{"title":"Adaptive E-learning: Adaptation of Content According to the Continuous Evolution of the Learner During his Training","authors":"Mohammed Zaoudi, H. Belhadaoui","doi":"10.1145/3386723.3387890","DOIUrl":"https://doi.org/10.1145/3386723.3387890","url":null,"abstract":"Higher education has always been based on a traditional education system. All learners have to attend all training courses without taking into consideration human and logistical constraints. This situation leads to major problems of massification, which unfortunately subsequently lead to problems of demotivation or even abandonment of a large number of students. A solution to these problems resides in introduction of distance learning. The implementation of online courses, such as MOOC (Massive Open Online Courses), and the emergence of educational platforms such as LMS (Learning Management System) or LCMS (Learning Content Management System), have made it possible to introduce the notion of e-learning into Higher education. Nevertheless, if e-learning has left the Stone Age elsewhere, it is still an emerging field in some countries as Morocco where it is far from having reached maturity. Like any new system or proposal, e-learning has its own detractors who need to be more reassured on certain aspects. In this article, we deal with some major issues related to e-learning platforms, which offer pre-established pedagogical content without really taking into account the particularity or evolution of each learner during the training path. We will therefore talk about a customised or adaptive e-learning. By combining UBA (User Behavior Analytics) and AI (Artificial Intelligence), we will propose during this article an LBA (Learner Behavior Analytics) model based on an a system called SBAN (Score and Behavior ANalytics).","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124530003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Three-level binary tree structure for sentiment classification in Arabic text","authors":"H. A. Addi, R. Ezzahir, A. Mahmoudi","doi":"10.1145/3386723.3387844","DOIUrl":"https://doi.org/10.1145/3386723.3387844","url":null,"abstract":"The advent of web 2.0 platforms allowed users to generate and share textual content. This results in an explosive increase of online personal opinion. Sentiment Analysis, which is a recent field of Natural Language Processing, aims to predict the orientation of sentiment present on this massive textual data. This plays a vital role in many applications, such as recommender systems, customer intelligence, information retrieval and psychological study of crowd. Most existing approaches in sentiment analysis trait only positive, negative and neutral classes, ignoring the class strength (weak or strong positive/negative). In this paper, we propose an innovative approach for multi-class hierarchical sentiment classification in Arabic text based on a three-level binary tree structure. Experimental results show that our approach gives significant improvements over other classification methods.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125156054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Smaili El Miloud, Sraidi Soukaina, Salma Azzouzi, M. E. H. Charaf
{"title":"An Adaptive Learning Approach for Better Retention of Learners in MOOCs","authors":"Smaili El Miloud, Sraidi Soukaina, Salma Azzouzi, M. E. H. Charaf","doi":"10.1145/3386723.3387845","DOIUrl":"https://doi.org/10.1145/3386723.3387845","url":null,"abstract":"Nowadays, the MOOC (Massive Open Online Course) revolution is gaining growing popularity due to the large number of open online courses. However, the retention rate of learners, which is generally around 10%, raises the question of the effectiveness of this mode of education. Our main objective in this paper is to design a new model to improve the courses completion rate and fight against the dropping out through an adaptive e-learning system for each learner, so that the proposed course correspond to the adequate way the learners could accomplish their learning process. The model will be realized by exploiting the traces left during the users' interactions with their learning environment. By using these traces, we get all pertinent information related to the learner profile. Furthermore, we will generate via ant colony algorithms, recommendations tailored to each learner.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131570024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning Methods for Air Quality Monitoring","authors":"Akram Zaytar, Chaker El Amrani","doi":"10.1145/3386723.3387835","DOIUrl":"https://doi.org/10.1145/3386723.3387835","url":null,"abstract":"Machine learning algorithms, and especially deep neural networks, provide universal estimator paradigms to approximate optimal solutions for arbitrary domain-specific problems. On the other hand, environmental-related problems that are a direct result of our rapidly changing climate are, nowadays, of the highest importance. Recently, the adoption of machine learning algorithms for environmental modeling has increased, especially in time series forecasting and computer vision. In this review, we attempt to provide a unified and systematic survey of the current machine learning algorithms used to solve multiple air quality monitoring tasks. We specifically focus on air quality modeling using satellite imagery and sensor device data. Lastly, we propose future directions with neural network modeling and representation learning.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129518978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handwriting Recognition with Artificial Neural Networks a Decade Literature Review","authors":"Ahmed Remaida, A. Moumen, Y. Idrissi, Zineb Sabri","doi":"10.1145/3386723.3387884","DOIUrl":"https://doi.org/10.1145/3386723.3387884","url":null,"abstract":"Deep Learning Artificial Neural Networks has pushed forward researches in the field of pattern recognition, furthermore in human handwriting recognition. From online to offline approach, signature verification, writing or writer identification, segmentation or features extraction, a multitude of Artificial Neural Networks (ANNs) models are applied in the process. This paper focuses on the literature review of human handwriting recognition with ANN's over the last decade. We propose an exploratory analysis of 294 research papers collected from five indexed research engines: ACM Digital Library, IEEE digital library, Science Direct, Scopus and Web of Science. Our aim is to provide a research papers distribution across years and journals, a Keywords frequency analysis using cloud visualization, and a Natural Language Processing Topic Modeling using Non-Negative Matrix Factorization (NMF). The results of this study show that the number of research papers reached noticeably a