Abdelhamid Zouhair, E. En-Naimi, B. Amami, H. Boukachour, P. Person, C. Bertelle
{"title":"Intelligent tutoring systems founded on the multi-agent incremental dynamic case based reasoning","authors":"Abdelhamid Zouhair, E. En-Naimi, B. Amami, H. Boukachour, P. Person, C. Bertelle","doi":"10.1109/CIST.2012.6388066","DOIUrl":"https://doi.org/10.1109/CIST.2012.6388066","url":null,"abstract":"In E-learning, there is still the problem of knowing how to ensure an individualized and continuous learner's follow-up during learning process, indeed among the numerous tools proposed, very few systems concentrate on a real time learner's follow-up. Our work in this field develops the design and implementation of a Multi-Agent Systems Based on Dynamic Case Based Reasoning which can initiate learning and provide an individualized follow-up of learner. When interacting with the platform, every learner leaves his/her traces in the machine. These traces are stored in a basis under the form of scenarios which enrich collective past experience. The system monitors, compares and analyses these traces to keep a constant intelligent watch and therefore detect difficulties hindering progress and/or avoid possible dropping out. The system can support any learning subject. The success of a case-based reasoning system depends critically on the performance of the retrieval step used and, more specifically, on similarity measure used to retrieve scenarios that are similar to the course of the learner (traces in progress). We propose a complementary similarity measure, named Inverse Longest Common Sub-Sequence (ILCSS). To help and guide the learner, the system is equipped with combined virtual and human tutors.","PeriodicalId":120664,"journal":{"name":"2012 Colloquium in Information Science and Technology","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132523570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keynote Talk: Business intelligence: Dimensional modeling fundamentals and challenges","authors":"N. Assem","doi":"10.1109/CIST.2012.6388053","DOIUrl":"https://doi.org/10.1109/CIST.2012.6388053","url":null,"abstract":"Dimensional modeling is a methodology for the design of data warehouse systems for decision support and analytical requirements, as an alternative to traditional online transactional processing systems. The fundamental steps, as well as the common techniques and good practices of dimensional modeling are presented, including granular (star schema) design for flexibility, conforming dimensions for large system integration, slowly changing dimensions, and real-time partitions to support near real-time data warehouses. Data warehouse systems face more challenges than traditional (transactional) systems. These challenges could be functional or technical. Some of these are addressed, including issues with respect to data structure (or lack of structure), (big) size, integration, and (front end) analytical applications complexity.","PeriodicalId":120664,"journal":{"name":"2012 Colloquium in Information Science and Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127113583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some methods to address the problem of unbalanced sentiment classification in an arabic context","authors":"A. Mountassir, H. Benbrahim, I. Berrada","doi":"10.1109/CIST.2012.6388061","DOIUrl":"https://doi.org/10.1109/CIST.2012.6388061","url":null,"abstract":"The rise of social media (such as online web forums and social networking sites) has attracted interests to mining and analyzing opinions available on the web. The online opinion has become the object of studies in many research areas; especially that called “Opinion Mining and Sentiment Analysis”. Several interesting and advanced works were performed on few languages (in particular English). However, there were very few studies on some languages such as Arabic. This paper presents the study we have carried out to address the problem of unbalanced data sets in supervised sentiment classification in an Arabic context. We propose three different methods to under-sample the majority class documents. Our goal is to compare the effectiveness of the proposed methods with the common random under-sampling. We also aim to evaluate the behavior of the classifier toward different under-sampling rates. We use two different common classifiers, namely Naïve Bayes and Support Vector Machines. The experiments are carried out on an Arabic data set that we have built from Aljazeera's web site and labeled manually. The results show that Naïve Bayes is sensitive to data set size, the more we reduce the data the more the results degrade. However, it is not sensitive to unbalanced data sets on the contrary of Support Vector Machines which is highly sensitive to unbalanced data sets. The results show also that we can rely on the proposed techniques and that they are typically competitive with random under-sampling.","PeriodicalId":120664,"journal":{"name":"2012 Colloquium in Information Science and Technology","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116379507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud computing: Security challenges","authors":"A. Bouayad, A. Blilat, N. H. Mejhed, M. E. Ghazi","doi":"10.1109/CIST.2012.6388058","DOIUrl":"https://doi.org/10.1109/CIST.2012.6388058","url":null,"abstract":"Although cloud computing can help companies accomplish more by breaking the physical bonds between an IT infrastructure and its users, heightened security threats must be overcome in order to benefit fully from this new computing paradigm that offers an innovative business model for organizations to adopt IT without upfront investment. Despite the potential gains achieved from the cloud computing, the model security is still questionable which impacts the cloud model adoption. The security problem becomes more complicated under the cloud model as new dimensions have entered into the problem scope related to the model architecture, multi-tenancy, elasticity, and layers dependency stack. In this paper we introduce a detailed analysis of the cloud security problem. We investigated the problem from the cloud architecture perspective, the cloud offered characteristics perspective, the cloud stakeholders' perspective, and the cloud service delivery models perspective. Based on this analysis we derive a detailed specification of the cloud security problem and key features that should be covered by any proposed security solution.","PeriodicalId":120664,"journal":{"name":"2012 Colloquium in Information Science and Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121133535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of fuzzy-ART on FPGA: Classification of the Algiers's