Meriem Adraoui, A. Retbi, Mohammed Khalidi, S. Bennani
{"title":"Evaluate learning communities in the online social media: Facebook groups","authors":"Meriem Adraoui, A. Retbi, Mohammed Khalidi, S. Bennani","doi":"10.1145/3289402.3289505","DOIUrl":"https://doi.org/10.1145/3289402.3289505","url":null,"abstract":"Nowadays, Facebook is considered like an online learning tool. It is an integral part of users' daily routine, whether teachers or learners. The idea of this article is to evaluate learners by communities in Facebook groups based on their interactions via comments and like. In order to achieve our goal, we will proceed in two steps, the first one consists to implement two community detection algorithms (ForceAtlas2 and Louvian Blondel), and in the second step we will calculate three measures of centrality (degree, closeness, betweenness) of the Social Learning Analytics process (SLA) to identify communities at-risk.","PeriodicalId":199959,"journal":{"name":"Proceedings of the 12th International Conference on Intelligent Systems: Theories and Applications","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133959414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ExSIOCA","authors":"Asmae El Kassiri, Fatima-Zahra Belouadha","doi":"10.1145/3289402.3289540","DOIUrl":"https://doi.org/10.1145/3289402.3289540","url":null,"abstract":"The online social networks (OSNs) provide interesting and various means of online interactions, making them a society's daily life. As the OSNs popularity has experienced exponential growth in recent years, the Security and Privacy Risks accompanying such popularity has earned interests of the academic, enterprises and government communities. In this paper, we address how the security and privacy problematic were treated in Semantically-Interlinked Online Communities Access (SIOCA) ontology and why we have proposed an extension of SIOCA.","PeriodicalId":199959,"journal":{"name":"Proceedings of the 12th International Conference on Intelligent Systems: Theories and Applications","volume":"195 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120940446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hanane Sebbaq, A. Retbi, Mohammed Khalidi, S. Bennani
{"title":"Software Product Line to overcome the variability issue in E-Learning: Systematic literature review","authors":"Hanane Sebbaq, A. Retbi, Mohammed Khalidi, S. Bennani","doi":"10.1145/3289402.3289504","DOIUrl":"https://doi.org/10.1145/3289402.3289504","url":null,"abstract":"The disparity of educational technologies, pedagogies and learning styles implies a problem of variability when modeling E-learning systems. Furthermore, the current learning context, which has become very open and heterogeneous, raises the problem of automating the modeling, development and maintenance of personalized E-learning systems based on various pedagogies. For its part, the \"Software Product Line\" is a paradigm that aims to produce product families based on the principles of reuse, configuration and derivation. The main purpose of this literature review is to explore the different potential applications of \"SPL\" in the E-learning domain to figure out the problem of variability. We will adopt a protocol for a systematic review of literature, after which we will draw up an analysis report.","PeriodicalId":199959,"journal":{"name":"Proceedings of the 12th International Conference on Intelligent Systems: Theories and Applications","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122819943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Dataflow Anomalies in Business Process An Overview of Modeling Approaches","authors":"Najat Chadli, M. I. Kabbaj, Z. Bakkoury","doi":"10.1145/3289402.3289537","DOIUrl":"https://doi.org/10.1145/3289402.3289537","url":null,"abstract":"Most research focus on control flow modeling when modeling and analyzing business process models, but less attention is paid to data flow. However, data flow and control flow are both essential in process modeling. Thus, the data flow modeling and verification have a great importance in detecting anomalies. In this study, some recent approaches for anomaly detection has reviewed. The first is an analytical approach for detecting and eliminating three types of data-flow errors that formally establish the correctness criteria for data-flow modeling. The second formulates the data-flow modeling and verification using a Petri Net based approach. The third one presents an ad hoc approach to detect data modelling errors in business process models by applying for an active help using a DataRecord concept. We explain for each approach its proper method and tools. We then compare and analyze each one of them to discover the added-value of each approach.","PeriodicalId":199959,"journal":{"name":"Proceedings of the 12th International Conference on Intelligent Systems: Theories and Applications","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124735606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding disjoint clusters in a categorical data space","authors":"Mohamed Azmi, A. Berrado","doi":"10.1145/3289402.3289543","DOIUrl":"https://doi.org/10.1145/3289402.3289543","url":null,"abstract":"In This paper we provide a prototype of method for segment a high dimensional categorical data using frequent patterns. The frequent patterns are mined using a conventional frequent pattern mining algorithm according to a predefined support threshold. In addition, we restrict the frequent patterns length to a predefined low value in order to ensure the understandability of the results. Associations between the frequent patterns are discovered in order to reveal containment and overlap between them. Segments are iteratively defined as the largest region of data space covered by several frequent patterns. The illustrative example shows promising results in term of the quality of the resulted segments and the understandability.","PeriodicalId":199959,"journal":{"name":"Proceedings