Pub Date : 2020-11-28DOI: 10.1109/ACIT50332.2020.9300116
Z. Houhamdi, B. Athamena
Agents usually organize their behavior and cooperate to reach a common global goal by sharing constrained resources or perform complex tasks. Constructing an efficient collaborative team where agents are ready to collaborate without interests' conflict is fundamental for the success of any collaboration process. The construction of such teams was well discussed in closed Multi-Agents System (MAS). Nevertheless, it represents a real challenge in open MAS, where each agent joins and leaves the system unpredictably and frequently and has a set of goals to achieve concurrently (agent is self-interested). This study describes an entire decentralized method to the collaborative Team Construction Model (CTCM) for multi-goals agents in open MAS. CTCM defines a modified social reasoning model and a new decentralized team construction method. CTCM allows each agent to achieve its local and common goals concurrently in constrained resource open MAS by constructing collaborative teams. The agents share partial domain knowledge (to preserve privacy) and model their goal relations with other agents by applying modified social reasoning. The team construction method facilitates agents decision-making process in a decentralized way. The CTCM enables agents to adjust their self-interest level and adapt their readiness to construct effective collaborative teams.
{"title":"Collaborative Team Construction in Open Multi-Agents System","authors":"Z. Houhamdi, B. Athamena","doi":"10.1109/ACIT50332.2020.9300116","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300116","url":null,"abstract":"Agents usually organize their behavior and cooperate to reach a common global goal by sharing constrained resources or perform complex tasks. Constructing an efficient collaborative team where agents are ready to collaborate without interests' conflict is fundamental for the success of any collaboration process. The construction of such teams was well discussed in closed Multi-Agents System (MAS). Nevertheless, it represents a real challenge in open MAS, where each agent joins and leaves the system unpredictably and frequently and has a set of goals to achieve concurrently (agent is self-interested). This study describes an entire decentralized method to the collaborative Team Construction Model (CTCM) for multi-goals agents in open MAS. CTCM defines a modified social reasoning model and a new decentralized team construction method. CTCM allows each agent to achieve its local and common goals concurrently in constrained resource open MAS by constructing collaborative teams. The agents share partial domain knowledge (to preserve privacy) and model their goal relations with other agents by applying modified social reasoning. The team construction method facilitates agents decision-making process in a decentralized way. The CTCM enables agents to adjust their self-interest level and adapt their readiness to construct effective collaborative teams.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"1637 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122703882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-28DOI: 10.1109/ACIT50332.2020.9300072
Fatma Marzougui, M. Elleuch, M. Kherallah
The diagnosis of the plants is carried out with a visual inspection by experts and a biological examination is the second choice if necessary. They are usually expensive and time consuming. This inspired several computer methodologies to detect plant blights based on their leaf images. We apply a computer methodology on Deep Learning systems based on artificial neural networks, this branch also allows for the early detection of plant diseases, by applying convolutional neural networks (CNNs) familiar with some of the famous architectures, notably the “ResNet” architecture, using an augmented dataset containing images of healthy and diseased leaves (each leaf is manually cut and placed on a uniform background) with acceptable accuracy rates in the research environment. This Deep Learning technique has shown very good performance for various object detection problems. The model fulfills its role by classifying images into two categories (disease-free) and (diseased). According to the results obtained, the developed system achieves better detection performances than those proposed in the state of the art. Finally, to compare their performances, we use the implementation under Anaconda 2019.10.
{"title":"A Deep CNN Approach for Plant Disease Detection","authors":"Fatma Marzougui, M. Elleuch, M. Kherallah","doi":"10.1109/ACIT50332.2020.9300072","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300072","url":null,"abstract":"The diagnosis of the plants is carried out with a visual inspection by experts and a biological examination is the second choice if necessary. They are usually expensive and time consuming. This inspired several computer methodologies to detect plant blights based on their leaf images. We apply a computer methodology on Deep Learning systems based on artificial neural networks, this branch also allows for the early detection of plant diseases, by applying convolutional neural networks (CNNs) familiar with some of the famous architectures, notably the “ResNet” architecture, using an augmented dataset containing images of healthy and diseased leaves (each leaf is manually cut and placed on a uniform background) with acceptable accuracy rates in the research environment. This Deep Learning technique has shown very good performance for various object detection problems. The model fulfills its role by classifying images into two categories (disease-free) and (diseased). According to the results obtained, the developed system achieves better detection performances than those proposed in the state of the art. Finally, to compare their performances, we use the implementation under Anaconda 2019.10.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122463426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-28DOI: 10.1109/ACIT50332.2020.9300090
Idir Aoudia, L. Kahloul, Saber Benharzallah, O. Kazar
The Internet of things (IoT) is the integration of information space and physical space, becoming more and more popular in several places. In this paper, we will present QoS service composition approach based on multi-population genetic algorithm based on Fog-IoT computing, IoT-cloud architecture problems led us to use the 5-layared architecture implemented on a Fog computing system especially the transport layer. Our work was focus on this transport layer where we divided it into four sub-layers (security, storage, pre-processing & monitoring), it allows us to have promising advantages. Secondly, we implemented a multi-population genetic algorithm (MPGA) based on a QoS model, we considered seven QoS dimensions, i.e. Cost, response time, reliability, reputation, location, security and availability. Experimental results show the excellent results of MPGA in terms of fitness value and execution time to handle our ambulance emergency study case.
