Proceedings of the 3rd International Conference on Networking, Information Systems & Security最新文献

筛选
英文 中文
Adaptive E-learning: Adaptation of Content According to the Continuous Evolution of the Learner During his Training 适应性网络学习:根据学习者在训练过程中的不断演变对内容进行适应
Mohammed Zaoudi, H. Belhadaoui
{"title":"Adaptive E-learning: Adaptation of Content According to the Continuous Evolution of the Learner During his Training","authors":"Mohammed Zaoudi, H. Belhadaoui","doi":"10.1145/3386723.3387890","DOIUrl":"https://doi.org/10.1145/3386723.3387890","url":null,"abstract":"Higher education has always been based on a traditional education system. All learners have to attend all training courses without taking into consideration human and logistical constraints. This situation leads to major problems of massification, which unfortunately subsequently lead to problems of demotivation or even abandonment of a large number of students. A solution to these problems resides in introduction of distance learning. The implementation of online courses, such as MOOC (Massive Open Online Courses), and the emergence of educational platforms such as LMS (Learning Management System) or LCMS (Learning Content Management System), have made it possible to introduce the notion of e-learning into Higher education. Nevertheless, if e-learning has left the Stone Age elsewhere, it is still an emerging field in some countries as Morocco where it is far from having reached maturity. Like any new system or proposal, e-learning has its own detractors who need to be more reassured on certain aspects. In this article, we deal with some major issues related to e-learning platforms, which offer pre-established pedagogical content without really taking into account the particularity or evolution of each learner during the training path. We will therefore talk about a customised or adaptive e-learning. By combining UBA (User Behavior Analytics) and AI (Artificial Intelligence), we will propose during this article an LBA (Learner Behavior Analytics) model based on an a system called SBAN (Score and Behavior ANalytics).","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124530003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Three-level binary tree structure for sentiment classification in Arabic text 面向阿拉伯语文本情感分类的三层二叉树结构
H. A. Addi, R. Ezzahir, A. Mahmoudi
{"title":"Three-level binary tree structure for sentiment classification in Arabic text","authors":"H. A. Addi, R. Ezzahir, A. Mahmoudi","doi":"10.1145/3386723.3387844","DOIUrl":"https://doi.org/10.1145/3386723.3387844","url":null,"abstract":"The advent of web 2.0 platforms allowed users to generate and share textual content. This results in an explosive increase of online personal opinion. Sentiment Analysis, which is a recent field of Natural Language Processing, aims to predict the orientation of sentiment present on this massive textual data. This plays a vital role in many applications, such as recommender systems, customer intelligence, information retrieval and psychological study of crowd. Most existing approaches in sentiment analysis trait only positive, negative and neutral classes, ignoring the class strength (weak or strong positive/negative). In this paper, we propose an innovative approach for multi-class hierarchical sentiment classification in Arabic text based on a three-level binary tree structure. Experimental results show that our approach gives significant improvements over other classification methods.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125156054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Adaptive Learning Approach for Better Retention of Learners in MOOCs 一种提高mooc学习者留存率的适应性学习方法
Smaili El Miloud, Sraidi Soukaina, Salma Azzouzi, M. E. H. Charaf
{"title":"An Adaptive Learning Approach for Better Retention of Learners in MOOCs","authors":"Smaili El Miloud, Sraidi Soukaina, Salma Azzouzi, M. E. H. Charaf","doi":"10.1145/3386723.3387845","DOIUrl":"https://doi.org/10.1145/3386723.3387845","url":null,"abstract":"Nowadays, the MOOC (Massive Open Online Course) revolution is gaining growing popularity due to the large number of open online courses. However, the retention rate of learners, which is generally around 10%, raises the question of the effectiveness of this mode of education. Our main objective in this paper is to design a new model to improve the courses completion rate and fight against the dropping out through an adaptive e-learning system for each learner, so that the proposed course correspond to the adequate way the learners could accomplish their learning process. The model will be realized by exploiting the traces left during the users' interactions with their learning environment. By using these traces, we get all pertinent information related to the learner profile. Furthermore, we will generate via ant colony algorithms, recommendations tailored to each learner.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131570024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Machine Learning Methods for Air Quality Monitoring 空气质量监测的机器学习方法
