首页 > 最新文献

Proceedings of the 3rd International Conference on Networking, Information Systems & Security最新文献

英文 中文
An improved modeling method for profile-based personalized search 一种改进的基于个人资料的个性化搜索建模方法
Anas El-Ansari, A. B. Hssane, M. Saadi
A Personalized search system aims to provide tailor-made results for each user's query according to his preferences. Building such a system depends mainly on creating profiles that represent real user interests. In this paper, we present a method for modeling users and creating accurate profiles by implicitly tracking and collecting user-browsing data. Furthermore, we examine techniques to enhance profile accuracy through combining multiple browsing data sources, distinguishing important concepts from irrelevant ones in a user profile, and the concept levels required from a reference ontology to describe user's interests.
个性化搜索系统旨在根据每个用户的偏好为其查询提供量身定制的结果。构建这样一个系统主要依赖于创建代表真实用户兴趣的配置文件。在本文中,我们提出了一种通过隐式跟踪和收集用户浏览数据来建模用户并创建准确配置文件的方法。此外,我们研究了通过结合多个浏览数据源、区分用户配置文件中的重要概念和不相关概念以及从参考本体中描述用户兴趣所需的概念级别来提高配置文件准确性的技术。
{"title":"An improved modeling method for profile-based personalized search","authors":"Anas El-Ansari, A. B. Hssane, M. Saadi","doi":"10.1145/3386723.3387874","DOIUrl":"https://doi.org/10.1145/3386723.3387874","url":null,"abstract":"A Personalized search system aims to provide tailor-made results for each user's query according to his preferences. Building such a system depends mainly on creating profiles that represent real user interests. In this paper, we present a method for modeling users and creating accurate profiles by implicitly tracking and collecting user-browsing data. Furthermore, we examine techniques to enhance profile accuracy through combining multiple browsing data sources, distinguishing important concepts from irrelevant ones in a user profile, and the concept levels required from a reference ontology to describe user's interests.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123847045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
CSMAS
Youssef Tounsi, H. Anoun, L. Hassouni
Credit risk is one of the main risks facing banks and credit institutions, with the current progress in machine learning, artificial intelligence and big data. Recent research has proposed several systems for improving credit rating. In this paper, a new scalable credit scoring multi-agent system called "CSMAS" is introduced for the prediction of problems in data mining of credit scoring domain. This engine is built using a seven-layer multi-agent system architecture to generate a data mining process based on the coordination of intelligent agents. CSMAS performance is based on preprocessing and data forecasting. The first layer is designed to retrieve any data from various core banking systems, payment systems, credit Bureaus and external databases and data sources and to store it in big data platform. The second layer is devoted to three different subtasks; feature engineering, pre-processing data and integrating diverse datasets. While the third layer is dedicated to dealing with missing Values and treating outliers. In the fourth layer, the techniques of dimensionality reduction are used to reduce the number of features in the original set of features. The fifth layer is dedicated to build a model using the new generation of Gradient Boosting Algorithms (XGBoost, LightGBM and CatBoost) and make predictions. The sixth layer is designed for the model's evaluation. The seventh layer is made to perform the rating of new credit applicants. The performance of CSMAS is assessed using a large dataset of Home Credit Default Risk from Kaggle Challenge (307511 records) to evaluate the risk of a loan applicant as a major problem for banks. The results show that the CSMAS give relevant results. Therefore, the results indicated that the CSMAS can be further employed as a reliable tool to predict more complicated case in credit scoring.
