2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)最新文献
{"title":"NISS 2022 Cover Page","authors":"","doi":"10.1109/niss55057.2022.10085011","DOIUrl":"https://doi.org/10.1109/niss55057.2022.10085011","url":null,"abstract":"","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117349467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Computing Application in Medical Imaging: Challenges and Opportunities","authors":"Hicham Boudlal, Mohammed Serrhini, A. Tahiri","doi":"10.1109/NISS55057.2022.10084922","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10084922","url":null,"abstract":"In healthcare, critical systems are used to provide vital information and services 24x7x365. Recent years have brought important advancements in medical imaging and information technology (IT) which have changed significantly the way we operate and interact with each other. The use of cloud computing has centralized the infrastructure of radiology, software imaging, database storage or network configuration, that could then be provisioned as service based on user demand to any Internet computer. The present article provides an overview regarding the basic concept of cloud computing technology and discusses its application for medical imaging.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126833828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards fast ECC signing algorithms for Blockchain","authors":"Youssef Lamriji, K. Makkaoui, A. Beni-Hssane","doi":"10.1109/NISS55057.2022.10085497","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085497","url":null,"abstract":"Blockchain (BC) is a revolutionary technology that has dramatically impacted modern society thanks to its decentralization, transparency, and security properties. The BC is a distributed database that stores a register of assets and digitally signed transactions. Beginning in the financial field, BC was quickly applied to several fields, including the Internet of Things (IoT), supply chain, education, healthcare, and energy. In most BC-based applications, transactions are signed using ECDSA or EdDSA algorithms. However, scalar multiplication (SM) is a complex and central operation in these signing algorithms. This paper presents the most efficient techniques for computing SM to provide fast signature algorithms for BC-enabled applications.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128315634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khasanah Nur Hidayah, A. Siagian, R. Richardo, S. Riyanto
{"title":"Utilizing AR for 3D Geometry Object Visualization","authors":"Khasanah Nur Hidayah, A. Siagian, R. Richardo, S. Riyanto","doi":"10.1109/NISS55057.2022.10085172","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085172","url":null,"abstract":"Employing a learning medium can support learning and teaching activities. This learning medium can be one way to help students in understanding particular lessons, e.g., mathematics, art, and science. Although due to some reasons that understanding such specific lessons might be very difficult, using a learning tool can help students in understanding them easily. Thus, this study aims to develop such a learning medium in helping students to learn mathematics using visualization. In particular, we utilize augmented reality (AR) technology to visualize cube and beam objects. The visualized cube and beam objects are in the form of models and nets. The models and nets visualization is shown as a basic understanding to learn the geometry of three-dimensional (3D) flat-sided shapes. For this purpose, we use Research and Development (R&D) method consisting of define, design, development, and dissemination steps in this study. Our experimental results show that the developed AR application could work well to visualize the models, nets, and volume of cube and beam objects in 3D.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131664989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"About NISS 2022","authors":"","doi":"10.1109/niss55057.2022.10085241","DOIUrl":"https://doi.org/10.1109/niss55057.2022.10085241","url":null,"abstract":"","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116443800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Highly-Efficient k-Nearest Neighbor Algorithm for Big Data Classification","authors":"H. I. Abdalla, A. Amer","doi":"10.1109/NISS55057.2022.10085013","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085013","url":null,"abstract":"the k-nearest neighbors (kNN) algorithm is naturally used to search for the nearest neighbors of a test point in a feature space. A large number of works have been developed in the literature to accelerate the speed of data classification using kNN. In parallel with these works, we present a novel K-nearest neighbor variation with neighboring calculation property, called NCP-kNN. NCP-kNN comes to solve the search complexity of kNN as well as the issue of high-dimensional classification. In fact, these two problems cause an exponentially increasing level of complexity, particularly with big datasets and multiple k values. In NCP-kNN, every test point’s distance is checked with only a limited number of training points instead of the entire dataset. Experimental results on six small datasets, show that the performance of NCP-kNN is equivalent to that of standard kNN on small and big datasets, with NCP-kNN being highly efficient. Furthermore, surprisingly, results on big datasets demonstrate that NCP-kNN is not just faster than standard kNN but also significantly superior. The findings, on the whole, show that NCP-kNN is a promising technique as a highly-efficient kNN variation for big data classification.