{"title":"A Data Preservation Method Based on Blockchain for Digital Sensitive Text Integrity","authors":"Zineb Touati-Hamad, Mohamed Ridda Laouar, Issam Bendib","doi":"10.1109/ICISAT54145.2021.9678467","DOIUrl":"https://doi.org/10.1109/ICISAT54145.2021.9678467","url":null,"abstract":"Since the popularity of digital data sharing has grown, data authentication and integrity have received increased attention, and data preservation technology has evolved to suit the demands of the times. However, the current models and techniques for data preservation are simply a mixture of encryption technology. The process of applying these techniques in data authentication requires the participation of the human factor as a third party, which may lead to the risk of data tampering, attacks, and cracks. Recently, Blockchain technology has occupied the place of the most disruptive technological innovation. Blockchain is based on the concept of decentralizing administration, so instead of having a single authoritative source, the system will have a plethora of records that hold the truth. Whenever a change is required or introduced, all records will need to be updated with the new information after being validated. This one-of-a-kind approach prevents the possibility of adding new information to a single record because there are so many to check to see whether it is correct. If we take the most sensitive text as a case study, then the Holy Quran represents the main reference for authenticity and integrity. However, attacks directed at the digital type of this text have witnessed a continuous increase due to the ease and speed of publishing and sharing verses and surahs and the lack of monitoring and confirmation bodies. To solve the present problem, we introduce a blockchain-based Ayat/Surah preservation model. Through the decentralization and smart contract features of the blockchain, tokens can be maintained automatically without human participation to form a guarding sub-chain in the state unit, and the blockchain has a good performance in combating attacks, which is called the 51% attack. Meanwhile, to solve the problem of data confusion and query difficulty caused by an excessive number of cases, the union of cryptography, hashes, and timestamps is used to form a concatenated master string for preservation. Due to the problem of the repetition of some verses of the Quran in some surahs and the need to absolutely guarantee the sequence of verses, the Merkle tree feature for segmentation is used to calculate the segmentation of the verses of each surah. In this way, memorizing verses becomes an automatic process that allows the Holy Quran to withstand the tests of distortion and distortion. On the other side, it gives us the ability to verify the authenticity and integrity of the Quranic texts scattered on websites and applications.","PeriodicalId":112478,"journal":{"name":"2021 International Conference on Information Systems and Advanced Technologies (ICISAT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114609590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Better Decision Making with Sentiment Analysis of Amazon reviews","authors":"Nahili Wedjdane, Rezeg Khaled, K. Okba","doi":"10.1109/ICISAT54145.2021.9678483","DOIUrl":"https://doi.org/10.1109/ICISAT54145.2021.9678483","url":null,"abstract":"The way we purchase products online has been revolutionized due to disruptive digital technologies making all the information available at our fingertips. This paper inspects the effect of reviews on mobile phones sales. Noting the inconsistent results on the effect of reviews in previous literature, this study examines how the sentiments on different mobile phone brands in online reviews affect their sales. In our work, we analyze reviews and comments about smartphones from Amazon as data set and classify the reviews text by negative/positive, very negative/very positive, and neutral sentiment. The information contained in reviews is very helpful for both the shoppers and product makers. In this paper, we conclude the following unique characteristics through more than 400,000 real smartphone reviews: (1) Short average length; (2) Power-law distribution; (3) Large span of length; (4) Notable difference in sentiment polarity. Based on the characteristics mentioned above, a series of comparative experiments have been done for sentiment classification and our model achieved an accuracy score of 76.80%","PeriodicalId":112478,"journal":{"name":"2021 International Conference on Information Systems and Advanced Technologies (ICISAT)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125473618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classifying of Intrusion Detection System Configurations Using Machine Learning Techniques","authors":"M. Daoud, Y. Dahmani, S. Ammar, Abdelkader Ouared","doi":"10.1109/ICISAT54145.2021.9678473","DOIUrl":"https://doi.org/10.1109/ICISAT54145.2021.9678473","url":null,"abstract":"The design capability of enhanced IDSs is being sought by the detection community because intrusion detection requirements are different from one environment to another. The design is often based on several main challenges and their development remains a difficult task due to the sophistication of the attacks and the complexity of the environments. This development is mainly based on the configuration management of IDS. This article discusses a collaborative approach to classifying IDS configurations to