{"title":"CSMAS","authors":"Youssef Tounsi, H. Anoun, L. Hassouni","doi":"10.1145/3386723.3387851","DOIUrl":"https://doi.org/10.1145/3386723.3387851","url":null,"abstract":"Credit risk is one of the main risks facing banks and credit institutions, with the current progress in machine learning, artificial intelligence and big data. Recent research has proposed several systems for improving credit rating. In this paper, a new scalable credit scoring multi-agent system called \"CSMAS\" is introduced for the prediction of problems in data mining of credit scoring domain. This engine is built using a seven-layer multi-agent system architecture to generate a data mining process based on the coordination of intelligent agents. CSMAS performance is based on preprocessing and data forecasting. The first layer is designed to retrieve any data from various core banking systems, payment systems, credit Bureaus and external databases and data sources and to store it in big data platform. The second layer is devoted to three different subtasks; feature engineering, pre-processing data and integrating diverse datasets. While the third layer is dedicated to dealing with missing Values and treating outliers. In the fourth layer, the techniques of dimensionality reduction are used to reduce the number of features in the original set of features. The fifth layer is dedicated to build a model using the new generation of Gradient Boosting Algorithms (XGBoost, LightGBM and CatBoost) and make predictions. The sixth layer is designed for the model's evaluation. The seventh layer is made to perform the rating of new credit applicants. The performance of CSMAS is assessed using a large dataset of Home Credit Default Risk from Kaggle Challenge (307511 records) to evaluate the risk of a loan applicant as a major problem for banks. The results show that the CSMAS give relevant results. Therefore, the results indicated that the CSMAS can be further employed as a reliable tool to predict more complicated case in credit scoring.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123874488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Big Data security and privacy techniques 大数据安全和隐私技术
Lamia El Haourani, A. A. E. Kalam, A. A. Ouahman
Nowadays Information technologies have caused irreversible changes in many parts of our society. This development reached its climax with the advent of 'Big Data', whose economic and social benefits should not be neglected. However, 'Big Data' inherently threatens security as well as the founding pillars of personal data law, and for this reason many techniques are invented in parallel with the development of big data. in this article we will present what Big Data is, the challenges it faces in terms of privacy and security, as well as privacy and security techniques for Big Data at the level of anonymization encryption and Differential Privacy, by describing, analyzing, and comparing these methods
如今,信息技术已经在我们社会的许多方面造成了不可逆转的变化。随着“大数据”的出现,这一发展达到了高潮,其经济和社会效益不容忽视。然而,“大数据”本质上威胁着安全以及个人数据法的基础支柱,因此,许多技术是在大数据发展的同时发明的。在本文中,我们将通过描述、分析和比较这些方法,介绍大数据是什么,它在隐私和安全方面面临的挑战,以及在匿名加密和差分隐私层面上的大数据隐私和安全技术
{"title":"Big Data security and privacy techniques","authors":"Lamia El Haourani, A. A. E. Kalam, A. A. Ouahman","doi":"10.1145/3386723.3387841","DOIUrl":"https://doi.org/10.1145/3386723.3387841","url":null,"abstract":"Nowadays Information technologies have caused irreversible changes in many parts of our society. This development reached its climax with the advent of 'Big Data', whose economic and social benefits should not be neglected. However, 'Big Data' inherently threatens security as well as the founding pillars of personal data law, and for this reason many techniques are invented in parallel with the development of big data. in this article we will present what Big Data is, the challenges it faces in terms of privacy and security, as well as privacy and security techniques for Big Data at the level of anonymization encryption and Differential Privacy, by describing, analyzing, and comparing these methods","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"98 13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128001537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Practical Approach to Urban Crime Prevention in Developing Nations 发展中国家预防城市犯罪的实践方法
R. Ikuesan, S. Ganiyu, Muhammad Umar Majigi, Y. D. Opaluwa, H. Venter
The growing surge in urban-crime rate represents a global complex endemic that is beyond the immediate capability of the policing apparatus of nations. This trend is particularly prevalent in urban cities in developing nations, where crime-rate exhibits dynamic tendencies in contrast to the static policing apparatus being deployed. Thus, the policing apparatus in urban cities in developing nations often play catchups with crime; a phenomenon that further elicits crime complexity. As a way to ameliorate this societal menace, this study evaluates probable practical approaches that can be integrated into the modern policing modality in developing nations. The approach considers the development of a dynamic surveillance management system that considers the contextual peculiarity of developing nations. Through the use of a self-administered measurement instrument from Police respondents in developing nations, the implementation feasibility and the probable effectiveness of the proposition will be further evaluated. From the preliminary result from sampled Police officers, this practical approach could present a complementary paradigm that can leverage modern technology towards an effective urban-policing mechanism. Furthermore, this approach presents modalities for the maximization of the human capacity of the Policing service, as well as the management of policing response-rate in developing nations.
