{"title":"Arabic Dialect Identification in Social Media","authors":"Reem AlYami, Rabeah Alzaidy","doi":"10.1109/ICCAIS48893.2020.9096847","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096847","url":null,"abstract":"PURPOSE/AIM & BACKGROUNDAlthough the Arabic language is spoken in twenty-two countries by more than 250 million speakers, it is still considered by Natural Language Processing NLP practitioners as a low resource language. Formal sources of Arabic texts are typically written in Modern Standard (or Written) Arabic (MSA), which is a form that is used in formal writing and taught in schools to Arabic speakers. However, informal communication among Arabic speakers is through informal local diglossic dialects. A diglossic language is one where the speakers of the same language have varying dialects. In Arabic, there are multiple dialects in different regions of the Arab world: Gulf, Levantine and North Africa. Users commonly communicate in social media using their local dialect rather than the formal MSA. This introduces a core NLP problem for Arabic, which is dialect identification. It is essential to identify the specific dialect prior to performing tasks such as parsing, tokenizing and other downstream tasks such as semantic inferences. Processing massive amounts of data written in these local dialects requires this identification step to improve accuracies, especially for automatic text comprehension tasks. Although Arabic dialects share a majority of common words, it is not uncommon for the same word to have different meanings across dialects. In addition to improving NLP task accuracies, Arabic Dialect Identification ADI enables a finer-grained demographic identification for mining texts related to consumer reports, health forums, entertainment and tourism reviews, and many others which ultimately lead to improved services for each demographic.The problem of ADI has been addressed by several studies such as (Al-Walaie & Khan, 2017), and (Harrat et al., 2019). Some works focus mainly on curating data sets for the problem such as the Sham dataset proposed by (Abu Kwaik et al., 2018).In this work we focus on both tasks: we curate an Arabic dialect dataset for two variants of Arabic (Saudi Arabian and Egyptian) and we train supervised machine learning models to address the identification task.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128998215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Juan Carlos Angeles Ceron, Laura Jaideny Perez Gomez, H. Ceballos, Franciso J. Cantu-Ortiz
{"title":"Twitter Data Analysis on the Topic: Tec de Monterrey","authors":"Juan Carlos Angeles Ceron, Laura Jaideny Perez Gomez, H. Ceballos, Franciso J. Cantu-Ortiz","doi":"10.1109/ICCAIS48893.2020.9096806","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096806","url":null,"abstract":"The active population in social networks has been increasing during the last decade. A large part of this population obtains information through these networks, replacing traditional media such as the newspaper or television news. Therefore, institutions from various fields have found an informational and advertising resource on social networks, in addition, using them as a means to interact and keep in touch with their community. In particular, educational institutions use social networks as a tool for direct communication, as well as a means to improve their brand. For this reason, an evaluation of the publications made on Twitter on the topic: Tecnologico de Monterrey was carried out. This evaluation implied the realization of an analysis of the vocabulary used within each publication and the impact that this has on the reactions made from the social network by the community, with the objective of identifying the characteristics that the published contents with more reactions have in common. This analysis may be beneficial for this and other educational institutions, as it will provide them with information that allows them to improve their image, generate greater reach and get to know their audience better.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132438227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an artificial intelligence strategy for higher education in Saudi Arabia","authors":"M. Elhajji, Abdulaziz S. Alsayyari, A. Alblawi","doi":"10.1109/ICCAIS48893.2020.9096833","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096833","url":null,"abstract":"The implementation of information and communication technologies (ICT) in the classroom had resulted in revolutionizing the methods of teaching and learning, where the emergence of artificial intelligence (AI) made the use of such technologies in higher education institutes more practical. This conceptual paper presents a prediction for strategy of using artificial intelligence in higher education for promoting learning outcomes and educational quality. The paper addresses AI-based learning by trying to analyze and investigate how AI can be effectively exploited and adopted by universities in the Kingdom of Saudi Arabia in accordance to the Kingdom's 2030 vision. Furthermore, this paper concentrates on challenges of teaching/learning process and benefits in the adoption of this old/new technology, empowering academic committee to an AI- powered context. In summary, a framework consolidated by a set of recommendations is presented in this work.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127244150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Segmentation of Brain Stroke Lesions using Marker-based Algorithms in CT images","authors":"Dr. Yousif Mohamed Yousif Abdallah","doi":"10.1109/ICCAIS48893.2020.9096866","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096866","url":null,"abstract":"The computed tomography has huge role in the assessment of the hemorrhagic lesions of the brain. Physicians widely use CT to delineate the size and magnitude of the bleeding. In the medical image processing, the separation and detection of the objects is very crucial issue. The water-based segmentation (subdivision) is an approach that use to detect the closely contact margins tissues within the images. Manual outlining of the stroke in CT images considers as subjective operation that takes long time with less accuracy. In this study, the lesions were detected firstly and followed by Contrast augmentation and Segmentation. The suggested technique was evaluated to endorse its achievability and efficiency. These techniques attained 0.97 + 0.01, 0.98 + 0.02 and 0.991 + 0.01 (P = 0.001) for sensitivity, specificity and operating curve analysis, respectively. The analysis of the results images showed that the proposed approach is effective in detecting of the smaller lesions which might missed by using other segmentation methods. (Abstract)","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128573458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Copyright Protection for Online Text Information : Using Watermarking and Cryptography","authors":"N. Mir, Mohammad A. U. Khan","doi":"10.1109/ICCAIS48893.2020.9096817","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096817","url":null,"abstract":"Information and security are interdependent elements. Information security has evolved to be a matter of global interest and to achieve this; it requires tools, policies and assurance of technologies against any relevant security risks. Internet influx while providing a flexible means of sharing the online information economically has rapidly attracted countless writers. Text being an important constituent of online information sharing, creates a huge demand of intellectual copyright protection of text and web itself. Various visible watermarking techniques have been studied for text documents but few for web-based text. In this paper, web page watermarking and cryptography for online content copyrights protection is proposed utilizing the semantic and syntactic rules using HTML (Hypertext Markup Language) and is tested for English and Arabic languages.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125285376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Where to Eat? An Automatic Summarization System for Opinions in Restaurant Reviews","authors":"Hessah Alsaaran, Waad Alowain, Duaa Aldrees, Shahad Almadhi, Wadha Alqahtani","doi":"10.1109/ICCAIS48893.2020.9096724","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096724","url":null,"abstract":"Technology has been an essential part of our lives. When going out to a new restaurant or cafe, people usually use websites or applications to lookup nearby places and then select one based on average rating. However, the average rating is sometimes not enough to predict the quality of the restaurant as people have different perspectives and priorities when evaluating a restaurant. In this paper, a summarization system for opinions in restaurant reviews is proposed. The system is a helpful tool for users on-the-go to help them make better judgments about the quality of a restaurant while saving their time. This is done by automatically and quickly providing the users with a summary of the opinions in the restaurant’s reviews. The proposed summarization system has been implemented in a mobile location-based application for Arabic restaurant reviews and it achieved a high usability score.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125991535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}