{"title":"DeepD_DrugC: Deep and distributed workflow to predict drug- candidates","authors":"Karima Sid, Soumia Zertal, Chaker Mezioud","doi":"10.1109/PAIS56586.2022.9946898","DOIUrl":"https://doi.org/10.1109/PAIS56586.2022.9946898","url":null,"abstract":"The applications of computational tools at various stages of drug discovery is one of the most active axes of research. Virtual Screening (VS) is a very common application, which aims to screen and analyze large chemical libraries using algorithms and models to extract drug-candidates that can bind to therapeutic targets. Machine learning (ML) techniques are widely applied as a tool to analyze the chemical libraries in ligand-based virtual screening (LBVS). Deep learning (DL) is a novel mode of machine learning that provides several new architectures primarily based on classical Artificial Neural Network algorithms, but with many hidden layers to learn features with multiple levels of abstraction. Recently, chemical libraries are identified as Big Data, due to their huge size, the variety of data, and the speed at which they are created, streamed and aggregated. In this context, we need advanced tools to handle and treat this type of data. Apache Spark is the most widely used engine for big data processing, with many improvements that make it more suitable for virtual screening analysis. In this work, we propose a novel workflow named DeepD_ DrugC based on Spark and Deep Neural Network model implemented with Deeplearning4j (DL4J) to improve the prediction results in LBVS. To evaluate the workflow, we suggest a process to create training datasets using the PubChem Bioassay database for cancer disease. The evaluation results show a good precision more than 93%, with acceptable scaling behavior.","PeriodicalId":266229,"journal":{"name":"2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122905952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Virtual Clustering for Data Dissemination in Vehicular Fog Computing","authors":"Sahraoui Abdelatif, Abdelhak Ghozlane, P. Roose","doi":"10.1109/PAIS56586.2022.9946907","DOIUrl":"https://doi.org/10.1109/PAIS56586.2022.9946907","url":null,"abstract":"The concept of data dissemination has become an inherent problem with Vehicular Ad hoc NETwork (VANET), especially when traffic jams occur. The main idea of data dissem-ination is how to handle a huge amount of traffic data collected in the vicinity. Therefore, different strategies have been proposed by the research community in this field to solve this problem, including routing protocols, virtual machines, data aggregation, clustering and so on. In this paper, a virtual cluster strategy is proposed to select candidate vehicles acting as getaways in the network. In particular, the formation of the virtual clusters is based on dominant set algorithm to create virtual network for data dissemination. In the evaluation phase, the simulation results demonstrate the effectiveness of the proposed clustering strategy to significantly improve network performances.","PeriodicalId":266229,"journal":{"name":"2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124846971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Testing Cyber-Physical Production System: Test Methods Categorization and dataset","authors":"Zina Oudina, M. Derdour, Mohammed Mounir Bouhamed","doi":"10.1109/PAIS56586.2022.9946868","DOIUrl":"https://doi.org/10.1109/PAIS56586.2022.9946868","url":null,"abstract":"Developing High-confidence Cyber-Physical Production System (CPPS) is essential to ensure system efficacy and safety. Engineering requirements for CPPS is quite tricky because of system heterogeneity. Moreover, system bugs and malfunctions may occur, requiring a test to ensure the robustness of CPPSs. There are several kinds of CPPS test Methods in research. This work aims to categorize test methods of cyber-physical production systems in research. We follow a Systematic Lit-erature Review (SLR) method to review existing research. We synthesize a dataset of 220 papers published from 2006 until 2021 seeking to survey and give structured research in the area of the CPPS test. We categorized CPPS test methods by presenting traditional methods of CPPS tests, such as formal techniques and simulation, in addition to the most used methods as testbed and containerization. We also presented used tools for testing CPPSs, and the objectives of testing CPPS.","PeriodicalId":266229,"journal":{"name":"2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123608987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keeping the Privacy and the Security of the Knowledge Graph Completion Using Blockchain Technology","authors":"A. Djeddai, Rofaida Khemaissia","doi":"10.1109/PAIS56586.2022.9946869","DOIUrl":"https://doi.org/10.1109/PAIS56586.2022.9946869","url":null,"abstract":"Nowadays, Knowledge Graph becomes very important for representing and reasoning about knowledge data. Its name was known from Google knowledge graphs