Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805001
I. E. Fachtali, Rachid Saadane, M. Elkoutbi, H. Chaibi
Minimizing the total power consumption required for vertical handovers in 4th generation heterogeneous wireless networks is as important as providing users with the best QoS(Quality of Service) continuously. This letter proposes a vertical handover scheme to minimize the total power consumption required for a vertical handover in 4th generation heterogeneous wireless networks, while guaranteeing a particular QoS. The proposed scheme is based on an updated Tabu-search scheme, which helps to efficiently explore the network in order to find an optimal solution and to provide a service performance that adheres to predefined service level agreements (SLA). Simulation results show that the proposed scheme can lead to lower total power consumption compared to the RSS (Received Signal Strength) based scheme. The proposed method can achieve promising results in terms of bandwidth, security and cost of service, while minimizing the power consumption.
{"title":"Power-optimized vertical handover scheme for 4th generation heterogeneous wireless network","authors":"I. E. Fachtali, Rachid Saadane, M. Elkoutbi, H. Chaibi","doi":"10.1109/CIST.2016.7805001","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805001","url":null,"abstract":"Minimizing the total power consumption required for vertical handovers in 4th generation heterogeneous wireless networks is as important as providing users with the best QoS(Quality of Service) continuously. This letter proposes a vertical handover scheme to minimize the total power consumption required for a vertical handover in 4th generation heterogeneous wireless networks, while guaranteeing a particular QoS. The proposed scheme is based on an updated Tabu-search scheme, which helps to efficiently explore the network in order to find an optimal solution and to provide a service performance that adheres to predefined service level agreements (SLA). Simulation results show that the proposed scheme can lead to lower total power consumption compared to the RSS (Received Signal Strength) based scheme. The proposed method can achieve promising results in terms of bandwidth, security and cost of service, while minimizing the power consumption.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132748188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805072
Waleed Alabbas, Haider M. Al-Khateeb, Ali Mansour
Recent research on Big Data proposed and evaluated a number of advanced techniques to gain meaningful information from the complex and large volume of data available on the World Wide Web. To achieve accurate text analysis, a process is usually initiated with a Text Classification (TC) method. Reviewing the very recent literature in this area shows that most studies are focused on English (and other scripts) while attempts on classifying Arabic texts remain relatively very limited. Hence, we intend to contribute the first Systematic Literature Review (SLR) utilizing a search protocol strictly to summarize key characteristics of the different TC techniques and methods used to classify Arabic text, this work also aims to identify and share a scientific evidence of the gap in current literature to help suggesting areas for further research. Our SLR explicitly investigates empirical evidence as a decision factor to include studies, then conclude which classifier produced more accurate results. Further, our findings identify the lack of standardized corpuses for Arabic text; authors compile their own, and most of the work is focused on Modern Arabic with very little done on Colloquial Arabic despite its wide use in Social Media Networks such as Twitter. In total, 1464 papers were surveyed from which 48 primary studies were included and analyzed.
{"title":"Arabic text classification methods: Systematic literature review of primary studies","authors":"Waleed Alabbas, Haider M. Al-Khateeb, Ali Mansour","doi":"10.1109/CIST.2016.7805072","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805072","url":null,"abstract":"Recent research on Big Data proposed and evaluated a number of advanced techniques to gain meaningful information from the complex and large volume of data available on the World Wide Web. To achieve accurate text analysis, a process is usually initiated with a Text Classification (TC) method. Reviewing the very recent literature in this area shows that most studies are focused on English (and other scripts) while attempts on classifying Arabic texts remain relatively very limited. Hence, we intend to contribute the first Systematic Literature Review (SLR) utilizing a search protocol strictly to summarize key characteristics of the different TC techniques and methods used to classify Arabic text, this work also aims to identify and share a scientific evidence of the gap in current literature to help suggesting areas for further research. Our SLR explicitly investigates empirical evidence as a decision factor to include studies, then conclude which classifier produced more accurate results. Further, our findings identify the lack of standardized corpuses for Arabic text; authors compile their own, and most of the work is focused on Modern Arabic with very little done on Colloquial Arabic despite its wide use in Social Media Networks such as Twitter. In total, 1464 papers were surveyed from which 48 primary studies were included and analyzed.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133735716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7804993
B. Radi, Bochar Laarabi
In this paper presents a new approach based a genetic algorithm to solve selective travelling salesman problem, which is concerned with finding a path between a given set of control points, among which a start and an end point are the same, and to maximize the total gain collected subject to a prescribed cost constraint. This approach assured by creation of a population under the criterion ratio between the gain and cost. The results of the application of this approach give us the best of the objective function and the number of iterations for algorithm is reduced.