Bay","authors":"R. Yahiaoui, F. Alilat, S. Loumi","doi":"10.1109/CIST.2012.6388069","DOIUrl":"https://doi.org/10.1109/CIST.2012.6388069","url":null,"abstract":"In this paper we propose a hardware architecture of the Fuzzy ART's generalization applied to the classification of multi-spectral image acquired by the Algerian satellite ALSAT 1. The developed solution is original and exploits the maximum benefit of the embedded resources in the reconfigurable circuits FPGAs. The goal is the research of a scalable architecture which gives a very good quality of classification and a very weak computing time (about a microsecond) with a very limited occupation of the logical resources. This architecture is easily reconfigurable.","PeriodicalId":120664,"journal":{"name":"2012 Colloquium in Information Science and Technology","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121246853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unifying and incorporating functional and non functional requirements in datawarehouse conceptual design","authors":"M. E. Mohajir, Amal Latrache","doi":"10.1109/CIST.2012.6388062","DOIUrl":"https://doi.org/10.1109/CIST.2012.6388062","url":null,"abstract":"Data warehouse (DW) architectures, which are at the core of many new generation information systems, are designed to provide decision makers and professional analysts with intuitive and performing means to explore and get intelligent data from large heterogeneous databases. However, the data quality is not the only concern; requirements related for example to security, performance and operability are also vital. Most existing approaches for conducting DW projects deal with the functional and nonfunctional requirements in a complete separate way. The lack of a global approach that gather concurrently both aspects from the requirements analysis to the conceptual design causes that many DW projects fail to meet their goals in satisfying users' needs and expectations. This work is the first step towards the development of a single framework that encompass a unified approach that allows us to get design information for the future datawarehouse multidimensional model on the basis of both functional and non-functional requirements. We will present the methods we adopted to achieve this goal and the enhancement we have made by integrating three additional aspects in the requirements analysis workflow, namely organizational, decisional and business process views. We select the telecom industry for our case study to demonstrate the viability of our approach.","PeriodicalId":120664,"journal":{"name":"2012 Colloquium in Information Science and Technology","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128516079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The modeling elements of LMSGENERATOR business repository","authors":"R. Dehbi, M. Talea, A. Tragha","doi":"10.1109/CIST.2012.6388067","DOIUrl":"https://doi.org/10.1109/CIST.2012.6388067","url":null,"abstract":"The global objective of this paper is to propose models and functional architectures respectively forming the repository of conceptual model and the functional architecture for learning management system produced by the two-phase generating process of LMSGENERATOR, a software factory for business components and platforms for distance learning. This work focuses on the business repository used as a starting point by the generation process of LMSGENERATOR. It is therefore a re-engineering process of learning management systems functional requirements to produce an extensible business model repository whose components are reusable, adaptable, flexible, integrating the various and global phases of the Open distance learning (ODL) and representing a criteria of adaptability to different user categories. Generic models with adaptability criteria are delivered to compose the LMS business repository. Each element of this repository (business model) is composed by three sub-models: data model, semantic model and visual model. These sub models are part of a transformation process that respected the art of model-driven engineering to produce a component model independently of the developmental technology. The generation process of component models, business components and the building process of complete solutions are represented to show the importance of this business repository in the LMSGENERATOR process.","PeriodicalId":120664,"journal":{"name":"2012 Colloquium in Information Science and Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132211200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating data mining with case based reasoning (CBR) to improve the proactivity of pervasive applications","authors":"Nesrine Gouttaya, Ahlame Begdouri","doi":"10.1109/CIST.2012.6388077","DOIUrl":"https://doi.org/10.1109/CIST.2012.6388077","url":null,"abstract":"Current context-aware adaptation techniques in smart environments are limited in their support for proactivity and user personalization. A reliance on developer modification and an inability to automatically learn from user interactions hinder their use for providing proactive services that can be adapted to the frequent changes of the context of individuals. To address these problems we propose a proactive and personalized approach to adaptation. Our approach integrates both Case-based Reasoning (CBR) and data mining techniques. It is based on CBR, but aided by data mining to extract user patterns and knowledge adaptation from users' interaction history.","PeriodicalId":120664,"journal":{"name":"2012 Colloquium in Information Science and Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134495034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measure of fuzzy presence of descriptors on Arabic Text Mining","authors":"I. E. Hassani, Abdelaziz Kriouile, Y. Benghabrit","doi":"10.1109/CIST.2012.6388063","DOIUrl":"https://doi.org/10.1109/CIST.2012.6388063","url":null,"abstract":"In the present work, we propose a new model of radical descriptors in Arabic Text Mining. This model will be based on the addition of lexical information contained in the morphological pattern of the Arabic word. We developed a statistical model by Hidden Markov Chain to disambiguate the morphological analysis of corpora, and we propose a new method to measure the relationship between descriptors based on a notion of “fuzzy measure of the presence” and we adapt the traditional statistical measures to this context, and we outline the key measures of similarity and distances used in Text Mining.","PeriodicalId":120664,"journal":{"name":"2012 Colloquium in Information Science and Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124269245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}