Pub Date : 2021-09-21DOI: 10.1109/ICRAMI52622.2021.9585956
Nadia Ben Seghier, O. Kazar
Big Data is an ensemble of technologies founded on NoSQL databases that enable scalability of volumes, numbers, and data types. NoSQL databases assert that their performance is better than legacy relational database systems for higher workloads, particularly common in Big Data and Cloud Computing applications. There are several open-source and proprietary NoSQL models disposable on the market. It is hard to determine a suitable solution for a particular problem due to the large amount and variety of current solutions. The authors build on a comparative analysis of the performance of three commonly used solutions, Redis, MongoDB, and Cassandra, in elements relevant to query performance, based on inserts, updates, scans, and reads, by utilizing the YCSB tool to run six bespoke workloads. The goal is to furnish assistance and support to actors who are interested in Big Data and Cloud Computing in order to help them make decisions about which solutions to use in the future.
{"title":"Performance Benchmarking and Comparison of NoSQL Databases: Redis vs MongoDB vs Cassandra Using YCSB Tool","authors":"Nadia Ben Seghier, O. Kazar","doi":"10.1109/ICRAMI52622.2021.9585956","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585956","url":null,"abstract":"Big Data is an ensemble of technologies founded on NoSQL databases that enable scalability of volumes, numbers, and data types. NoSQL databases assert that their performance is better than legacy relational database systems for higher workloads, particularly common in Big Data and Cloud Computing applications. There are several open-source and proprietary NoSQL models disposable on the market. It is hard to determine a suitable solution for a particular problem due to the large amount and variety of current solutions. The authors build on a comparative analysis of the performance of three commonly used solutions, Redis, MongoDB, and Cassandra, in elements relevant to query performance, based on inserts, updates, scans, and reads, by utilizing the YCSB tool to run six bespoke workloads. The goal is to furnish assistance and support to actors who are interested in Big Data and Cloud Computing in order to help them make decisions about which solutions to use in the future.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116891786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/ICRAMI52622.2021.9585975
Mohamed Remli, Oualid Demigha, A. Yachir
Time Slotted Channel Hopping (TSCH) is a communication mode of the IEEE 802.15.4e standard introduced as an enhancement to the previous standard (IEEE 802.15.42011) to address the industrial market. This mode is designed specifically for process automation and factory monitoring. It uses time-slotted access and channel hopping mechanism. It also provides low latency and high reliability reducing remarkably the energy consumption. Moreover, the 6TiSCH protocol stack combines TSCH with IPv6 to form a well-tuned and complete networking solution. A key element that significantly affects the adoption of TSCH as a MAC protocol is the performance of the network formation process in terms of joining delay and power consumption. This paper studies the process of network formation both in TSCH and 6TiSCH networks, surveying a significant number of research contributions on the subject, and highlighting the advertisement policies developed by researchers. It also sheds light on some open issues not covered or poorly addressed by the surveyed contributions.
{"title":"Network Formation in IEEE 802.15.4e Time Slotted Channel Hopping: A Survey","authors":"Mohamed Remli, Oualid Demigha, A. Yachir","doi":"10.1109/ICRAMI52622.2021.9585975","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585975","url":null,"abstract":"Time Slotted Channel Hopping (TSCH) is a communication mode of the IEEE 802.15.4e standard introduced as an enhancement to the previous standard (IEEE 802.15.42011) to address the industrial market. This mode is designed specifically for process automation and factory monitoring. It uses time-slotted access and channel hopping mechanism. It also provides low latency and high reliability reducing remarkably the energy consumption. Moreover, the 6TiSCH protocol stack combines TSCH with IPv6 to form a well-tuned and complete networking solution. A key element that significantly affects the adoption of TSCH as a MAC protocol is the performance of the network formation process in terms of joining delay and power consumption. This paper studies the process of network formation both in TSCH and 6TiSCH networks, surveying a significant number of research contributions on the subject, and highlighting the advertisement policies developed by researchers. It also sheds light on some open issues not covered or poorly addressed by the surveyed contributions.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115837211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/ICRAMI52622.2021.9585911
Maarouf Korichi, Djamel Samai, A. Meraoumia, A. Benlamoudi
Recently, 3D palmprint recognition systems have started to gain the attention of researchers compared to their 2D counterpart. The key task in the design of a biometric identification system is the choice of the method of extracting discriminating information from 2D/3D images. Given the enormous success of deep learning approaches in the field of feature extraction and classification, we propose in this paper the use of Transfer learning networks in order to build a palmprint based person identification system. Also, this paper aims to show the efficiency of feature selection to improve system performance. To do this, a Relief method was used to perform the feature selection task. Experiments on a 2D/3D palmprint database with 8000 samples show that the proposed scheme can significantly improve the efficiency of palmprint identification.