{"title":"A new approach based a genetic algorithm for the selective travelling salesman problem","authors":"B. Radi, Bochar Laarabi","doi":"10.1109/CIST.2016.7804993","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804993","url":null,"abstract":"In this paper presents a new approach based a genetic algorithm to solve selective travelling salesman problem, which is concerned with finding a path between a given set of control points, among which a start and an end point are the same, and to maximize the total gain collected subject to a prescribed cost constraint. This approach assured by creation of a population under the criterion ratio between the gain and cost. The results of the application of this approach give us the best of the objective function and the number of iterations for algorithm is reduced.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132500838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805064
Sara Ibn El Ahrache, Hassan Badir, P. Ghodous, A. Sbihi
Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user's convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k, n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. However, a limitation of these methods is that first they do not consider long term data storage and second they assume that data tempering only occurs at retrieval time, after the distribution of the shares has been correctly done. In this paper we address these two problems by presenting a novel scheme to ensure a perpetual secure data storage and retrieval.
{"title":"Permanent participatory data security in a cloud computing environment","authors":"Sara Ibn El Ahrache, Hassan Badir, P. Ghodous, A. Sbihi","doi":"10.1109/CIST.2016.7805064","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805064","url":null,"abstract":"Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user's convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k, n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. However, a limitation of these methods is that first they do not consider long term data storage and second they assume that data tempering only occurs at retrieval time, after the distribution of the shares has been correctly done. In this paper we address these two problems by presenting a novel scheme to ensure a perpetual secure data storage and retrieval.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"54 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116214659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805025
Hicham Rachidi, M. E. Mohajir
Several studies conducted in Morocco and other developing countries have shown that Small and Medium Enterprises (SMEs) fail to achieve business goals for reasons related principally to lack of entrepreneurship knowledge and poor financial management. Indeed, most managers do not have the required educational background and skills, precisely in accounting and cash flow management. To manage these competences inside SMEs or to out-source them completely requires important investment from SMEs which have limited financial resources. Failing to resolve this problem causes stagnation of small businesses on the market, followed by the disappearance of a large number of companies. This phenomenon impacts the development of the Moroccan socio-economic environment in which SMEs have a major contribution. In this paper, we propose a combined e-learning and finance management system based on ontology that, on the one hand, provides definition of concepts used in finance and accounting and, on the other hand, permits SMEs' managers to learn and to acquire knowledge for efficient financial management. The data entered in the solution is used in an analytical component to provide performance indicators about company's health, viability and future strategic orientations.
{"title":"A combined e-learning and finance management system based on ontology: A case study of SMEs in Morocco","authors":"Hicham Rachidi, M. E. Mohajir","doi":"10.1109/CIST.2016.7805025","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805025","url":null,"abstract":"Several studies conducted in Morocco and other developing countries have shown that Small and Medium Enterprises (SMEs) fail to achieve business goals for reasons related principally to lack of entrepreneurship knowledge and poor financial management. Indeed, most managers do not have the required educational background and skills, precisely in accounting and cash flow management. To manage these competences inside SMEs or to out-source them completely requires important investment from SMEs which have limited financial resources. Failing to resolve this problem causes stagnation of small businesses on the market, followed by the disappearance of a large number of companies. This phenomenon impacts the development of the Moroccan socio-economic environment in which SMEs have a major contribution. In this paper, we propose a combined e-learning and finance management system based on ontology that, on the one hand, provides definition of concepts used in finance and accounting and, on the other hand, permits SMEs' managers to learn and to acquire knowledge for efficient financial management. The data entered in the solution is used in an analytical component to provide performance indicators about company's health, viability and future strategic orientations.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"341 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116315977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805002
Ayoub Bouroumine, M. Zekraoui, A. Maach
Vehicular Networks implementation has become a necessity in Smart Cities, due to the opportunistic network connectivity it offers within the city, where researches has began to focus more on Vehicular Networks, to improve the control over traffics and road safety inside the city; other researches on Smart Cities are more concerned about the transmission of the data collected by sensors, nodes, devices installed around the city to the back-end servers where they can be processed and analyzed. In this paper, we propose possible alternative network for Smart Cities, to forward informative data stored in stations implemented around the city without the needs of pre-installed infrastructures, by relying on public and semi-public vehicle transports for network connectivity between the stations and the back-end server.