城市犯罪率的不断上升代表着一种复杂的全球性流行病,超出了各国警务机构的直接能力。这一趋势在发展中国家的城市尤其普遍,那里的犯罪率呈现出动态趋势,与部署的静态警务机构形成对比。因此,在发展中国家的城市里,警察机构经常追赶犯罪;这一现象进一步引发了犯罪的复杂性。作为一种改善这种社会威胁的方法,本研究评估了可以融入发展中国家现代警务模式的可行方法。该方法考虑了动态监测管理系统的发展,该系统考虑了发展中国家的背景特点。通过使用发展中国家警察受访者自行管理的测量工具,将进一步评估该提议的实施可行性和可能的有效性。从抽样警察的初步结果来看,这种实用的方法可以提供一种补充范例,可以利用现代技术建立有效的城市警务机制。此外,这种方法提出了在发展中国家最大限度地发挥警务服务人员能力以及管理警务响应率的模式。
{"title":"Practical Approach to Urban Crime Prevention in Developing Nations","authors":"R. Ikuesan, S. Ganiyu, Muhammad Umar Majigi, Y. D. Opaluwa, H. Venter","doi":"10.1145/3386723.3387867","DOIUrl":"https://doi.org/10.1145/3386723.3387867","url":null,"abstract":"The growing surge in urban-crime rate represents a global complex endemic that is beyond the immediate capability of the policing apparatus of nations. This trend is particularly prevalent in urban cities in developing nations, where crime-rate exhibits dynamic tendencies in contrast to the static policing apparatus being deployed. Thus, the policing apparatus in urban cities in developing nations often play catchups with crime; a phenomenon that further elicits crime complexity. As a way to ameliorate this societal menace, this study evaluates probable practical approaches that can be integrated into the modern policing modality in developing nations. The approach considers the development of a dynamic surveillance management system that considers the contextual peculiarity of developing nations. Through the use of a self-administered measurement instrument from Police respondents in developing nations, the implementation feasibility and the probable effectiveness of the proposition will be further evaluated. From the preliminary result from sampled Police officers, this practical approach could present a complementary paradigm that can leverage modern technology towards an effective urban-policing mechanism. Furthermore, this approach presents modalities for the maximization of the human capacity of the Policing service, as well as the management of policing response-rate in developing nations.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117196126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Mobile Cloud Computing: Architecture, Advantages and Security Issues 移动云计算:架构、优势和安全问题
Hadjer Fellah, Chaker Mezioud, M. Batouche
In the last few years, Mobile Cloud Computing has become an emerging area of research due to the important developments in mobile networks and Cloud Computing. Computing power and data storage are being moved away from mobile devices to be performed on Cloud servers in order to overcome mobile devices' limitations. In spite of this development, it still faces many challenges namely low bandwidth, energy consumption, and especially security threat. Furthermore, the nature of mobile devices and their operating systems make Mobile Cloud systems more susceptible to malicious attacks and the distributed storage in the Cloud may cause privacy issues. Security and privacy are being then arguably challenged facing its embracement. This paper overviews the Mobile Cloud Computing environment and systems. We focus on the main security issues related to the mobile device, networks and Cloud Computing.
