The Faculty of Science and Techniques of Marrakech organizes the 3rd edition of the International Conference on Networking, Information Systems & Security (NISS 2020)
NISS is a comprehensive conference focused on the various aspects of advances in Information systems, Security and Networking Technologies. The main purpose of NISS 2020 is to improve our research by achieving the highest capability and encourage open discussions on recent advances in computer communication and information technologies.
Authors are invited to submit original unpublished manuscripts that demonstrate recent advances in computer communications, wireless/mobile networks, information systems, intelligent systems and security in the theoretical and practical aspects. Accepted papers will be published in the ACM ICPS series with an assigned ISBN: 978-1-4503-7634-1.
All accepted papers will be available in ACM Digital Library and will be submitted for indexing on Scopus.
Extended (50%) of selected papers will be published as a chapters in the "Emerging Trends in ICT for Sustainable Development" Book ( Springer Series)
The organizing committee have been monitoring the developing COVID-2019 situation. The safety and well-being of all conference participants is our first priority.
After studying and evaluating the announcements, guidance, and news released by relevant national departments, the organizing committee has made the decision to turn NISS 2020 into a virtual conference.
Tuesday March 31
, 2020 |
||||
08h45-09h00am |
Welcome Talk:
|
|||
09h00-10h00am |
Keynote Speaker: Prof. Steven Furnell , Centre for Security, Communications & Network Research at the University of Plymouth UK "Passwords: A lesson in cybersecurity failure? " Session moderated by Prof. Boudhir Anouar Abdelhakim |
|||
10h00-11h30am |
Session 1 |
Session 2 |
Session 3 |
Session 4 & Nice20 |
11h30am-12h00 |
Break |
|||
12h00-1h30pm |
Session 5 |
Session 6 |
Session 7 |
Session 8 & Nice 20 |
01h30-02h15pm |
Keynote Speaker: Prof. Mohammed BOUHOMRA Abdelmalek Essaadi University " IoT: Architectures & Applications" Session moderated by Prof. Mohamed BEN AHMED |
|||
02h15-03h00pm |
Keynote Speaker: Prof. Serge MIRANDA Nice Sophia Antipolis University, Nice, France " owards a unifying theory for BIG DATA management (and data lakes) based upon CATEGORIES" Session moderated by Prof. Lotfi EL ACHAAK. |
03h00-04h30pm |
Session 9 |
Session 10 |
Session 11 |
Session 12 & MLA |
04h30-05h00pm |
Break |
|||
05h00-06h00pm
| Poster Session 1 |
Poster Session 2 |
||
06h00-07h00pm |
Break |
|||
07h00-07h30pm |
Awards Attribution Conference Cloture |
Session 1 : Artificial Intelligence 1; Chair: Prof. Lotfi EL ACHAAK Tuesday, March 31 From 3:00pm to 04:30pm |
Three-level binary tree structure for sentiment classification in Arabic text Redouane Ezzahir, Hajar Ait Addi and Abdelhak Mahmoudi |
Recidivism forecasting: A study on process of feature selection Amal Azeroual, Youssef Taher and Benayad Nsiri |
Inferring SQL Queries Using Interactivity Karam Ahkouk, Mustapha Machkour and Jilali Antari |
Ankle Gait-Pattern Generators Amine Mohamed Mamou and Nadia Saadia |
Frequency Assignement Mohamed El Bouti, Rouan El Ghazi, Lamia Benameur and Jihane Alami Chentoufi |
A Question Answering System with a Sequence to Sequence Grammatical Correction Afrae Bghiel, Mohamed Ben Ahmed and Abdelhakim Boudhir Anouar |
A Smart Chatbot Architecture based NLP and Machine learning for health care assistance Ayanouz Soufyane, A.Boudhir & M.Ben Ahmed |
Session 2 : CLOUD COMPUTING & BIGDATA TECHNOLOGIES 1; Chair: Prof. BOUDHIR Anouar Abdelhakim Tuesday, March 31 From 3:00pm to 04:30pm |
CSMAS: Improving Multi-Agent Credit Scoring System by Integrating Big Data and the new generation of Gradient Boosting Algorithms Youssef Tounsi, Houda Anoun and Larbi Hassouni |
Fog Computing for Smart Healthcare data Analytics: an urgent necessity Hayat Khaloufi, Karim Abouelmehdi and Abderrahim Beni-Hssane |
Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud Nickson M Karie, Ikuesan Richard Adeyemi, Victor R. Kebande and Mehdi Mehdi Sookhak |
Mobile Cloud Computing: Architecture, Advantages and Security Issues Hadjer Fellah, Mezioud Chaker and Mohammed Chaouki Batouche |
Session 3 : Security 1; Chair: Prof. Moulay Driss LAANAOUI & Prof Mohamed BEN AHMED Tuesday, March 31 From 3:00pm to 04:30pm |
FSpeedy and efficient malwares images classifier using reduced GIST features for a new defense guide Ikram Ben Abdel Ouahab, Lotfi El Aachak, Anouar Abdelhakim Boudhir and Mohammed Bouhorma |
Compressive Sensing Based on Homomorphic Encryption and Attack Classification using Machine Learning Algorithm in WSN Security Samir Ifzarne, Imad Hafidi and Nadia Idrissi |
An Algorithm for Digital Image Watermarking using 2-Level DWT, DCT and QR Decomposition based on Optimal Blocks Selection Zairi Mourad, Boujiha Tarik and Ouelli Abdelhaq |
Practical Approach to Urban Crime Prevention in Developing Nations Richard Ikuesan, Yusuf Opaluwa, Shefiu Ganiyu, Ismaila Idris, Oluibukun Ajayi, Umar Dauda, Umar Majigi and Jonathan Gondyi |
Session 4 : E-Learning ; Chair: Prof. Yassine EL YOUSSEFI Tuesday, March 31 From 3:00pm to 04:30pm |
Unified Process to Design and Develop Serious Games for Schoolchild Younes Alaoui, Lotfi Elaachak, Mohammed Bouhorma and Amine Belahbibe |
An Adaptive Learning Approach for Better Retention of Learners in MOOCs El Miloud Smaili, Soukaina Sraidi, Salma Azzouzi and My El Hassan Charaf |
Smartphone learning for kids edutainment Ehlem Zigh, Ayoub Elhoucine, Abderrahmane Mallek, Mohammed Kadiri, Belkacem Kouninef and Tolga Ensari |
A new approach to reduce the dropout rate in E-learning Dhaiouir Ilham, Ezziyyani Mostafa and Khaldi Mohamed |
Adaptive E-learning: Adaptation of content according to the continuous evolution of the learner during his training
Mohammed Zaoudi and Hicham Belhadaoui |
Knowledge Management in the Expert Model of the Smart Tutoring System
Fatima-Zohra Hibbi, Otman Abdoun and Haimoudi El Khatir |
Proposal of the solution of virtual basic schools in rural areas of African countries in conflict: Case of the Central African Republic
Ghislain Mervyl Saint-Juste Kossingou, Nadege Ndassimba, Edgard Ndassimba, Keba Gueye and Samuel Pr. Ouya |
Session 5 : Artificial Intelligence 2; Chair: Prof. Said RAGHAY & Prof Lotfi EL ACHAAK Tuesday, March 31 From 05:00pm to 06:30pm |
Pathological Images Classification using Deep Convolutional Networks Yousra Dahdouh, Abdelhakim Anouar Boudhir and Mohamed Ben Ahmed |
Towards analyzing crash events for novice drivers under reduced-visibility settings: A simulator study Zouhair Elamrani Abou Elassad, Hajar Mousannif and Hassan Al Moatassime |
Contribution of Artificial Neural Network in Predicting Completeness Through the Impact and Complexity of its Improvement Jaouad Maqboul and Bouchaib Bounaba |
LSTM-based Models for Earthquake Prediction Asmae Berhich, Fatima-Zahra Belouadha and Mohammed Issam Kabbaj |
Diabetes Diseases Prediction Using Supervised Machine Learning and Neighbourhood Components Analysis Othmane Daanouni, Bouchaib Cherradi and Amal Tmiri |
Machine Learning Methods for Air Quality Monitoring Mohamed Akram Zaytar and Chaker El Amrani |
Study and Analysis of Data Analysis Systems (Reconstruction of a Learning Data from the Initial Data)
Sara Belattar, Otman Abdoun and El Khatir Haimoudi |
Recognition and reconstruction of road markings with Generative Adversarial Networks (GANs)
Samir Allach, Mohamed Ben Ahmed and Anouar Abdelhakim Boudhir |
Session 6 : Networking 1; Chair: Prof. BOUDHIR Anouar Abdelhakim Tuesday, March 31 From 05:00pm to 06:30pm |
Considering the environment's characteristics in wireless networks simulations and emulations: case of popular Simulators and WSN Abdelhak El-Mouaffak and Abdelbaki El Belrhiti El Alaoui |
An Adaptive Clustering Algorithm Based on k-means for VANET road safety Aziz MAHBOUB |