物联网(Internet of things, IoT)是信息空间与物理空间的融合,在很多地方越来越受欢迎。在本文中,我们将提出基于多种群遗传算法的基于雾-物联网计算的QoS服务组合方法,物联网云架构问题导致我们使用在雾计算系统上实现的5层架构,特别是传输层。我们的工作重点是这个传输层,我们将其分为四个子层(安全、存储、预处理和监控),这使我们具有很大的优势。其次,我们实现了基于QoS模型的多种群遗传算法(MPGA),我们考虑了QoS的7个维度,即成本、响应时间、可靠性、声誉、位置、安全性和可用性。实验结果表明,MPGA在适应度值和执行时间方面都取得了良好的效果。
{"title":"QoS-aware service composition in Fog-IoT computing using multi-population genetic algorithm","authors":"Idir Aoudia, L. Kahloul, Saber Benharzallah, O. Kazar","doi":"10.1109/ACIT50332.2020.9300090","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300090","url":null,"abstract":"The Internet of things (IoT) is the integration of information space and physical space, becoming more and more popular in several places. In this paper, we will present QoS service composition approach based on multi-population genetic algorithm based on Fog-IoT computing, IoT-cloud architecture problems led us to use the 5-layared architecture implemented on a Fog computing system especially the transport layer. Our work was focus on this transport layer where we divided it into four sub-layers (security, storage, pre-processing & monitoring), it allows us to have promising advantages. Secondly, we implemented a multi-population genetic algorithm (MPGA) based on a QoS model, we considered seven QoS dimensions, i.e. Cost, response time, reliability, reputation, location, security and availability. Experimental results show the excellent results of MPGA in terms of fitness value and execution time to handle our ambulance emergency study case.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123204285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-28DOI: 10.1109/ACIT50332.2020.9300056
Ghaliya Alfarsi, Azmi Bin Mohd Yusof
Virtual reality catches individuals' consideration. This innovation has been applied in numerous divisions, for example, medication, industry, training, computer games, or the travel industry. Maybe its most significant zone of intrigue has been relaxation and amusement. In any case, the part, the presentation of virtual or increased reality had a few limitations: it was costly, it had poor ergonomics, or inferred an excessive amount of work to make the substance. This study gives a general view of virtual reality applications that used primarily in the education sector. Late mechanical developments, including the quick selection of cell phones by society, have encouraged the entrance to computer-generated reality and enlarged the truth of anybody. Instructive organizations profit by better openness to virtual innovations. VR will make it conceivable to educate in virtual situations that are difficult to picture in physical study halls, such as getting into virtual research facilities, imagining machines, mechanical plants, or even clinical cases. The gigantic prospects of open virtual advancements will make it conceivable to break the limits of formal instruction.
{"title":"Virtual Reality Applications in Education Domain","authors":"Ghaliya Alfarsi, Azmi Bin Mohd Yusof","doi":"10.1109/ACIT50332.2020.9300056","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300056","url":null,"abstract":"Virtual reality catches individuals' consideration. This innovation has been applied in numerous divisions, for example, medication, industry, training, computer games, or the travel industry. Maybe its most significant zone of intrigue has been relaxation and amusement. In any case, the part, the presentation of virtual or increased reality had a few limitations: it was costly, it had poor ergonomics, or inferred an excessive amount of work to make the substance. This study gives a general view of virtual reality applications that used primarily in the education sector. Late mechanical developments, including the quick selection of cell phones by society, have encouraged the entrance to computer-generated reality and enlarged the truth of anybody. Instructive organizations profit by better openness to virtual innovations. VR will make it conceivable to educate in virtual situations that are difficult to picture in physical study halls, such as getting into virtual research facilities, imagining machines, mechanical plants, or even clinical cases. The gigantic prospects of open virtual advancements will make it conceivable to break the limits of formal instruction.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134539424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-28DOI: 10.1109/ACIT50332.2020.9300066
Muntather Ayad, H. Kanaan, M. Ayache
For a long time, the major problem area for researchers is disease diagnosis and the main interest of the medicine is an accurate diagnosis. Many engineering techniques have been developed in the past to help the medical staff with a diagnosis tool. There are many traditional methods of disease diagnosis, but the application of machine learning techniques has given a new dimension to this area. In this work, two different approaches have been used for the purpose of classification between diabetic and non-diabetic, using Pima Indian Diabetes Dataset. Principal Component Analysis has been used in the purpose of feature dimension reduction before applying any proposed classifier. Support Vector Machine (SVM) and Naïve Bayes (NB) are the two classifiers used in our study. 94.14 % and 93.88% are the accuracies obtained for the SVM and NB approaches.The results obtained are very interesting and show improvement from the previous works. With this accurate learning technique, there is enough scope for improvement considerably in this field.