在过去的几年中,由于移动网络和云计算的重要发展,移动云计算已经成为一个新兴的研究领域。为了克服移动设备的局限性,计算能力和数据存储正在从移动设备转移到云服务器上执行。尽管有了这样的发展,但它仍然面临着带宽低、能耗大、特别是安全威胁等诸多挑战。此外,移动设备及其操作系统的性质使移动云系统更容易受到恶意攻击,云中的分布式存储可能会导致隐私问题。因此,安全与隐私正面临着它的普及所带来的挑战。本文概述了移动云计算环境和系统。我们关注与移动设备、网络和云计算相关的主要安全问题。
{"title":"Mobile Cloud Computing: Architecture, Advantages and Security Issues","authors":"Hadjer Fellah, Chaker Mezioud, M. Batouche","doi":"10.1145/3386723.3387880","DOIUrl":"https://doi.org/10.1145/3386723.3387880","url":null,"abstract":"In the last few years, Mobile Cloud Computing has become an emerging area of research due to the important developments in mobile networks and Cloud Computing. Computing power and data storage are being moved away from mobile devices to be performed on Cloud servers in order to overcome mobile devices' limitations. In spite of this development, it still faces many challenges namely low bandwidth, energy consumption, and especially security threat. Furthermore, the nature of mobile devices and their operating systems make Mobile Cloud systems more susceptible to malicious attacks and the distributed storage in the Cloud may cause privacy issues. Security and privacy are being then arguably challenged facing its embracement. This paper overviews the Mobile Cloud Computing environment and systems. We focus on the main security issues related to the mobile device, networks and Cloud Computing.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121354088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IT Security and IT Governance Alignment: A Review IT安全和IT治理一致性:回顾
Norli Shariffuddin, A. Mohamed
This paper review and align IT Security (ITS) and IT Governance (ITG) that would address ITS strategic and its operational issues. These issues if not addressed accordingly, would lead to a financial aftermath that would put the business at risk and jeopardize the organization's sustainability in both short and long run. There have been studies that show, the lack of technical controls, lack of solid governance and improper oversight at the enterprise stakeholders' level would result to disastrous events. Thus, ITS and ITG has to go hand in hand in order to fortify the security posture of an enterprise. The goal is to roll out an ITS program that would have the best of ITG and ITS best practices. Rather than reinventing the wheel, the affected managers or organizations can adopt and adapt the existing frameworks available easily. There are a few common frameworks available, however there is lack of essential elements especially on ITS management and technical controls. This paper will look into these common ITS frameworks and lists its shortcomings to further understand the need for a better framework. In addition, frameworks that govern ITG will also be studied looking at its advantages and disadvantages. Thus, elements from ITS frameworks will be identified, analyzed and certain aspects extracted as common themes. The analysis shows, the themes depicted are strong management support, fit for purpose context that suits the organization, essential risk management, clearly defined of roles and responsibilities, the importance of training and awareness and the implementation of a quick win strategy. These five themes will be put into ITG practice blocks with respect to the Structure, Process and Relational Mechanisms that spans across People, Process and Technology domains. Finally, the construct named NORLI is proposed to align both ITG and ITS. In the future, NORLI will be tested for its ease of use, effectiveness and efficiency.
本文回顾并调整了IT安全(ITS)和IT治理(ITG),它们将解决ITS的战略和操作问题。这些问题如果没有得到相应的解决,将导致财务后果,使业务处于风险之中,并危及组织的短期和长期可持续性。有研究表明,在企业利益相关者层面,缺乏技术控制,缺乏坚实的治理和不当的监督会导致灾难性事件。因此,为了加强企业的安全态势,ITS和ITG必须携手并进。目标是推出一个具有ITG和ITS最佳实践的最佳ITS程序。受影响的管理人员或组织可以轻松地采用和调整现有的框架,而不是重新发明轮子。有一些通用框架可用,但是缺乏基本元素,特别是在ITS管理和技术控制方面。本文将研究这些常见的ITS框架,并列出其缺点,以进一步了解对更好框架的需求。此外,还将研究管理ITG的框架,以了解其优点和缺点。因此,将识别、分析ITS框架中的元素,并提取某些方面作为共同主题。分析表明,所描述的主题是强有力的管理支持,适合组织的目的背景,必要的风险管理,明确定义的角色和责任,培训和意识的重要性以及实施快速取胜战略。这五个主题将放在ITG实践块中,涉及跨越人员、过程和技术领域的结构、过程和关系机制。最后,提出了将ITG和ITS结合起来的NORLI结构。在未来,NORLI将测试其易用性,有效性和效率。
{"title":"IT Security and IT Governance Alignment: A Review","authors":"Norli Shariffuddin, A. Mohamed","doi":"10.1145/3386723.3387843","DOIUrl":"https://doi.org/10.1145/3386723.3387843","url":null,"abstract":"This paper review and align IT Security (ITS) and IT Governance (ITG) that would address ITS strategic and its operational issues. These issues if not addressed accordingly, would lead to a financial aftermath that would put the business at risk and jeopardize the organization's sustainability in both short and long run. There have been studies that show, the lack of technical controls, lack of solid governance and improper oversight at the enterprise stakeholders' level would result to disastrous events. Thus, ITS and ITG has to go hand in hand in order to fortify the security posture of an enterprise. The goal is to roll out an ITS program that would have the best of ITG and ITS best practices. Rather than reinventing the wheel, the affected managers or organizations can adopt and adapt the existing frameworks available easily. There are a few common frameworks