Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_38
A. Gourari, M. Raoufi, M. Skouri
{"title":"Formulating Quizzes Questions Using Artificial Intelligent Techniques","authors":"A. Gourari, M. Raoufi, M. Skouri","doi":"10.1007/978-981-16-3637-0_38","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_38","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"348 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122029794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this research work, we will present the main results and interpretations of the analysis of secondary data collected and processed. The analysis of Support Vector Machines, also known as Large Margin Separators (SVM), was used to predict the performance of the Tanger Med port, especially in terms of optimizing the logistics costs of the port, which allows a very strong evolution. level of international trade. The results of the SVM analysis obtained, helped to answer the problematic of our research, thus achieving the objectives of the study. The SVM technique was based on inferential analysis which showed the relevance of the results obtained from the secondary data and answered the research questions.
{"title":"Prediction of international trade evolution through the Support Vector Machine: The case of a port complex","authors":"O. Imrani","doi":"10.1145/3454127.3456587","DOIUrl":"https://doi.org/10.1145/3454127.3456587","url":null,"abstract":"In this research work, we will present the main results and interpretations of the analysis of secondary data collected and processed. The analysis of Support Vector Machines, also known as Large Margin Separators (SVM), was used to predict the performance of the Tanger Med port, especially in terms of optimizing the logistics costs of the port, which allows a very strong evolution. level of international trade. The results of the SVM analysis obtained, helped to answer the problematic of our research, thus achieving the objectives of the study. The SVM technique was based on inferential analysis which showed the relevance of the results obtained from the secondary data and answered the research questions.","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115680674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_14
Hind El Ghalbzouri, J. E. Bouhdidi
{"title":"Integrating Business Intelligence with Cloud Computing: State of the Art and Fundamental Concepts","authors":"Hind El Ghalbzouri, J. E. Bouhdidi","doi":"10.1007/978-981-16-3637-0_14","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_14","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122449160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_55
Farouq Zitouni, S. Harous, R. Maamri
{"title":"An Enhanced Social Spider Colony Optimization for Global Optimization","authors":"Farouq Zitouni, S. Harous, R. Maamri","doi":"10.1007/978-981-16-3637-0_55","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_55","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128039987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_27
Oussama Sbai, M. Elboukhari
{"title":"Comparative Study Between Network Layer Attacks in Mobile Ad Hoc Networks","authors":"Oussama Sbai, M. Elboukhari","doi":"10.1007/978-981-16-3637-0_27","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_27","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131955099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_26
Hector Torres-Calderon, Marco Velasquez, David Mauricio
{"title":"Method for Designing Countermeasures for Crypto-Ransomware Based on the NIST CSF","authors":"Hector Torres-Calderon, Marco Velasquez, David Mauricio","doi":"10.1007/978-981-16-3637-0_26","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_26","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122242500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}