Akram Zaytar, Chaker El Amrani
{"title":"Machine Learning Methods for Air Quality Monitoring","authors":"Akram Zaytar, Chaker El Amrani","doi":"10.1145/3386723.3387835","DOIUrl":"https://doi.org/10.1145/3386723.3387835","url":null,"abstract":"Machine learning algorithms, and especially deep neural networks, provide universal estimator paradigms to approximate optimal solutions for arbitrary domain-specific problems. On the other hand, environmental-related problems that are a direct result of our rapidly changing climate are, nowadays, of the highest importance. Recently, the adoption of machine learning algorithms for environmental modeling has increased, especially in time series forecasting and computer vision. In this review, we attempt to provide a unified and systematic survey of the current machine learning algorithms used to solve multiple air quality monitoring tasks. We specifically focus on air quality modeling using satellite imagery and sensor device data. Lastly, we propose future directions with neural network modeling and representation learning.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129518978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Handwriting Recognition with Artificial Neural Networks a Decade Literature Review 人工神经网络手写识别的十年文献综述
Ahmed Remaida, A. Moumen, Y. Idrissi, Zineb Sabri
{"title":"Handwriting Recognition with Artificial Neural Networks a Decade Literature Review","authors":"Ahmed Remaida, A. Moumen, Y. Idrissi, Zineb Sabri","doi":"10.1145/3386723.3387884","DOIUrl":"https://doi.org/10.1145/3386723.3387884","url":null,"abstract":"Deep Learning Artificial Neural Networks has pushed forward researches in the field of pattern recognition, furthermore in human handwriting recognition. From online to offline approach, signature verification, writing or writer identification, segmentation or features extraction, a multitude of Artificial Neural Networks (ANNs) models are applied in the process. This paper focuses on the literature review of human handwriting recognition with ANN's over the last decade. We propose an exploratory analysis of 294 research papers collected from five indexed research engines: ACM Digital Library, IEEE digital library, Science Direct, Scopus and Web of Science. Our aim is to provide a research papers distribution across years and journals, a Keywords frequency analysis using cloud visualization, and a Natural Language Processing Topic Modeling using Non-Negative Matrix Factorization (NMF). The results of this study show that the number of research papers reached noticeably a peak in the 2010 with 44 published papers; also Pattern Recognition was the top publishing journal with 12 published papers. As for the topic modeling using NMF we obtained 3 topics listed as follows: 1) Feature Extraction and segmentation techniques for Handwritten Texts Recognition; 2) Signature Verification in Biometric security for Off-line Authentication; 3) Assessment Systems for Student Identification","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125114939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Theoretical Study on Project Delivery and Leadership Style 项目交付与领导风格的理论研究
Muhammad Azman, A. Mohamed, E. E. Odzaly
{"title":"A Theoretical Study on Project Delivery and Leadership Style","authors":"Muhammad Azman, A. Mohamed, E. E. Odzaly","doi":"10.1145/3386723.3387842","DOIUrl":"https://doi.org/10.1145/3386723.3387842","url":null,"abstract":"The relationship between project manager and project delivery is obvious. The use of a project management method or standard like PMBOK and PRINCE2 remains very important for the success of the project. Several critical success and failure factors of a project were studied and one of the responsibilities in ensuring successful delivery lies in project manager. This paper includes reviews from 45 articles which discovered different styles, attributes and skills that justify good leadership in support of successful project delivery. The findings further supported by an interviewed data obtained from an industry which shows that leadership styles influence in achieving successful project delivery. In addition, shifting in styles is require to optimize the effectiveness of a leader thus increase in team performance in achieving successful project delivery. Finally, a conceptual model showing the relationship between leadership and project delivery was proposed.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124263784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation and Comparative Study of the Both Algorithm LEACH and PEGASIS Based on Energy Consumption 基于能耗的LEACH和PEGASIS算法的评价与比较研究
Fatima Es-Sabery, Abdellatif Hair