in 2012. Many IA applications have used it for managing the various types of knowledge data and especially the personal data. Therefore, ensuring security, trust, integrity and privacy of its content was the goal of the AI researchers. KG completion is one of the most methods that its aim is completing the KG with missing true triples. In this paper, we propose to use blockchain technology to keep the security and privacy of the KG completion based on KG embedding that embed relations and entities in continues vectors spaces. The completion tasks can benefit from the decentralization feature of BC. Our design proposes to use an offchain storage in order to improve the scalability of BC network that contains only critical KG embedding data. The implementation and the evaluation have used Hyperledger Fabric (HF), MangoDB and several KG completion datasets.","PeriodicalId":266229,"journal":{"name":"2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129051486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of parallel clustering algorithms based on vertical scaling platforms for big data","authors":"Hadjir Zemmouri, Said Labed, Akram Kout","doi":"10.1109/PAIS56586.2022.9946663","DOIUrl":"https://doi.org/10.1109/PAIS56586.2022.9946663","url":null,"abstract":"Clustering, or cluster analysis, is an important unsupervised task in machine learning that determines how the observed data naturally clusters. Many efficient traditional clustering methods based on different behaviours, such as partitioning’ hierarchical, grid, model, and density based, have been proposed in recent decades. However, clustering itself is considered an NP-hard problem, and it becomes more challenging when the clustered data is large. The classical clustering techniques cannot handle big data problems due to their large volume, fast generation, significant heterogeneity and complexity. Therefore, more effective, flexible, and efficient clustering approaches are required. Recently, the parallel and distributed computing concepts gives birth to the parallel clustering algorithms. Nowadays, the researches focus on scalable clustering methods based on different acceleration platforms to deal with big data problems. The acceleration platforms can be classified into horizontal and vertical-scaling platforms. In this paper we present a recent overview of the latest parallel and distributed clustering algorithms based on vertical scaling platforms. Otherwise, the paper gives a discussion that will be useful for researchers to propose more effective and efficient algorithms for Big Data clustering.","PeriodicalId":266229,"journal":{"name":"2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127089179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a biometric authentication platform using voice recognition","authors":"Abdelmadjid Benmachiche, Bouzata Hadjar, Ines Boutabia, Ali Abdelatif Betouil, Majda Maâtallah, Amina Makhlouf","doi":"10.1109/PAIS56586.2022.9946890","DOIUrl":"https://doi.org/10.1109/PAIS56586.2022.9946890","url":null,"abstract":"Nowadays, several areas have turned to speech recognition, as they have witnessed its efficiency in maintaining the privacy of users and facilitating access and use of numerous applications, systems even establishments. Our work revolves around recognizing a form of speech from a single word, where the main objective is to identify as accurately as possible a set of predefined words from brief audio clips. a Speech Commands dataset consisting of 65 000 one-second-long statements of 30 short term, is applied. We use a Convolutional Neural Network (CNN) to classify representatives with two-dimensional convolutions on the audio waveform. Unlike many classic techniques with critical feature engineering, we benefit from the power of deep learning to comprehend the feature representation while training. The prototype achieves an acceptable accuracy rate on the validation set. Our model has provided satisfactory results during training with high accuracy compared to its pre-descendants. Still, room for errors exists in words exceeding the range of the training data and especially noisy samples.","PeriodicalId":266229,"journal":{"name":"2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127126010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RFID and NFC authentication protocol for securing a payment transaction","authors":"Samir Chabbi, Chaouki Araar","doi":"10.1109/PAIS56586.2022.9946661","DOIUrl":"https://doi.org/10.1109/PAIS56586.2022.9946661","url":null,"abstract":"RFID (Radio Frequency Identification) is a technology that permits to identify objects with a radio frequency field for few meters distance. It is applied in several fields such as traceability, logistics, military, security, healthcare, library, etc. Its successor NFC (Near Field Communication)), on the contrary, is used to transmit messages at a short distance (less than 10 Cent.). Recently, NFC is frequently used for payment transaction