{"title":"Diabetes Disease Prediction Using Artificial Intelligence","authors":"Muntather Ayad, H. Kanaan, M. Ayache","doi":"10.1109/ACIT50332.2020.9300066","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300066","url":null,"abstract":"For a long time, the major problem area for researchers is disease diagnosis and the main interest of the medicine is an accurate diagnosis. Many engineering techniques have been developed in the past to help the medical staff with a diagnosis tool. There are many traditional methods of disease diagnosis, but the application of machine learning techniques has given a new dimension to this area. In this work, two different approaches have been used for the purpose of classification between diabetic and non-diabetic, using Pima Indian Diabetes Dataset. Principal Component Analysis has been used in the purpose of feature dimension reduction before applying any proposed classifier. Support Vector Machine (SVM) and Naïve Bayes (NB) are the two classifiers used in our study. 94.14 % and 93.88% are the accuracies obtained for the SVM and NB approaches.The results obtained are very interesting and show improvement from the previous works. With this accurate learning technique, there is enough scope for improvement considerably in this field.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134364458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-28DOI: 10.1109/ACIT50332.2020.9300101
Lara Saleh, Anas Abu Taleb, W. Salameh
The wireless sensor networks are characterized by the infrastructure less configuring these sensors are used in different application such in defense, healthcare and in some applications that take care of the early detection of forest fires, also the wireless sensors networks can be in remote areas for long periods so because of the natural and the use of these sensors they are subject to exposure many security attacks; So the reputation-based trust systems was developed to keep the eye on the un normal activities, this paper listed the attacks that the wireless sensor networks may suffer from and listed trust models in these networks and finally the immunity of the trust models from the malicious attacks is shown.
{"title":"Trust and reputation in Wireless Sensors networks","authors":"Lara Saleh, Anas Abu Taleb, W. Salameh","doi":"10.1109/ACIT50332.2020.9300101","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300101","url":null,"abstract":"The wireless sensor networks are characterized by the infrastructure less configuring these sensors are used in different application such in defense, healthcare and in some applications that take care of the early detection of forest fires, also the wireless sensors networks can be in remote areas for long periods so because of the natural and the use of these sensors they are subject to exposure many security attacks; So the reputation-based trust systems was developed to keep the eye on the un normal activities, this paper listed the attacks that the wireless sensor networks may suffer from and listed trust models in these networks and finally the immunity of the trust models from the malicious attacks is shown.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130831359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-28DOI: 10.1109/ACIT50332.2020.9300079
Safaa Hraiz, Ghazi Al-Naymat, A. Awajan
With the attractive characteristics of cloud computing, most companies manage to use it in order to decrease the costs and efforts of management. Database as a service is one of the attractive delivery models on cloud computing. It represents great opportunities for companies to decrease the efforts and costs of managing the databases. Because of that, most companies outsourced their databases to the cloud but new challenges have arisen including the guarantee of the integrity of the search results. This paper proposes a new technique that aids to ensure the integrity of the search results. It uses variants of the Bloom Filter data structure. The analysis using the TPC-H benchmark affirms that the proposed method is secure and efficient for practical deployment.