{"title":"Evaluation and Comparative Study of the Both Algorithm LEACH and PEGASIS Based on Energy Consumption","authors":"Fatima Es-Sabery, Abdellatif Hair","doi":"10.1145/3386723.3387838","DOIUrl":"https://doi.org/10.1145/3386723.3387838","url":null,"abstract":"The main purpose of hierarchical routing is to effectively maintain the energy consumption of sensor nodes by involving them in multi-hop communication within a cluster and by aggregating and merging data to reduce the number of messages sent to the destination. Cluster formation is usually based on the energy reserve of sensors and on sensors that are close to the cluster head. LEACH (Low Energy Adaptive Clustering Hierarchy) is one of the first routing approaches for sensor networks. The principle of LEACH consists of dividing the network into distributed clusters at one pop to faster data delivery. An improved version of the LEACH protocol is proposed; it is called PEGASIS (Power-Efficient Gathering in Sensor Information Systems). PEGASIS forms chains of sensor nodes rather than clusters so that each node transmits and receives only data from a neighbor. The aims of this paper are first to study both protocols LEACH and PEGASIS. Secondly, to estimate the energy consumption by both protocols in Wireless Sensor Networks, Finally to show the results of comparative study between the LEACH and PEGASIS.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116053192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Natural Convection in a Differentially Heated Cavity with a Heated and Cooled Circular Cylinders 自然对流在不同的加热腔与加热和冷却圆柱
L. E. Moutaouakil, M. Boukendil, Z. Zrikem, A. Abdelbaki
{"title":"Natural Convection in a Differentially Heated Cavity with a Heated and Cooled Circular Cylinders","authors":"L. E. Moutaouakil, M. Boukendil, Z. Zrikem, A. Abdelbaki","doi":"10.1145/3386723.3387885","DOIUrl":"https://doi.org/10.1145/3386723.3387885","url":null,"abstract":"In this paper, the LBM method is used to simulate the natural convective flow and thermal behaviors of air inside a differentially heated cavity containing two inner circular cylinders maintained at different temperatures. Several configurations namely Bh -- TC, BB -- Th, Mh -- MC and MC -- Mh corresponding to different possible arrangements of the two cylinders inside the cavity were analyzed. The results are presented in the form of streamlines and isotherms for a selected range of the Rayleigh number Ra (103-106). The obtained results show that the arrangement of the cylinders inside the cavity considerably affects the flow structure in the cavity.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121122105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced Recommendation Systems Through Deep Learning 通过深度学习的高级推荐系统
Mohamed Khoali, Abdelhak Tali, Yassin Laaziz
{"title":"Advanced Recommendation Systems Through Deep Learning","authors":"Mohamed Khoali, Abdelhak Tali, Yassin Laaziz","doi":"10.1145/3386723.3387870","DOIUrl":"https://doi.org/10.1145/3386723.3387870","url":null,"abstract":"Many companies have realized the importance of deep learning, which justifies their growing interest in the use of recommender systems to boost their sales. They aim to predict users' intents and recommend products likely to be of their interests. The purpose of this study is to provide a review of deep learning techniques for recommendation systems that have been used in research and industry.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122748548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Big Data Solutions Proposed for Cluster Computing Systems Challenges: A survey 针对集群计算系统挑战提出的大数据解决方案:调查
Fatima Es-Sabery, Abdellatif Hair
{"title":"Big Data Solutions Proposed for Cluster Computing Systems Challenges: A survey","authors":"Fatima Es-Sabery, Abdellatif Hair","doi":"10.1145/3386723.3387826","DOIUrl":"https://doi.org/10.1145/3386723.3387826","url":null,"abstract":"CCS (Cluster Computing System) is coming to solve the problems of standard technology. Whose, objective is to improve the performance/power efficiency of a single processor for storing and mining the large data sets, using the parallel programming to read and process the massive data sets on multiple disks and CPUs. The thing which makes these systems somewhat performant than the standard technology is the physical organization of computing nodes in the cluster. Currently, this kind of cluster does not entirely solve the problem because it comes with its challenges, which are Node failures, Computations, Network Bottleneck, and Distributed programming. All these problems are coming when we are mining and storing the massive volume of data using cluster computing. To solve these challenges, Google invented a new Big Data framework of data processing called MapReduce, to manage large scale data processing across large clusters of commodity servers. The paper outlines the running of CCS and presents its challenges in this era of Big Data. Moreover, it introduces the most popular Big Data solutions proposed to overcome the CCS challenges. Also, it shows how Big Data technologies solve CCS issues. Generally, the main goal of this work is to provide a better understanding of the challenges of CCS and identify the essential big data solutions in this increasingly important area.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127412068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信