{"title":"Sentiment analysis on product reviews data using supervised learning: A comprehensive review of recent techniques","authors":"Wedjdane Nahili, Khaled Rezeg, O. Kazar","doi":"10.1145/3447568.3448513","DOIUrl":"https://doi.org/10.1145/3447568.3448513","url":null,"abstract":"With the availability of text data in various forms on social media platforms, text mining and sentiment analysis have received huge attention. The task of deriving information from this volume of data in order to extract knowledge is very complex and expensive because it is usually unstructured and contains noise. Recently, there is a growing need for implementing various approaches and models for efficiently processing this type of data and extracting useful information. This process is known as sentiment analysis, which includes: data gathering, data pre-processing, feature engineering and labelling, finally the application of various natural language processing and machine learning algorithms. This paper provides an overview of the most recent methods used in text mining and sentiment analysis along with their detailed description and a discussion of obtained results.CCS Concepts","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122508929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Kanzari, Wejden Abdallah, Rania Garrouch Ouardani
{"title":"A combined Ratio-Emotional Architecture to Model Agent Behavior in Emergency Situation","authors":"D. Kanzari, Wejden Abdallah, Rania Garrouch Ouardani","doi":"10.1145/3447568.3448532","DOIUrl":"https://doi.org/10.1145/3447568.3448532","url":null,"abstract":"Throughout our lives, we are dealing with panic situations and often we are constrained to make crucial decisions in a limited delay. Especially in case of crowd evacuation; where human lives risk to be damaged or even ended following a disaster such as fire, explosions, and floods. These recent years, crowd modelling have been increasingly proposed. Unluckily, most of these models miss the consideration of victims' emotions. This paper propose a combined rational and emotional archi-tecture to simulate human behaviors in emergencies. Specifically, we focus on the dominant emotions and personality based on the OCEAN and the OCC models. Our aim is to show the influence of these models of the human behavior in crises. Our architecture contains also a metric module that computes the distance between an agent and the emergency exits, the outputs of this module affect the intensity of the agent's emotions and accordingly the agent's behavior. To make our simulation more realistic, we use Fuzzy Logic to model agent's behavior changes in emergency.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131885176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method and a Tool for Commercial Performance Evaluation of a Company: The case of a \"Mobile Telephony Operator\"","authors":"Mahdia Azzouz, Saïda Boukhedouma, Z. Alimazighi","doi":"10.1145/3447568.3448523","DOIUrl":"https://doi.org/10.1145/3447568.3448523","url":null,"abstract":"In a mature and globalized economy, competition is putting margins of companies to the test, and customers are becoming increasingly expensive to conquer and keep. The easiest way to grow is to acquire more customers and retain them by offering them the highest possible level of satisfaction. Companies are then, forced to establish customer-centric strategies. In this paper, we are interested to the company performance through its customers (also called commercial performance). We propose a generic method for commercial performance evaluation; directed by the decision-makers needs and focused on three main axes relative to the customer perspective: customer's attraction, satisfaction and loyalty. These axes are defined by specific indicators, and are linked to increased revenue of the company and/or its market share. The evaluation of these indicators allows the estimation of the good (or bad) financial health of the company. We implemented the proposed method in a performance evaluation tool and applied it on the case study of a \"Mobile Operator\".","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115362672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Touahri, R. Maouedj, B. Berbaoui, M. Benmedjahed
{"title":"Study and Sizing of Stand-Alone Photovoltaic System Using PVsyst Software","authors":"T. Touahri, R. Maouedj, B. Berbaoui, M. Benmedjahed","doi":"10.1145/3447568.3448529","DOIUrl":"https://doi.org/10.1145/3447568.3448529","url":null,"abstract":"The use of photovoltaic (PV) system simulation software is very important to know the amount of electrical energy produced by the photoelectric system. In this paper we use the Pvsyst software for sizing and simulation of a stand-alone solar photovoltaic system. In this study we use the PVsys program for the design and evaluation of a stand-alone photovoltaic system in southwest Algeria. The design depends on the meteorological data and geographical location of the Adrar site (Latitude 27.52°N, Longitude 0.17°E, Altitude 279 and Albédo 0.20). According to the results of the simulation our system generates an energy of 1454 KWh / year, the use of solar energy to generate electricity reduces carbon dioxide emissions, which is beneficial to the environment.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125163616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal Specification of On-Chip Communications State Of The Art","authors":"Amina Zerdani, Fateh Boutekkouk, L. Derdouri","doi":"10.1145/3447568.3448543","DOIUrl":"https://doi.org/10.1145/3447568.3448543","url":null,"abstract":"These days Systems-on-Chip (SoCs) have developed impressively in term of performances, reliability and integration capacity that has caused the number of cores (IPs) on the same chip to grow.In fact, multiplying the core number of the same chip has led to communication problems with internal signals, and traditional buses have not been able to handle too many cores with too many signals. To resolve this problem of intra-communication between the components of a same chip, a new definition that is a direct consequence of the complexity of recent and future SoCs has been implemented, it is the Network on Chips (NoC). In this paper we present a state of the art on few formals methods that improve the specification of communication in Network on Chips according to their on-chip communication, the problems they address and the different languages they use.