using ATM and smartphone both equipped of this technology. Unfortunately, the information transferred with this technology during a payment transaction can be an objectif for threads to steale personal and privacy data that concern a user. This paper introduces a new method for payment transaction that combines RFID and NFC. This process which uses an authentication protocol is proposed in order to (1) secure the payment transaction using an Automated Teller Machine (ATM) and a smartphone both equipped with these two technologies, (2) minimize the waiting chain in front of the ATM for agents using NFC by minimizing the transaction time. To evaluate the performance of our proposal, we tested its security against few attacks. A security and performance comparison of our technique with few recent and important methods is performed and shows the effectiveness of the solution.","PeriodicalId":266229,"journal":{"name":"2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126976551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Virtual Environment To Support Collaborative Medical Diagnosis","authors":"Asma Merabet, Mohamed Abderraouf Ferradji","doi":"10.1109/PAIS56586.2022.9946910","DOIUrl":"https://doi.org/10.1109/PAIS56586.2022.9946910","url":null,"abstract":"Since the start of coronavirus pandemic (COVID-19), remote collaboration is increasingly becoming an important requirement in the healthcare sector. This is due to the fact that new information and communication technologies (ITC) can offer more flexibility in time and space. Therefore, we present in this paper a virtual environment that aims to support remote collaborative medical diagnosis. This proposal is mainly based on cognitive studies carried out in the medical field. Moreover, to support medical decision-making, we have integrated an intelligent system into our virtual environment using deep learning technologies.","PeriodicalId":266229,"journal":{"name":"2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132373237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine learning based cryptanalysis techniques: perspectives, challenges and future directions","authors":"Zakaria Tolba, M. Derdour, N. H. Dehimi","doi":"10.1109/PAIS56586.2022.9946889","DOIUrl":"https://doi.org/10.1109/PAIS56586.2022.9946889","url":null,"abstract":"The field of cryptanalysis has lately witnessed considerable advancement due to the need for artificial intelligence technologies to simplify the complicated task of vulnerability assessments for cryptographic algorithms. The use of well-known tools such as machine learning and deep learning has piqued the interest of researchers and experts in the field because it has supported research work in discovering great knowledge on the strong and weak points of cryptographic techniques while ushering in the era of automated and AI-driven cryptanalysis.Despite the positive solutions obtained through using DL in the realm of cryptanalysis, it is not without drawbacks. This paper emphasizes the issues encountered when using ML and DL in cryptanalysis as well as new paths of DL with the advent of the quantum neural network approach, which can provide better answers and hence the relevant state of the art.","PeriodicalId":266229,"journal":{"name":"2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS)","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121472100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of the influence of RGB and Lab color spaces on the performance of multifocus image fusion techniques","authors":"Sarra Babahenini, F. Charif, A. Taleb-Ahmed","doi":"10.1109/PAIS56586.2022.9946904","DOIUrl":"https://doi.org/10.1109/PAIS56586.2022.9946904","url":null,"abstract":"In order to create a single image, multifocus image fusion brings together the important details and focused areas of the input multifocus images. Diverse camera depths of the field are used to capture these multi-focus images. Spatial domain focusing measurement has been used to introduce various multifocus image fusion algorithms. In this paper, we focus on the implementation of three multifocus color image fusion techniques: salience detection based multifocus image fusion (SDMF), salience detection using the technique of contourlet transformation (CT) and multi-scale guided filter (MGF) based fusion technique, using various color space models to improve the fusion result. The main objective is to examine whether the effects of R.G.B and L.A.B spaces have an influence on their recognition rate. We evaluated the performance of these techniques based on SSIM metrics, $mathbf{Q}^{(mathbf{AB} / mathbf{F})}, mathbf{L}^{(mathbf{AB} / mathbf{F})} mathbf{N}^{(mathbf{AB} / mathbf{F})}$ and FMI. The experimental results on the test set show that the RGB space performs better than the LAB space.","PeriodicalId":266229,"journal":{"name":"2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116244258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}