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129686878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sentiment analysis of students’ Facebook comments toward university announcements","authors":"Anoual El Kah, Imad Zeroual","doi":"10.1109/NISS55057.2022.10084994","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10084994","url":null,"abstract":"Students’ opinions are among the critical indicators to evaluate the university teaching process. However, due to the absence of an official online system in most universities that provides a mechanism for obtaining students’ opinions on several university announcements, most students use various social networks to express their feelings and provide their opinions toward these announcements. We present, through this paper, sentiment analysis of Facebook comments written in the Moroccan Arabic dialect. These comments reflect the opinions of students about university announcements during the COVID-19 pandemic, especially those related to teaching mode and ex-am planning. Then, the comments collected were cleaned, preprocessed, and manually classified into four categories, namely positive, neutral, negative, and bipolar. Further, data dimensionality reduction is applied using TF-IDF and Chi-square test. Finally, we evaluated the performance of three standard classifiers, i.e., Naïve Bayesian (NB), Support Vector Machines (SVM), and Random Forests (RF) using k-fold cross-validation. The results showed that the SVM-based classifier performs as well as the RF-based classifier regarding the classification’s accuracy and F1-score, while the NB-based classifier lags behind them.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129603008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nature-inspired and sampling algorithm towards 3D path planning for autonomous vehicles: a review","authors":"Walid Jebrane, Nabil El Akchioui","doi":"10.1109/NISS55057.2022.10085101","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085101","url":null,"abstract":"The biggest challenge to autonomous mobile robot navigation is planning an obstacle-free trajectory from an initial point to the target. All environments are prompt to change which arises obstacles that add more complexity to the autonomous navigation systems, especially for tasks such as parcel delivery, law enforcement, and first aid in urban areas. The most of current algorithms for autonomous system path planning are drawn from pre-existing models and focus mostly on Ground Autonomous Vehicles, employing 2D techniques that must be converted to 3D in the case of Aerial Vehicles. The race to solve those challenging tasks, over the past few decades, has led to a promising range of improved and hybrid robot path planning. The main objective of this article is to provide a comprehensive and conclusive review of two of the most successful three-dimensional robotic path planning algorithms developed in recent years. Each algorithm is investigated and evaluated in terms of time efficiency, executable area, and capacity to deal with both static and dynamic obstacles.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122247617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Maskittou, Anass El Haddadi, Hayat Routaib
{"title":"Intelligent technology management based on patent topic modeling : *Note: Sub-titles are not captured in Xplore and should not be used","authors":"Mohamed Maskittou, Anass El Haddadi, Hayat Routaib","doi":"10.1109/NISS55057.2022.10085417","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085417","url":null,"abstract":"Competitive intelligence and technology insights are the results of using the materials and methods of big data analytics to arrange existing knowledge, integrating big data analytics in the field of patent analysis is an urgent need for any company in the marketplace to gain strong knowledge about the computational environment, this paper is a new paradigm in patent analysis by proposing a full methodology from feature selection to clustering phase based on singular value decomposition (SVD) as a central tool to determine the correlation between the patent’s data, semantic patent topics could emerge more relevant topics helping the senior managers in the companies in claiming new management strategy to fill the gaps with the markets with decreasing the cost of the production and time-consuming of the decision-making in each level of the organization.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128115186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Fartitchou, Hanaa El Marraki, Lamyae Lafkir, Anissa Azzouz, K. Makkaoui, Z. E. Allali
{"title":"Public-Key Cryptography behind Blockchain Security","authors":"Mohamed Fartitchou, Hanaa El Marraki, Lamyae Lafkir, Anissa Azzouz, K. Makkaoui, Z. E. Allali","doi":"10.1109/NISS55057.2022.10085236","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085236","url":null,"abstract":"Blockchain (BC) technology has infiltrated many areas of our lives, from digital currencies to healthcare and beyond, thanks to its security, decentralization, and transparency properties. BC is a decentralized ledger of assets and digitally signed transactions through a peer-to-peer (P2P) computer network. Indeed, signature and consensus algorithms are behind BC’s security and performance. This paper provides a study on BC-used asymmetric cryptography. We focus on RSA, DSA, and ECDSA digital signature algorithms. We implement the algorithms using python language on a Raspberry Pi. Simulation outcomes show that the ECDSA performs better than the other algorithms and is secure despite using small keys.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123842965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}