peak in the 2010 with 44 published papers; also Pattern Recognition was the top publishing journal with 12 published papers. As for the topic modeling using NMF we obtained 3 topics listed as follows: 1) Feature Extraction and segmentation techniques for Handwritten Texts Recognition; 2) Signature Verification in Biometric security for Off-line Authentication; 3) Assessment Systems for Student Identification","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125114939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Theoretical Study on Project Delivery and Leadership Style","authors":"Muhammad Azman, A. Mohamed, E. E. Odzaly","doi":"10.1145/3386723.3387842","DOIUrl":"https://doi.org/10.1145/3386723.3387842","url":null,"abstract":"The relationship between project manager and project delivery is obvious. The use of a project management method or standard like PMBOK and PRINCE2 remains very important for the success of the project. Several critical success and failure factors of a project were studied and one of the responsibilities in ensuring successful delivery lies in project manager. This paper includes reviews from 45 articles which discovered different styles, attributes and skills that justify good leadership in support of successful project delivery. The findings further supported by an interviewed data obtained from an industry which shows that leadership styles influence in achieving successful project delivery. In addition, shifting in styles is require to optimize the effectiveness of a leader thus increase in team performance in achieving successful project delivery. Finally, a conceptual model showing the relationship between leadership and project delivery was proposed.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124263784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation and Comparative Study of the Both Algorithm LEACH and PEGASIS Based on Energy Consumption","authors":"Fatima Es-Sabery, Abdellatif Hair","doi":"10.1145/3386723.3387838","DOIUrl":"https://doi.org/10.1145/3386723.3387838","url":null,"abstract":"The main purpose of hierarchical routing is to effectively maintain the energy consumption of sensor nodes by involving them in multi-hop communication within a cluster and by aggregating and merging data to reduce the number of messages sent to the destination. Cluster formation is usually based on the energy reserve of sensors and on sensors that are close to the cluster head. LEACH (Low Energy Adaptive Clustering Hierarchy) is one of the first routing approaches for sensor networks. The principle of LEACH consists of dividing the network into distributed clusters at one pop to faster data delivery. An improved version of the LEACH protocol is proposed; it is called PEGASIS (Power-Efficient Gathering in Sensor Information Systems). PEGASIS forms chains of sensor nodes rather than clusters so that each node transmits and receives only data from a neighbor. The aims of this paper are first to study both protocols LEACH and PEGASIS. Secondly, to estimate the energy consumption by both protocols in Wireless Sensor Networks, Finally to show the results of comparative study between the LEACH and PEGASIS.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116053192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. E. Moutaouakil, M. Boukendil, Z. Zrikem, A. Abdelbaki
{"title":"Natural Convection in a Differentially Heated Cavity with a Heated and Cooled Circular Cylinders","authors":"L. E. Moutaouakil, M. Boukendil, Z. Zrikem, A. Abdelbaki","doi":"10.1145/3386723.3387885","DOIUrl":"https://doi.org/10.1145/3386723.3387885","url":null,"abstract":"In this paper, the LBM method is used to simulate the natural convective flow and thermal behaviors of air inside a differentially heated cavity containing two inner circular cylinders maintained at different temperatures. Several configurations namely Bh -- TC, BB -- Th, Mh -- MC and MC -- Mh corresponding to different possible arrangements of the two cylinders inside the cavity were analyzed. The results are presented in the form of streamlines and isotherms for a selected range of the Rayleigh number Ra (103-106). The obtained results show that the arrangement of the cylinders inside the cavity considerably affects the flow structure in the cavity.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121122105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced Recommendation Systems Through Deep Learning","authors":"Mohamed Khoali, Abdelhak Tali, Yassin Laaziz","doi":"10.1145/3386723.3387870","DOIUrl":"https://doi.org/10.1145/3386723.3387870","url":null,"abstract":"Many companies have realized the importance of deep learning, which justifies their growing interest in the use of recommender systems to boost their sales. They aim to predict users' intents and recommend products likely to be of their interests. The purpose of this study is to provide a review of deep learning techniques for recommendation systems that have been used in research and industry.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122748548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big Data Solutions Proposed for Cluster Computing Systems Challenges: A survey","authors":"Fatima Es-Sabery, Abdellatif Hair","doi":"10.1145/3386723.3387826","DOIUrl":"https://doi.org/10.1145/3386723.3387826","url":null,"abstract":"CCS (Cluster Computing System) is coming to solve the problems of standard technology. Whose, objective is to improve the performance/power efficiency of a single processor for storing and mining the large data sets, using the parallel programming to read and process the massive data sets on multiple disks and CPUs. The thing which makes these systems somewhat performant than the standard technology is the physical organization of computing nodes in the cluster. Currently, this kind of cluster does not entirely solve the problem because it comes with its challenges, which are Node failures, Computations, Network Bottleneck, and Distributed programming. All these problems are coming when we are mining and storing the massive volume of data using cluster computing. To solve these challenges, Google invented a new Big Data framework of data processing called MapReduce, to manage large scale data processing across large clusters of commodity servers. The paper outlines the running of CCS and presents its challenges in this era of Big Data. Moreover, it introduces the most popular Big Data solutions proposed to overcome the CCS challenges. Also, it shows how Big Data technologies solve CCS issues. Generally, the main goal of this work is to provide a better understanding of the challenges of CCS and identify the essential big data solutions in this increasingly important area.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127412068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}