available, however there is lack of essential elements especially on ITS management and technical controls. This paper will look into these common ITS frameworks and lists its shortcomings to further understand the need for a better framework. In addition, frameworks that govern ITG will also be studied looking at its advantages and disadvantages. Thus, elements from ITS frameworks will be identified, analyzed and certain aspects extracted as common themes. The analysis shows, the themes depicted are strong management support, fit for purpose context that suits the organization, essential risk management, clearly defined of roles and responsibilities, the importance of training and awareness and the implementation of a quick win strategy. These five themes will be put into ITG practice blocks with respect to the Structure, Process and Relational Mechanisms that spans across People, Process and Technology domains. Finally, the construct named NORLI is proposed to align both ITG and ITS. In the future, NORLI will be tested for its ease of use, effectiveness and efficiency.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122823141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review on Cybersecurity: Challenges & Emerging Threats 网络安全:挑战与新兴威胁综述
A. Hussain, A. Mohamed, Suriyati Razali
In recent years the cybersecurity has evolved significantly in order to cater to the changes that occur within the cyberspace. Cybersecurity is the means by which a country or organization can utilize to protect its products and information that operate within the cyberspace. With this research study, the aim was to identify challenges to cybersecurity in aspects of governance, risk management, culture and awareness as well as emerging threats. Through analysis of 33 research articles we have defined the critical components of cybersecurity and the significance of challenges and emerging threats. We have also extracted some key factors that represent the state of cybersecurity in order to convey its necessity. From the analyzed data we have identified some key challenges that is critical to cybersecurity and classified the significance of emerging threats. Furthermore, the order of relevance has been detailed based on the perception of significance. The study yields the necessity for a more comprehensive approach to ensure cybersecurity, the challenges and emerging threats that we need to be aware of and how societal perception plays a part in ensuring cybersecurity.
近年来,为了适应网络空间内部发生的变化,网络安全已经发生了重大变化。网络安全是一个国家或组织用来保护其在网络空间内运行的产品和信息的手段。通过这项研究,旨在确定网络安全在治理、风险管理、文化和意识以及新出现的威胁方面面临的挑战。通过对33篇研究文章的分析,我们定义了网络安全的关键组成部分以及挑战和新兴威胁的重要性。我们还提取了一些代表网络安全状态的关键因素,以传达其必要性。从分析的数据中,我们确定了一些对网络安全至关重要的关键挑战,并对新兴威胁的重要性进行了分类。在此基础上,以意义感知为基础,对关联顺序进行了详细分析。该研究提出了一种更全面的方法来确保网络安全的必要性,我们需要意识到的挑战和新出现的威胁,以及社会认知如何在确保网络安全方面发挥作用。
{"title":"A Review on Cybersecurity: Challenges & Emerging Threats","authors":"A. Hussain, A. Mohamed, Suriyati Razali","doi":"10.1145/3386723.3387847","DOIUrl":"https://doi.org/10.1145/3386723.3387847","url":null,"abstract":"In recent years the cybersecurity has evolved significantly in order to cater to the changes that occur within the cyberspace. Cybersecurity is the means by which a country or organization can utilize to protect its products and information that operate within the cyberspace. With this research study, the aim was to identify challenges to cybersecurity in aspects of governance, risk management, culture and awareness as well as emerging threats. Through analysis of 33 research articles we have defined the critical components of cybersecurity and the significance of challenges and emerging threats. We have also extracted some key factors that represent the state of cybersecurity in order to convey its necessity. From the analyzed data we have identified some key challenges that is critical to cybersecurity and classified the significance of emerging threats. Furthermore, the order of relevance has been detailed based on the perception of significance. The study yields the necessity for a more comprehensive approach to ensure cybersecurity, the challenges and emerging threats that we need to be aware of and how societal perception plays a part in ensuring cybersecurity.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115421335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Towards a new approach to reduce the dropout rate in e-learning 探索降低网络学习辍学率的新途径
Ilham Dhaiouir, M. Ezziyyani, Mohamed Khaldi
MOOCs are currently facing a major problem, namely the decrease in the rate of certified at the end of a MOOC. The main cause of this problem is due to the difficulty of detecting user behaviors in the platform which does not help tutors in their follow-up and their educational supervision of learners as well as to interact easily with them. In this work, to solve this problem we will propose an information system capable of automatically analyzing and detecting the behavior of users who follow a distance training and subsequently, to classify their profiles according to predefined parameters to facilitate teachers choose courses and activities based on the behavior of each user.