of the 12th International Conference on Intelligent Systems: Theories and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132019789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supervised machine learning for service providers' classification using multiple criteria in a network architecture environment","authors":"Imane Haddar, B. Raouyane, M. Bellafkih","doi":"10.1145/3289402.3289532","DOIUrl":"https://doi.org/10.1145/3289402.3289532","url":null,"abstract":"The service selection in a Next Generation Network field remains a challenging problem for service providers, as they have to satisfy customers and keep their earnings. Given the growing number of telecom service providers, the customer is in a dilemma to choose the right service with a fair price. To do so, we propose in this paper a supervised learning algorithm since it is a classification problem. Based on requirements specified in the contract called Service Level Agreement (SLA) in IP Multimedia Service (IMS) network, we ended up choosing the decision trees algorithm for several reasons that we will explore later in this work. This method will assist users in selecting the right service for a better management of contracts between the involved entities.","PeriodicalId":199959,"journal":{"name":"Proceedings of the 12th International Conference on Intelligent Systems: Theories and Applications","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132086090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Overview of Community Detection Methods in Transportation Networks","authors":"Wafaa Oubaalla, Laila Benhlima","doi":"10.1145/3289402.3289546","DOIUrl":"https://doi.org/10.1145/3289402.3289546","url":null,"abstract":"The Internet of thing (IoT) has a variety of application domains including the transportation systems. Indeed, the future of transportation lies not only in building new roads, but also increasingly in using the internet. Internet enables elements within the transportation system such as vehicles, roads, traffic lights, etc. to become intelligent by embedding them with sensors and allowing them to communicate with each other through wireless technologies in order to improve mobility, safety and sustainability. Even though persons are equipped with wearable sensors or simply use their mobile to connect to the other elements. All these devices are connected to form a network. This network can be exploited to extract valuable information to improve the provided services such as reducing traffic congestion, making efficient matching between the demand and offer in term of passenger transportation and so on. Various knowledge can be extracted from a network such as overlapping networks detection, intruder detection, community detection ... In this paper we focus on community detection. We begin by presenting various community detection algorithms in real world networks and then we give an overview of the existing methods used for community detection in the structure of transportation network.","PeriodicalId":199959,"journal":{"name":"Proceedings of the 12th International Conference on Intelligent Systems: Theories and Applications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125459889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gas-Stations filling procurement problem with a multi-Size compartments vehicles and full tankers under limited number of trucks","authors":"O. Yamani, Mohammed Saddoune","doi":"10.1145/3289402.3289545","DOIUrl":"https://doi.org/10.1145/3289402.3289545","url":null,"abstract":"The optimization of Petroleum transport has always been a major concern for oil distribution companies. Dispatching and planning is usually done manually on a daily basis and dispatchers must deal with multiple constraints, lack of resources, shortage risk, time windows, etc. In this paper we develop a model to minimize the cost of delivery and maximize the number of delivered customers taking into account the importance of each customer and their associated risks. The models developed will be tested with real data and compared with the real solutions adopted during manual planning by dispatchers. This paper not only takes into account the standard constraints but also it considers the limited number of trucks, a heterogeneous truck fleet, a full loading truck and customers classifications which are not taken into account together in most papers. Lastly we will also introduce the \"Farhood\" strategy.","PeriodicalId":199959,"journal":{"name":"Proceedings of the 12th International Conference on Intelligent Systems: Theories and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128368721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Approach to Manage the Moroccan Public Drugs Supply Chain Using the Viable System Model","authors":"Nora Mouhib, Slimane Bah, A. Berrado","doi":"10.1145/3289402.3289516","DOIUrl":"https://doi.org/10.1145/3289402.3289516","url":null,"abstract":"The Moroccan public drugs supply chain is a complex system of interrelated entities involved in providing drugs to the public hospitals. The supply chain management is conducted by the Procurement Division. The procurement process is very challenging; in fact, the Division faces an enormous amount of complexity which affects its ability to manage the chain efficiently. The Viable System Model can help facing this complexity. It is a well-known model of cybernetic management that helps resolving managerial problems. It seeks the viability of any organization by diagnosing organizational problems as well as their subsequent redesign. This paper is a reflection on the usefulness of the VSM to diagnose and redesign the Procurement Division.1","PeriodicalId":199959,"journal":{"name":"Proceedings of the 12th International Conference on Intelligent Systems: Theories and Applications","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115006951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}