{"title":"The influence of the opportunistic vehicular networks on smart cities management study case on Agdal district in Rabat city","authors":"Ayoub Bouroumine, M. Zekraoui, A. Maach","doi":"10.1109/CIST.2016.7805002","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805002","url":null,"abstract":"Vehicular Networks implementation has become a necessity in Smart Cities, due to the opportunistic network connectivity it offers within the city, where researches has began to focus more on Vehicular Networks, to improve the control over traffics and road safety inside the city; other researches on Smart Cities are more concerned about the transmission of the data collected by sensors, nodes, devices installed around the city to the back-end servers where they can be processed and analyzed. In this paper, we propose possible alternative network for Smart Cities, to forward informative data stored in stations implemented around the city without the needs of pre-installed infrastructures, by relying on public and semi-public vehicle transports for network connectivity between the stations and the back-end server.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116440072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805089
M. A. Sabri, A. Ennouni, A. Aarab
At the present time, clustering algorithms are popular analysis tools in image segmentation. For instance, the K-means is one of the most used algorithms in the literature and it is fast, robust and easier to understand and to implement but, the main drawback of the K-means algorithm is that the number of clusters must be known a priori and must be supplied as an input parameter. This paper discusses the problem of the estimation of the number of clusters for image segmentation and proposes a new approach which is based on histogram to find a suitable number of K (the number of clusters). Experimental results demonstrate the effectiveness of our method to estimate the correct number of clusters which reflect a good separation of objects for each image.
{"title":"Automatic estimation of clusters number for K-means","authors":"M. A. Sabri, A. Ennouni, A. Aarab","doi":"10.1109/CIST.2016.7805089","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805089","url":null,"abstract":"At the present time, clustering algorithms are popular analysis tools in image segmentation. For instance, the K-means is one of the most used algorithms in the literature and it is fast, robust and easier to understand and to implement but, the main drawback of the K-means algorithm is that the number of clusters must be known a priori and must be supplied as an input parameter. This paper discusses the problem of the estimation of the number of clusters for image segmentation and proposes a new approach which is based on histogram to find a suitable number of K (the number of clusters). Experimental results demonstrate the effectiveness of our method to estimate the correct number of clusters which reflect a good separation of objects for each image.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134638106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805020
Hamid Barkouk, E. En-Naimi
The VANET (Vehicular Ad hoc Network) is a collection of mobile nodes forming a temporary network on variable topology, operating without base station and without centralized administration. The characteristics of VANET network that distinguishes it from other ad hoc networks, such as high mobility and communication with the infrastructure to support security or comfort applications, have prompted researchers to develop models and mobility-specific protocols[1] [2]. The main goal of our work is firstly to integrate the alerts functionality to LEACH protocol by developing five procedures that will ensure the following features: - Event point detection - Search close neighbors - Sending of messages to nearby neighbors - Communications From vehicles to infrastructure - Communications From infrastructure to vehicles The second goal is to examine the impact of varying density on the number of received packets, sent packets and average delay. The results of our work show that our proposed algorithm is reliable in view of the number of packets sent / received and of the low average delay.
VANET (Vehicular Ad hoc Network)是一种由移动节点组成的可变拓扑临时网络,在没有基站和集中管理的情况下运行。VANET网络与其他自组织网络不同的特点,如高移动性和与基础设施的通信,以支持安全或舒适的应用,促使研究人员开发模型和移动性特定协议[1]b[2]。我们工作的主要目标是首先通过开发五个程序将警报功能集成到LEACH协议中,这些程序将确保以下功能:-事件点检测-搜索近邻-向附近邻居发送消息-从车辆到基础设施的通信-从基础设施到车辆的通信。第二个目标是检查不同密度对接收数据包数量的影响,发送数据包和平均延迟。我们的工作结果表明,考虑到发送/接收的数据包数量和低的平均延迟,我们提出的算法是可靠的。
{"title":"Development of an alert message dissemination protocol based on LEACH protocol to improve VANET road safety","authors":"Hamid Barkouk, E. En-Naimi","doi":"10.1109/CIST.2016.7805020","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805020","url":null,"abstract":"The VANET (Vehicular Ad hoc Network) is a collection of mobile nodes forming a temporary network on variable topology, operating without base station and without centralized administration. The characteristics of VANET network that distinguishes it from other ad hoc networks, such as high mobility and communication with the infrastructure to support security or comfort applications, have prompted researchers to develop models and mobility-specific protocols[1] [2]. The main goal of our work is firstly to integrate the alerts functionality to LEACH protocol by developing five procedures that will ensure the following features: - Event point detection - Search close neighbors - Sending of messages to nearby neighbors - Communications From vehicles to infrastructure - Communications From infrastructure to vehicles The second goal is to examine the impact of varying density on the number of received packets, sent packets and average delay. The results of our work show that our proposed algorithm is reliable in view of the number of packets sent / received and of the low average delay.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133800332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7804982
Ismaïl Sossey-Alaoui, B. Radi
The fluid-structure interactions, that means the interaction of some deformable structure with a surrounding or internal fluid flow, belong nowadays to the most important and challenging multi-physics problems which are aimed to treat by numerical simulations. The topic is of fluid-structure interaction plays a dominant role in many fields of engineering. Therefore, a strong need for appropriate numerical simulation tools exists with a variety of numerical and physical aspects. The special task of the present paper is to take care about fluid-structure interaction using modern simulation techniques such as coupled field analysis. This work illustrates the use of load transfer coupled physics analysis to solve a steady-state air flow-blade interaction problem, followed by modal analysis where natural frequency are obtained with two different approaches: deterministic and probabilistic. The numerical results are deduced from a finite element approximation of the coupled problem with a non-symmetric pressure/displacement formulation. Deterministic and probabilistic results are given and discussed.