MOOC目前面临着一个主要问题,即MOOC结束时的认证率下降。造成这一问题的主要原因是平台难以检测用户行为,不利于教师对学习者的跟踪和教育监督,也不利于教师与学习者的轻松互动。在这项工作中,为了解决这个问题,我们将提出一个能够自动分析和检测远程培训用户行为的信息系统,并根据预定义的参数对其进行分类,以方便教师根据每个用户的行为选择课程和活动。
{"title":"Towards a new approach to reduce the dropout rate in e-learning","authors":"Ilham Dhaiouir, M. Ezziyyani, Mohamed Khaldi","doi":"10.1145/3386723.3387846","DOIUrl":"https://doi.org/10.1145/3386723.3387846","url":null,"abstract":"MOOCs are currently facing a major problem, namely the decrease in the rate of certified at the end of a MOOC. The main cause of this problem is due to the difficulty of detecting user behaviors in the platform which does not help tutors in their follow-up and their educational supervision of learners as well as to interact easily with them. In this work, to solve this problem we will propose an information system capable of automatically analyzing and detecting the behavior of users who follow a distance training and subsequently, to classify their profiles according to predefined parameters to facilitate teachers choose courses and activities based on the behavior of each user.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124282837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Artificial Intelligence in Learning Skills Assessment: A Pedagogical Innovation 学习技能评估中的人工智能:一种教学创新
Okacha Diyer, N. Achtaich, Khalid Najib
Competency-based learning assessment has recently undergone an important development in the field of education. Its objective lies on offering learners the necessary skills to follow the enormous development of their environment, and to acquire the essentials capacities for various forms of interaction. This type of assessment is characterized by a diagnosis, remediation and improvement of the learners' skills without being limited to the assessment of knowledge. In this work, we propose an evaluation approach which is based on skills assessment strategy with interesting precision. Thus, the intelligent system detects the degree of learning skills C1 (Appropriate), C2 (Analyze and Reason), C3 (Realize), C4 (Validate) and C5 (communicate). In fact, the system used detects the level of the class in the different skills mentioned above, and offers educational situations to remedy the shortcomings that are encountered. Likewise, it offers the necessary support for each student by offering pedagogical situations whose objective is to increase the level of each learner skills (individualized assessment). The system also helps the teacher to make decisions to provide adequate supports. This device allows complete training for students, and it contributes to the development of a balanced (harmonized) personality in learning skills. This artificial intelligence that is involved allows performance while permanently monitoring each student. In fact, it allows a judicious evaluation which follows the enormous progress by adopting an automated method which takes into account the competence level of each pupil.