facilitate the competitive sharing of ideas between researchers and developers in academia and industry and specify down the main research ideas and show where they have had an impact because the manual classification of configurations is considered time consuming, cumbersome and prone to errors. Our intention is to solicit the reuse of solutions and help refine the works of the community.","PeriodicalId":112478,"journal":{"name":"2021 International Conference on Information Systems and Advanced Technologies (ICISAT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121327988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling Adaptation Processes in Mlearning","authors":"Hamza Lamia","doi":"10.1109/ICISAT54145.2021.9678452","DOIUrl":"https://doi.org/10.1109/ICISAT54145.2021.9678452","url":null,"abstract":"In recent years, the growth of mobile learning has been marked by the continued development of mobile computing and wireless technology. Mobile learning is a way of using mobile technologies to enhance traditional learning and expand the perspectives of the learning process itself one of the main objectives in a mobile learning environment is to provide the learner with appropriate content, i.e. provide the right resource at the right time and in the best way. In this paper we try to address the concept of adaptation in both processes: OnAction adaptation and OnChange adaptation.","PeriodicalId":112478,"journal":{"name":"2021 International Conference on Information Systems and Advanced Technologies (ICISAT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115101789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attention-based Adaptation in Gamified MOOCs","authors":"Nadia Hocine","doi":"10.1109/ICISAT54145.2021.9678461","DOIUrl":"https://doi.org/10.1109/ICISAT54145.2021.9678461","url":null,"abstract":"This Massive Open Online Courses becomes a successful way to seek useful information and to develop knowledge. However, MOOCs may suffer from high dropout rates due to the loss of students’ interest and engagement. Different studies analyzed students’ behavior and attention in online courses to determine what can increase their engagement. They often defined some stereotypical patterns that characterize the students’ engagement and that can be used to enhance the design of MOOCs content. However, students may have different behaviors over time and their attention may depend on various conditions. We believe that the students are not belonging to an exclusive user type and the consideration of the variability of their behavior and attention over time can improve their engagement. In this paper, we suggest a dynamic adaptation strategy of MOOC gamification elements, such as trophies, progression bar and avatar, on the basis of students’ temporal attention. The strategy uses eye tracking and students’ real-time interaction with online learning resources to adapt gamification elements. The objective is to enhance students’ behavioral engagement, especially their participation in discussion forum. We conducted an experiment to examine the acceptability of the proposed gamified learning tool and the proposed adaptation strategy. The results of the experiment show that the students were satisfied about the gamified learning tool and that proposed adaptation strategy increased their participation in forums.","PeriodicalId":112478,"journal":{"name":"2021 International Conference on Information Systems and Advanced Technologies (ICISAT)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127386666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bearing various defects diagnosis and classification using super victor machine (SVM) method.","authors":"Bellal Belkacemi, S. Saad","doi":"10.1109/ICISAT54145.2021.9678444","DOIUrl":"https://doi.org/10.1109/ICISAT54145.2021.9678444","url":null,"abstract":"Today, the diagnosis and classification of faults is very important, especially in rotating machines to avoid damage to material and human losses. This paper focuses on the use of artificial intelligence methods and specifically the Super Victor Machine (SVM) for bearing fault classification. Many methods and techniques have been used in this field to detect and predict bearing faults, but none of them is perfect. Most of these methods have many drawbacks, such as the complexity of extracting vibration signals. The present work uses Support Vector Machines (SVM) to overcome all issues of previously used methods for better accuracy. All the results show the effectiveness of the proposed technique over the previous method and can be employed as an effective tool in the classification of induction motor faults.","PeriodicalId":112478,"journal":{"name":"2021 International Conference on Information Systems and Advanced Technologies (ICISAT)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114082534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a Novel Nanometric Graphene Pentagone Patch Antenna Array for Terahertz Transmission","authors":"Moulfi Bouchra, Ferouani Souheyla, Ziani Kerarti Djalal, Moulessehoul Wassila","doi":"10.1109/ICISAT54145.2021.9678495","DOIUrl":"https://doi.org/10.1109/ICISAT54145.2021.9678495","url":null,"abstract":"This paper presents an original design of nanometric pentagon patch array in the terahertz band. The materiel used for the patch is the graphene, it has a very important electronics properties and can be used to fabricate printed antennas with very low profile. In