTES LES OPERATIONS DE CRYPTOGRAPHIE ET DE SIGNATURE AVEC UNE SOLUTION BASE SUR LES COURBES ELLEPTIQUES (ECC-ELLEP-TIC CURVE CRYPTOGRAPHY). NOUS AVONS PROPOSE UNE SOLUTION AUX ATTAQUES DE TYPE SEMANTIQUE MODERNE ISSUE DE L’EMBARQUEMENT DES TECHNOLOGIES WEB ET DES NOUVELLES PLATEFORME DES SCADA DE TYPE (ITSCADA) INTERCONNECTE, OU LES DEUX SYSTEMES INFORMATIQUE ET SCADA SON INTERCONNECTE, QUE NOUS SEPARONS VIRTUELLEMENT PAR NOTRE SOLUTION (SSL/VPN) OPTIMISE AVEC LES COURBES ELLEP-TIQUES. NOUS PROPOSONS AUSSI UNE NOUVELLE IMPLEMENTATION DES DEUX PROTOCOLES LES PLUS UTILISE POUR LES SCADA A SAVOIR DNP3 ET MODBUS PAR L’EMBARQUEMENT DES TRAMES DE DONNES (MODBUS/TCP) ET (DNP/TCP) DANS LA PARTIE (BODY) DU MESSAGE SOAP DU PROTOCOLSOAP ET IMPLEMONTONS LE CRYPTAGE ET LA SIGNATURE DE L’ENTETE DU MESSAGE (DNP/SOAP) OU (MODBUS/SOAP) OBTENU PAR NOTRE SOLU-TION DE CRYPTAGE EC

    Security Wireless Solution for Semantic Smart SCADA/DCS

    No full text
    Journal spécialisé das industrie du gazInternational audienceWe present the ability to detect and infiltrate semantic attacks a wireless radio network used in semantic (SCADA/DCS) systems, these attacks deny operators and automated systems the ability to safely and reliably monitor and control semantic sensors, semantic actuators, relays, and breakers. We presented in this work new security semantic wireless protocols as a secure communication support for these modern semantic wireless systems and a global security solution for interconnected (IT-SCADA) platforms

    Low Complexity Image Compression using Pruned 8-point DCT Approximation in Wireless Visual Sensor Networks

    No full text
    International audienceSince the transmission of the uncompressed image in the context of wireless visual sensor networks (WVSNs) consumes less energy than transmitting the compressed image, developing energy-aware compression algorithms are mandatory to extend the camera node's lifetime and thereby the whole network lifetime. The present paper studies a low-complexity image compression algorithm in the context of WVSNs. This algorithm consists of applying a pruning approach on a DCT approximation transform. The scheme is investigated in terms of computation cycles, processing time, energy consumption and image quality. Experimental works are conducted using the Atmel Atmega128 processor of Mica2 and MicaZ sensor boards. Simulation results show that the studied scheme can exhibit a competitive performance when compared against other algorithms. Furthermore, the scheme can achieve the best tradeoff between energy consumption and image quality

    Multi-Scale Feature Extraction for Vehicle Detection Using Phis-Lbp

    No full text
    International audienceMulti-resolutionobjectdetectionfacesseveraldrawbacksincludingitshighdimensionalityproducedby a richer image representation in different channels or scales. In this paper, we propose a robust and lightweight multi-resolution method for vehicle detection using local binary patterns (LBP) as channel feature. Algorithm acceleration is done using LBP histograms instead of multi-scale feature maps and by extrapolating nearby scales to avoid computing each scale. We produce a feature descriptor capable of reaching a similar precision to other computationally more complex algorithms but reducing its size from 10 to 800 times. Finally, experiments show that our method can obtain accurate and considerably faster performance than state-of-the-art methods on vehicles datasets
    corecore