{"title":"Modal and probabilistic analysis of wind turbine blade under air-flow","authors":"Ismaïl Sossey-Alaoui, B. Radi","doi":"10.1109/CIST.2016.7804982","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804982","url":null,"abstract":"The fluid-structure interactions, that means the interaction of some deformable structure with a surrounding or internal fluid flow, belong nowadays to the most important and challenging multi-physics problems which are aimed to treat by numerical simulations. The topic is of fluid-structure interaction plays a dominant role in many fields of engineering. Therefore, a strong need for appropriate numerical simulation tools exists with a variety of numerical and physical aspects. The special task of the present paper is to take care about fluid-structure interaction using modern simulation techniques such as coupled field analysis. This work illustrates the use of load transfer coupled physics analysis to solve a steady-state air flow-blade interaction problem, followed by modal analysis where natural frequency are obtained with two different approaches: deterministic and probabilistic. The numerical results are deduced from a finite element approximation of the coupled problem with a non-symmetric pressure/displacement formulation. Deterministic and probabilistic results are given and discussed.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123815554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805101
A. E. Mhouti, Azeddine Nasseh, M. Erradi
Today, e-learning is one of the most popular teaching methods. One of its modes is the collaborative learning, where learners can collaborate with their peers, share ideas, and where everyone should be involved in the social interaction. However, the efficiency of collaborative learning depends on the motivation of its members to collaborate, their skills and the quality of tools used to encourage learners to participate actively to exchange knowledge. In this sense, the intelligent agent paradigm, which originates from the computational intelligence field, gained a tremendous interest in its application in collaborative e-learning. This research work focuses on the use of intelligent agents in the sphere of e-learning to encourage collaborative learning. Intelligent agents can be used to assist teachers and tutors by permitting them to track the progress of learners and accordingly recommend the best matching helpers for collaboration. The paper introduces a framework of collaborative e-learning environment based on a Multi-Agents System (MAS). The objective is to incorporate the intelligence of the Multi-Agent System to collect information about the learners' activities and help tutors to exploit these information to promote collaborative learning. Thus, the system integrates seven agents that interact and ensure the following features: 1/ facilitate the task of tutors by allowing them to appreciate learners' activities and track the progress of learners and their level of collaboration; 2/ avoid the isolation of learners and motivate them; and 3/ encourage collaborative working and the use of collaborative work tools.
{"title":"Towards a collaborative e-learning platform based on a multi-agents system","authors":"A. E. Mhouti, Azeddine Nasseh, M. Erradi","doi":"10.1109/CIST.2016.7805101","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805101","url":null,"abstract":"Today, e-learning is one of the most popular teaching methods. One of its modes is the collaborative learning, where learners can collaborate with their peers, share ideas, and where everyone should be involved in the social interaction. However, the efficiency of collaborative learning depends on the motivation of its members to collaborate, their skills and the quality of tools used to encourage learners to participate actively to exchange knowledge. In this sense, the intelligent agent paradigm, which originates from the computational intelligence field, gained a tremendous interest in its application in collaborative e-learning. This research work focuses on the use of intelligent agents in the sphere of e-learning to encourage collaborative learning. Intelligent agents can be used to assist teachers and tutors by permitting them to track the progress of learners and accordingly recommend the best matching helpers for collaboration. The paper introduces a framework of collaborative e-learning environment based on a Multi-Agents System (MAS). The objective is to incorporate the intelligence of the Multi-Agent System to collect information about the learners' activities and help tutors to exploit these information to promote collaborative learning. Thus, the system integrates seven agents that interact and ensure the following features: 1/ facilitate the task of tutors by allowing them to appreciate learners' activities and track the progress of learners and their level of collaboration; 2/ avoid the isolation of learners and motivate them; and 3/ encourage collaborative working and the use of collaborative work tools.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"727 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123866140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}