{"title":"Towards Effective 2D and 3D Palmprint Recognition Using Transfer Learning Deep Features and RelifF method","authors":"Maarouf Korichi, Djamel Samai, A. Meraoumia, A. Benlamoudi","doi":"10.1109/ICRAMI52622.2021.9585911","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585911","url":null,"abstract":"Recently, 3D palmprint recognition systems have started to gain the attention of researchers compared to their 2D counterpart. The key task in the design of a biometric identification system is the choice of the method of extracting discriminating information from 2D/3D images. Given the enormous success of deep learning approaches in the field of feature extraction and classification, we propose in this paper the use of Transfer learning networks in order to build a palmprint based person identification system. Also, this paper aims to show the efficiency of feature selection to improve system performance. To do this, a Relief method was used to perform the feature selection task. Experiments on a 2D/3D palmprint database with 8000 samples show that the proposed scheme can significantly improve the efficiency of palmprint identification.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125042266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/ICRAMI52622.2021.9585912
R. Allaoua, R. Cheurfa, A. Bendjeddou
In this paper, we introduce a class of quartic differential system from the integrability and the existence of limit cycle. We show that this class is integrable and we give the explicit expression of first integral. After this, we prove, under suitable conditions on the parameters, that this class admits a non-algebraic limit cycle surrounding an unstable node. Concerning the singular points at infinity, we show that there is only one singular point. As an illustration, a phase portrait is drawn at the end of this paper.Mathematics Subject Classification: 34A05, 34C05, 34C07, 34C25.
{"title":"Qualitative Study of a Class of Quartic Differential System with an Unstable Node","authors":"R. Allaoua, R. Cheurfa, A. Bendjeddou","doi":"10.1109/ICRAMI52622.2021.9585912","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585912","url":null,"abstract":"In this paper, we introduce a class of quartic differential system from the integrability and the existence of limit cycle. We show that this class is integrable and we give the explicit expression of first integral. After this, we prove, under suitable conditions on the parameters, that this class admits a non-algebraic limit cycle surrounding an unstable node. Concerning the singular points at infinity, we show that there is only one singular point. As an illustration, a phase portrait is drawn at the end of this paper.Mathematics Subject Classification: 34A05, 34C05, 34C07, 34C25.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125543922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/ICRAMI52622.2021.9585963
L. Tabharit, Maghnia Hamou Maamar
Viral hepatitis C is an inflammation caused by a virus of type C (HCV) that can lead to progressive liver failure. An immune response to eliminate the virus can cause severe deformities such as cirrhosis, hepatocellular carcinoma and even death. The aim of this research is to study the HCV-complications’ evolution and show how the treatment’s administration can act to reduce the risk of the transmission, the complexity and the severity of the disease and therefore the costs. Firstly, the model’s formulation is proposed. Then, the model solution’s existence and uniqueness are discussed. Thereafter, the stability analysis of the proposed model is presented. Finally, numerical simulations are presented to support the effectiveness of the theoretical analysis and to prove the positive effect of early treatment on the evolution of HCV-complications.