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"646 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122699379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two-Stages Intrusion Detection System Based On Hybrid Methods","authors":"Hanane Azzaoui, A. Boukhamla","doi":"10.1145/3447568.3448512","DOIUrl":"https://doi.org/10.1145/3447568.3448512","url":null,"abstract":"As network traffic grows on an almost a daily basis, attacks and intrusions will keep develop with it. Thus, countering network attacks will require more research on updated datasets. Therefore, Intrusion Detection Systems must follow the recent updates and keep evolving to be able to detect modern attacks. In this paper, we introduce a new two-stage hybrid IDS model using different classifiers to detect attacks from normal traffic. In the first stage, we binary classify traffic between Normal/Attack, while in the second stage we pass traffic records that have been classified as attacks to a second classifier, which will identify attack's type. We used CICIDS2017 dataset to validate our model, which contains the most up-to-date attacks such as DDoS and Web Attacks, along with the well-know NSL-KDD to prove our model further more. The proposed model reported a very promising results, high accuracy and detection rate with very low false positive rate.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130083023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Expert System for Fuzzy Server Failure Data Warehouse Analysis","authors":"Djamila Hammouche, K. Atif, Mourad Loukam","doi":"10.1145/3447568.3448511","DOIUrl":"https://doi.org/10.1145/3447568.3448511","url":null,"abstract":"The instinctive use of natural terms when interrogating the data warehouse by decision-makers encourages to be integrated into the queries made by the decision-makers during the data warehouse analysis phase. In this paper, we present an overview of works that have studied the use of vague words in decisional queries. And we propose a rule-based system that uses fuzzy logic for querying the server failure data warehouse. Some perspectives emerge from our work, namely: the enrichment of the current system with new terms and new rules.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114727327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quran content representation in NLP","authors":"Zineb Touati Hamad, Mohamed Ridda Laouar, Issam Bendib","doi":"10.1145/3447568.3448552","DOIUrl":"https://doi.org/10.1145/3447568.3448552","url":null,"abstract":"Word representation is a starting point for Natural Language Processing (NLP). These representations transform words into symbolic vectors of a given length that reveal the hidden linguistic and semantic similarities. This paper presents a study of the various word representation tools used for the content of the texts of the holy Quran in Arabic, which include the two main representation forms: Local representation and Distributed representation, with the aim of using them in different artificial intelligence subsets such as \"machine learning\" and \"deep learning\" algorithms that require NLP.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128086437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding the best between the column store and row store Databases","authors":"Hichem Chaalal, Mostefa Hamdani, H. Belbachir","doi":"10.1145/3447568.3448548","DOIUrl":"https://doi.org/10.1145/3447568.3448548","url":null,"abstract":"Row store databases are unavoidable to manage data in Information Systems. However, Web growth and consumer high-connectivity generate incredible amount of data and change ways to manage it. In a matter of fact, traditional Row Stores hardly satisfy new application needs they are faced with, especially for OLAP data processing and BI. Column Stores became to be an answer to this problematic but in a restricted area of features. In this perspective, we propose a deep study that compares column stores and row stores databases to get an answer of the real impact of the physical design of column stores and row stores on the queries response, on small or big volume of data by using the TPCH benchmark in a unique centralized environment.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"333 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134100424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Dabou, Abderrezzaq Ziane, A. Bouraiou, N. Sahouane, NECAIBIA Ammar, S. Khelifi, Abdelkarim Rouabhia
{"title":"A PV-UPS Developed For The Monitoring Of PV Systems","authors":"R. Dabou, Abderrezzaq Ziane, A. Bouraiou, N. Sahouane, NECAIBIA Ammar, S. Khelifi, Abdelkarim Rouabhia","doi":"10.1145/3447568.3448528","DOIUrl":"https://doi.org/10.1145/3447568.3448528","url":null,"abstract":"The monitoring systems is an important task for ensuring the reliability and stability of power generation systems operation like renewable and sustainable sources. In this research work, a PV-uninterruptible power supply is developed for monitoring and evaluating the performance of PV systems in renewable energy research unit in the Saharan region (URERMS) Adrar. This PV-UPS contain a desktop PC UPS powered by the MPPT charge controller to extract the maximum power of the PV panels. AB@The sizing procedure and the used data acquisition system to monitor the electrical parameters of this PV-UPS are detailed.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133167379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}