our work, we obtained frequencies resonant of proposed antenna by changing substrates materials: polyimide, PTFE, Rogers RO4003C and Rogers RO3003. The antenna resonates at four different frequencies: 4.84, 5.11, 5.15, 5.23 THz. A Graphene pentagon patch antenna array is designed for bandwidth and gain enhancement. We obtained a very large bandwidth of 1109.6 GHz and 8dB of gain with the use of Rogers RO3003 material substrate which is very satisfactory in terahertz band transmission.","PeriodicalId":112478,"journal":{"name":"2021 International Conference on Information Systems and Advanced Technologies (ICISAT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131953600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparing Remote Learning Between Live Lectures and Self-paced Interactive Tutorials for Learning an Introduction to Blockchain","authors":"Jintawat Sangpratoom, Atima Tharatipyakul, Natnaree Ua-arak, Kejkaew Thanasuan, Suporn Pongnumkul","doi":"10.1109/ICISAT54145.2021.9678426","DOIUrl":"https://doi.org/10.1109/ICISAT54145.2021.9678426","url":null,"abstract":"Online learning in universities in Thailand is still a problem in terms of adaptation and finding a suitable way to learn. During the Covid-19 pandemic, most teachers give live lectures online via video conferencing platforms to teach students; however, there is still room for improvement. This paper experiments with the use of interactive tutorials as an alternative to live online teaching for learning a complex topic. Blockchain is the technology underlying the popular cryptocurrency, Bitcoin, and has been gaining attention, but it is a complex technology with limited learning resources. Therefore, we chose to create an interactive tutorial on the topic of an ‘Introduction to Blockchain’. We expected this instruction method to be more effective than live online lectures. A between-subjects user study was conducted to compare two modes of instructions using 2 student sample groups. A control group of 7 students learned online with an instructor via a video conferencing program, Zoom, and an experimental group of 7 students learned the content through the interactive tutorial we created. The average post-test scores of the students who studied with the interactive tutorial were better than that of the students who studied in a live online lecture. A within-subjects study was also conducted to understand students’ preferences between the two modes. It was found that the students preferred learning with interactive tutorials more than live online lectures, but a disadvantage was that they could not ask clarifying questions about the content when needed while using the interactive tutorial.","PeriodicalId":112478,"journal":{"name":"2021 International Conference on Information Systems and Advanced Technologies (ICISAT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124938333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Well-known Open-Source Cloud Computing Platforms","authors":"Mohamed Haddadi, Nacera Bahnes","doi":"10.1109/ICISAT54145.2021.9678405","DOIUrl":"https://doi.org/10.1109/ICISAT54145.2021.9678405","url":null,"abstract":"Cloud computing is an adaptive model that provides resources to end-users. This model moves many organizations to develop open-source cloud computing solutions. This article surveys popular open-source cloud computing platforms such as Eucalyptus, OpenNebula, Nimbus, Xen Cloud, and AbiCloud. These well-known cloud platforms can help researchers to choose the appropriate platform for their environments. For more illustration, a comparative study is given according to their architecture.","PeriodicalId":112478,"journal":{"name":"2021 International Conference on Information Systems and Advanced Technologies (ICISAT)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123325809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning in Healthcare - Application of Advanced Computational Techniques to Improve Healthcare","authors":"A. Han","doi":"10.1109/ICISAT54145.2021.9678403","DOIUrl":"https://doi.org/10.1109/ICISAT54145.2021.9678403","url":null,"abstract":"Since 2006, Deep Learning, also known as Hierarchical Learning, has developed as a new field of research in Machine Learning. Deep learning models are used to solve problems that shallow architectures (e.g., regression) cannot solve due to the curse of dimensionality. Automatically created statistically robust characteristics are derived from the data using a two-stage learning procedure that incorporates multiple layers of nonlinear processing. This review article, which serves as the introduction to the special session on deep learning, provides state-of-the-art models and summarizes current understanding on this type of learning method, which is used to tackle a variety of difficult categorization tasks. Deep Learning is a relatively recent area of research in Machine Learning that was founded with the purpose of getting Machine Learning closer to one of its original objectives: Artificial Intelligence. Deep Learning is concerned with the acquisition of several levels of representation and abstraction that aid in the interpretation of various forms of data, including images, audio, and text.","PeriodicalId":112478,"journal":{"name":"2021 International Conference on Information Systems and Advanced Technologies (ICISAT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123726872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}