近年来,基于能力的学习评价在教育领域取得了重要的发展。它的目标在于为学习者提供必要的技能,以跟上环境的巨大发展,并获得各种形式的互动的基本能力。这种评估的特点是诊断、纠正和提高学习者的技能,而不局限于对知识的评估。在这项工作中,我们提出了一种基于技能评估策略的具有有趣精度的评估方法。因此,智能系统检测学习技能的程度C1(适当),C2(分析和推理),C3(实现),C4(验证)和C5(沟通)。事实上,所使用的系统可以检测班级在上述不同技能方面的水平,并提供教育情境来弥补所遇到的缺点。同样,它通过提供教学情境为每个学生提供必要的支持,其目标是提高每个学习者的技能水平(个性化评估)。该系统还帮助教师做出决定,提供足够的支持。这种方法可以对学生进行完整的训练,并有助于在学习技能方面发展平衡(和谐)的个性。这种人工智能可以在持续监控每个学生的同时实现他们的表现。事实上,它允许一个明智的评估,遵循巨大的进步,采用自动化的方法,考虑到每个学生的能力水平。
{"title":"Artificial Intelligence in Learning Skills Assessment: A Pedagogical Innovation","authors":"Okacha Diyer, N. Achtaich, Khalid Najib","doi":"10.1145/3386723.3387901","DOIUrl":"https://doi.org/10.1145/3386723.3387901","url":null,"abstract":"Competency-based learning assessment has recently undergone an important development in the field of education. Its objective lies on offering learners the necessary skills to follow the enormous development of their environment, and to acquire the essentials capacities for various forms of interaction. This type of assessment is characterized by a diagnosis, remediation and improvement of the learners' skills without being limited to the assessment of knowledge. In this work, we propose an evaluation approach which is based on skills assessment strategy with interesting precision. Thus, the intelligent system detects the degree of learning skills C1 (Appropriate), C2 (Analyze and Reason), C3 (Realize), C4 (Validate) and C5 (communicate). In fact, the system used detects the level of the class in the different skills mentioned above, and offers educational situations to remedy the shortcomings that are encountered. Likewise, it offers the necessary support for each student by offering pedagogical situations whose objective is to increase the level of each learner skills (individualized assessment). The system also helps the teacher to make decisions to provide adequate supports. This device allows complete training for students, and it contributes to the development of a balanced (harmonized) personality in learning skills. This artificial intelligence that is involved allows performance while permanently monitoring each student. In fact, it allows a judicious evaluation which follows the enormous progress by adopting an automated method which takes into account the competence level of each pupil.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117271331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A comparative study of Machine learning algorithms for VANET networks VANET网络机器学习算法的比较研究
Sara Ftaimi, T. Mazri
Vehicular Ad Hoc Networks (VANET) had incredible potential in improving road security, diminishing mishap rates and making the travel experience valuable for passengers. Like any other network, VANET too has problems and vulnerabilities that threaten its inherent nodes, and by implication, its reliability. In order to solve the security problems involving the VANET network, a lot of studies in machine learning algorithms have been undergone to improve the reliability of VANET by means of detecting intrusions and making prediction, ultimately, they have achieved satisfactory results. Therefore, the establishment of powerful VANET networks is significantly dependent on their security and protection alternatives, which is the subject of the present paper. This article starts with an overview of VANET Networks, then it proceeds to highlighting a variety of attacks that can threaten them. Next, we introduce the major concepts of machine learning before we conclude with the most frequently adopted artificial intelligence algorithms in the VANET networks
车辆自组织网络(VANET)在改善道路安全、降低事故发生率和为乘客提供有价值的旅行体验方面具有不可思议的潜力。像任何其他网络一样,VANET也存在威胁其固有节点的问题和漏洞,并暗示其可靠性。为了解决VANET网络的安全问题,人们对机器学习算法进行了大量的研究,通过检测入侵和预测来提高VANET的可靠性,最终取得了令人满意的结果。因此,建立强大的VANET网络在很大程度上取决于其安全性和保护方案,这是本文的主题。本文首先概述VANET网络,然后着重介绍可能威胁VANET网络的各种攻击。接下来,我们介绍机器学习的主要概念,然后总结VANET网络中最常用的人工智能算法
{"title":"A comparative study of Machine learning algorithms for VANET networks","authors":"Sara Ftaimi, T. Mazri","doi":"10.1145/3386723.3387829","DOIUrl":"https://doi.org/10.1145/3386723.3387829","url":null,"abstract":"Vehicular Ad Hoc Networks (VANET) had incredible potential in improving road security, diminishing mishap rates and making the travel experience valuable for passengers. Like any other network, VANET too has problems and vulnerabilities that threaten its inherent nodes, and by implication, its reliability. In order to solve the security problems involving the VANET network, a lot of studies in machine learning algorithms have been undergone to improve the reliability of VANET by means of detecting intrusions and making prediction, ultimately, they have achieved satisfactory results. Therefore, the establishment of powerful VANET networks is significantly dependent on their security and protection alternatives, which is the subject of the present paper. This article starts with an overview of VANET Networks, then it proceeds to highlighting a variety of attacks that can threaten them. Next, we introduce the major concepts of machine learning before we conclude with the most frequently adopted artificial intelligence algorithms in the VANET networks","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123282455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Proceedings of the 3rd International Conference on Networking, Information Systems & Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1