{"title":"Mathematical Modeling of Chronic Hepatitis C Treatment’s Effect on the Evolution of its Complications","authors":"L. Tabharit, Maghnia Hamou Maamar","doi":"10.1109/ICRAMI52622.2021.9585963","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585963","url":null,"abstract":"Viral hepatitis C is an inflammation caused by a virus of type C (HCV) that can lead to progressive liver failure. An immune response to eliminate the virus can cause severe deformities such as cirrhosis, hepatocellular carcinoma and even death. The aim of this research is to study the HCV-complications’ evolution and show how the treatment’s administration can act to reduce the risk of the transmission, the complexity and the severity of the disease and therefore the costs. Firstly, the model’s formulation is proposed. Then, the model solution’s existence and uniqueness are discussed. Thereafter, the stability analysis of the proposed model is presented. Finally, numerical simulations are presented to support the effectiveness of the theoretical analysis and to prove the positive effect of early treatment on the evolution of HCV-complications.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124676018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/ICRAMI52622.2021.9585953
Besma Bekkai, H. Bendjenna, Ilham Kitouni
We can consider The Internet of Things (IoT) as a prototyping model where daily goals can be situated with distinctiving, feeling, networking and treating abilities that will flavor them to cooperate with altogether and with different apparatuses and favors over the internet to fulfill some objectives. A physical goal is the ingrained structure block of the IoT, famed as an intelligent tool that can observe our surroundings. The IoT is delegated by the ultimate proceeds in RFID, intelligent sensors, network technologies, and net protocols. The code declare is to have clever sensors join instantly without person participation to unleash a novel class of applications. IoT undergoes from different challenges such as scalability, safety, and interoperability. The fundamental intention of our work is to provide the ultimate technologies, protocols and architectures, their corresponding trends and details in a systematic manner. Moreover, research challenges have been inquired to unite the lacuna within the common diverges of architectures to actuate the academics and industries to get implicated in seeking the strict force of the Internet of Things. This paper will be also helpful for further research.
{"title":"Internet of Things: A Recent Survey","authors":"Besma Bekkai, H. Bendjenna, Ilham Kitouni","doi":"10.1109/ICRAMI52622.2021.9585953","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585953","url":null,"abstract":"We can consider The Internet of Things (IoT) as a prototyping model where daily goals can be situated with distinctiving, feeling, networking and treating abilities that will flavor them to cooperate with altogether and with different apparatuses and favors over the internet to fulfill some objectives. A physical goal is the ingrained structure block of the IoT, famed as an intelligent tool that can observe our surroundings. The IoT is delegated by the ultimate proceeds in RFID, intelligent sensors, network technologies, and net protocols. The code declare is to have clever sensors join instantly without person participation to unleash a novel class of applications. IoT undergoes from different challenges such as scalability, safety, and interoperability. The fundamental intention of our work is to provide the ultimate technologies, protocols and architectures, their corresponding trends and details in a systematic manner. Moreover, research challenges have been inquired to unite the lacuna within the common diverges of architectures to actuate the academics and industries to get implicated in seeking the strict force of the Internet of Things. This paper will be also helpful for further research.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115956413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/ICRAMI52622.2021.9585945
Faizi Rima, Atmania Rahima
In this paper, we consider a parabolic equation involving Caputo’s time-fractional derivative of order α ∈ (0, 1), called subdiffusion problem. We obtain existence, uniqueness and stability results of weak solution for the reaction-diffusion problem in view of fixed point theory. Then, we study an inverse coefficient problem with an output data g(t) for a fixed point space.
{"title":"Weak Solution for a Time-fractional Parabolic Problem with Application to an Inverse Problem","authors":"Faizi Rima, Atmania Rahima","doi":"10.1109/ICRAMI52622.2021.9585945","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585945","url":null,"abstract":"In this paper, we consider a parabolic equation involving Caputo’s time-fractional derivative of order α ∈ (0, 1), called subdiffusion problem. We obtain existence, uniqueness and stability results of weak solution for the reaction-diffusion problem in view of fixed point theory. Then, we study an inverse coefficient problem with an output data g(t) for a fixed point space.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126439553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/ICRAMI52622.2021.9585995
Makhlouf Ledmi, Abdeldjalil Ledmi, Mohammed El Habib Souidi
In this paper, we investigate the automatic classification of XML documents into predefined categories. We propose to develop a classification model by combining the content and structure of documents. Furthermore, we propose to use semantic resources, specifically WordNet and ontology linked to the terms of the corpus, in order to model the notion of the semantic neighborhood by using a calculation regarding the similarity between terms.To validate the results, we used the INEX 2007 XML corpus.