{"title":"A Novel Method to Verify the Search Results of Database Queries on Cloud Computing","authors":"Safaa Hraiz, Ghazi Al-Naymat, A. Awajan","doi":"10.1109/ACIT50332.2020.9300079","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300079","url":null,"abstract":"With the attractive characteristics of cloud computing, most companies manage to use it in order to decrease the costs and efforts of management. Database as a service is one of the attractive delivery models on cloud computing. It represents great opportunities for companies to decrease the efforts and costs of managing the databases. Because of that, most companies outsourced their databases to the cloud but new challenges have arisen including the guarantee of the integrity of the search results. This paper proposes a new technique that aids to ensure the integrity of the search results. It uses variants of the Bloom Filter data structure. The analysis using the TPC-H benchmark affirms that the proposed method is secure and efficient for practical deployment.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131272731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-28DOI: 10.1109/ACIT50332.2020.9300087
J. C. Tuyisenge, N. Gaudence, D. Mukanyiligira, Jean Pierre Nyakuri
Nowadays, with technology development, home healthcare and remote monitoring of physiological data have gained importance. It is popular in the tracking of home healthcare of patients, particularly babies. The existing IoT solutions cover the health monitoring of babies by the use of biometric sensors and a smart cradle. This work proposes a system where by a smart dining room is added to the existing solution, by the use of an IP Camera, Fingerprint based access, room temperature and humidity control by fuzzy inference system. The smart room contains also an alert system to remind the maidservant the time to feed the baby, an alert system to the parents alerting them if the maidservant has not respected the time to feed the baby so that parents can remind the maidservant to do so. In addition to this, a mobile application was developed for parents to monitor the smart dining room's activities. An IP camera will be automatically activated once the maidservant and child enter in the dining room, to provide full information to the parents about the diet prepared.
{"title":"Fuzzy logic Applied to Smart Baby's Health and Feeding Sequence Monitoring System","authors":"J. C. Tuyisenge, N. Gaudence, D. Mukanyiligira, Jean Pierre Nyakuri","doi":"10.1109/ACIT50332.2020.9300087","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300087","url":null,"abstract":"Nowadays, with technology development, home healthcare and remote monitoring of physiological data have gained importance. It is popular in the tracking of home healthcare of patients, particularly babies. The existing IoT solutions cover the health monitoring of babies by the use of biometric sensors and a smart cradle. This work proposes a system where by a smart dining room is added to the existing solution, by the use of an IP Camera, Fingerprint based access, room temperature and humidity control by fuzzy inference system. The smart room contains also an alert system to remind the maidservant the time to feed the baby, an alert system to the parents alerting them if the maidservant has not respected the time to feed the baby so that parents can remind the maidservant to do so. In addition to this, a mobile application was developed for parents to monitor the smart dining room's activities. An IP camera will be automatically activated once the maidservant and child enter in the dining room, to provide full information to the parents about the diet prepared.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128210832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-28DOI: 10.1109/ACIT50332.2020.9300055
Hare Ram Sah, Hemang Shrivastava, M. Ramaiya
The visual steganography is used to hide secret message within an image and extracting it from destination image. The secure forms of steganography are visual steganography which is implemented in image files. For securing data encryption method is used with mathematical concepts and achieves higher level of secured communication. Both the techniques visual steganography and encryption technique are combined to achieve two layer of security. Instead of sequential search, the thread based parallel search is implemented to increase the retrieval speed at high rate of concurrent search which can be implemented on any real-time architecture.
{"title":"Visual Steganography and Encryption Tachniques with Hardware Implementation","authors":"Hare Ram Sah, Hemang Shrivastava, M. Ramaiya","doi":"10.1109/ACIT50332.2020.9300055","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300055","url":null,"abstract":"The visual steganography is used to hide secret message within an image and extracting it from destination image. The secure forms of steganography are visual steganography which is implemented in image files. For securing data encryption method is used with mathematical concepts and achieves higher level of secured communication. Both the techniques visual steganography and encryption technique are combined to achieve two layer of security. Instead of sequential search, the thread based parallel search is implemented to increase the retrieval speed at high rate of concurrent search which can be implemented on any real-time architecture.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"12 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132154438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-28DOI: 10.1109/ACIT50332.2020.9300060
Salima Brachemi-Meftah, F. Barigou
Sentiment Analysis tries to predict the polarity of comments in social media. In this paper we present a state of art about sentiment analysis for the Algerian dialect, one of the Arabic languages used on social media and which has few resources. First, a brief description is given regarding the characteristics and challenges of the Algerian dialect. Then the study of papers dealing with sentiment analysis for the Algerian dialect is done with their classification by approach considering tools used and the best results obtained. We also try to enumerate resources that are used in Algerian dialect sentiment analysis works.
{"title":"Algerian Dialect Sentiment Analysis: Sate of Art","authors":"Salima Brachemi-Meftah, F. Barigou","doi":"10.1109/ACIT50332.2020.9300060","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300060","url":null,"abstract":"Sentiment Analysis tries to predict the polarity of comments in social media. In this paper we present a state of art about sentiment analysis for the Algerian dialect, one of the Arabic languages used on social media and which has few resources. First, a brief description is given regarding the characteristics and challenges of the Algerian dialect. Then the study of papers dealing with sentiment analysis for the Algerian dialect is done with their classification by approach considering tools used and the best results obtained. We also try to enumerate resources that are used in Algerian dialect sentiment analysis works.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131245844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}