{"title":"Classification of XML Documents Using Semantic Resources","authors":"Makhlouf Ledmi, Abdeldjalil Ledmi, Mohammed El Habib Souidi","doi":"10.1109/ICRAMI52622.2021.9585995","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585995","url":null,"abstract":"In this paper, we investigate the automatic classification of XML documents into predefined categories. We propose to develop a classification model by combining the content and structure of documents. Furthermore, we propose to use semantic resources, specifically WordNet and ontology linked to the terms of the corpus, in order to model the notion of the semantic neighborhood by using a calculation regarding the similarity between terms.To validate the results, we used the INEX 2007 XML corpus.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126987269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/ICRAMI52622.2021.9585959
Mellah Mohamed, Ouannas Adel
This paper aims to present a general approach to control fractional discrete neural networks. We prove a new theorem, which ensures the stabilization of some fractional discrete neural networks class’s utilzing the Lyapunov approach. A numerical example and simulation results are reported to confirm the stabilization approach efficiency.
{"title":"A Robust Control of Fractional Discrete Neural Networks","authors":"Mellah Mohamed, Ouannas Adel","doi":"10.1109/ICRAMI52622.2021.9585959","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585959","url":null,"abstract":"This paper aims to present a general approach to control fractional discrete neural networks. We prove a new theorem, which ensures the stabilization of some fractional discrete neural networks class’s utilzing the Lyapunov approach. A numerical example and simulation results are reported to confirm the stabilization approach efficiency.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122194604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/ICRAMI52622.2021.9585969
M. I. Khaber, A. Moussaoui, Mohamed Saidi
Machine translation (MT) is the automatic translation of natural language texts. The complexities and incompatibilities of natural languages make MT an arduous task facing several challenges, especially when it is to be compared to a human translation. Neural Machine Translation (NMT) has to make MT results closer to human expectations with the advent of deep-learning artificial intelligence. The newest deep learning approaches are based on Recurrent Neural Networks (RNN), transformers, complex convolutions, and employing encoder/decoder pairs. In this work, we propose a new attention-based encoder-decoder model with monolingual and multilingual for MT. The Training has been several models with single languages and one model with several languages on both of our long short-term memory (LSTM) architecture and Transformer. We show that the Transformer outperforms the LSTM within our specific neural machine translation task. These models are evaluated using IWSLT2016 datasets, which contain a training dataset for three languages, test2015 and test2016 dataset for testing. These experiments show a 93.9% accuracy, which we can estimate as a 5 BLEU point improvement over the previous studies. (metric used in MT).
{"title":"Mono and Multi-Lingual Machine Translation Using Deep Attention-based Models","authors":"M. I. Khaber, A. Moussaoui, Mohamed Saidi","doi":"10.1109/ICRAMI52622.2021.9585969","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585969","url":null,"abstract":"Machine translation (MT) is the automatic translation of natural language texts. The complexities and incompatibilities of natural languages make MT an arduous task facing several challenges, especially when it is to be compared to a human translation. Neural Machine Translation (NMT) has to make MT results closer to human expectations with the advent of deep-learning artificial intelligence. The newest deep learning approaches are based on Recurrent Neural Networks (RNN), transformers, complex convolutions, and employing encoder/decoder pairs. In this work, we propose a new attention-based encoder-decoder model with monolingual and multilingual for MT. The Training has been several models with single languages and one model with several languages on both of our long short-term memory (LSTM) architecture and Transformer. We show that the Transformer outperforms the LSTM within our specific neural machine translation task. These models are evaluated using IWSLT2016 datasets, which contain a training dataset for three languages, test2015 and test2016 dataset for testing. These experiments show a 93.9% accuracy, which we can estimate as a 5 BLEU point improvement over the previous studies. (metric used in MT).","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128298585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}