Adaptation of quality for video streaming in a Bittorrent P2P IMS network Adnane Ghani, El Hassan Ibn El Haj, Ahmed Hammouch and Abdelaali Chaoub |
Sensors Transposing Technique for Minimizing the Path Loss Effect and Enhancement of Battery Lifetime in Wireless Body Area Sensor Networks Rahat Ali Khan and Shahzad Memon |
A comparative study of Machine learning algorithms for VANET networks Sara Ftaimi and Tomader Mazri |
Comparative analysis of TCP congestion control mechanisms Kaoutar Bazi and Bouchaib Nassereddine |
Session 7 : Security 2; Chair: Prof. Mohamed BEN AHMED Tuesday, March 31 From 05:00pm to 06:30pm |
Internet of Things: Classification of attacks using CTM method Hind Meziane, Noura Ouerdi, Mohammed Amine Kasmi and Sanae Mazouz |
Verification of Integrity in Vehicle Architectures Christine Jakobs, Billy Naumann, Matthias Werner and Karsten Schmidt |
Web OAuth-based SSO Systems Security Yassine Sadqi, Yousra Belfaik and Said Safi |
Performance Assessment of Open Source IDS for improving IoT Architecture Security Focus on Snort, Suricata, and BRO implemented on WBANs, Network and cloud layers Mouna Boujrad, Saiida Lazaar and Mohammed Hassine |
Definition and implementation of an elliptic curve cryptosystem using a new message mapping scheme Younes Lahraoui, Youssef Amal and Saiida Lazaar |
Session 8 : CLOUD COMPUTING & BIGDATA TECHNOLOGIES 2 ; Chair: Moulay Driss LAANAOUI & Prof. Yassine EL YOUSSEFI Tuesday, March 31 From 5:00pm to 06:30pm |
Model Transformation From Object Relational Database to NoSQL Column Based Database Fouad Toufik and Mohamed Bahaj |
Real-time prediction of accident using Big data system Mouad Tantaoui, My Driss Laanaoui and Mustapha Kabil |
Modelling Sustainability, Cloud computing and knowledge transmission in education in developing countries
Ahmed Mehrez and Lamia Aladel |
An improved modeling method for profile-based personalized search Anas El-Ansari, Abderrahim Beni-Hssane and Mostafa Saadi |
Session 9 : Image Processing ; Chair: Prof. Aziz MAHBOUB Wednesday, April 01 From 10h45am to 12h30pm |
Post-Fall Time Accounting for Fall Detection Using a Portable Camera Isma Boudouane, Amina Makhlouf, Mohamed Aures Harkat, Nadia Saadia and Amar Ramdane-Cherif |
Approach of Constructing An Islamic Pattern Respecting The "Hasba" Method Yassine Ait Lahcen, Abdelaziz Jali and Ahmed El Oirrak |
Motion Detection Using the Dynamic Color Texture Bellamine Insaf, Silkan Hassan and Tmiri Amal |
Speckle correlation fringes denoising and demodulation using directional total variation and ridgelet transform Mustapha Bahich and Mohammed Bailich |
A machine learning color-based segmentation for object detection within dual X-ray baggage images Mohamed Chouai, Mostefa Merah, José-Luis Sancho-Gómez and Mimi Malika |
Cooling Fan Combined Fault Vibration Analysis Using Convolutional Neural Network Classifier Azzeddine Dekhane, Adel Djellal, Fouaz Boutebbakh and Rabah Lakel |
Session 10 : Networking 2 ; Chair: Prof. Moulay Driss LAANAOUI & Prof. BOUDHIR Anour Abdelhakim Wednesday, April 01 From 10h45am to 12h30pm |
Normality Test to Detect the Congestion in MANET by Using OLSR Protocol Abdellah Nabou, My Driss Laanaoui, Mohammed Ouzzif and Mohammed-Alamine El Houssaini |
Evaluation and Comparative Study of the Both Algorithm LEACH and PEGASIS Based on Energy Consumption Fatima Es-Sabery and Abdellatif Hair |
AGEM-based Multipath Routing Protocol using Triangle Link Quality for Wireless Multimedia Sensor networks
Asma Chikh and Mohamed Lehsaini |
Massive-MIMO Configuration of Multipolarized ULA and UCA in 5G Wireless Communications Abdelhamid Riadi, Mohamed Boulouird and Hassani Moha M'rabet |
New Frequency Reconfigurable Patch Antenna for Wireless Communication Sanaa Errahili, Asma Khabba, Saida Ibnyaich and Moha M'Rabet Hassani |
A Novel Design of Miniaturized Leaf Shaped Antenna For 5G Mobile phones
Asma Khabba, Sanaa Errahili, Saida Ibnyaich and Moha M'Rabet Hassani |
Session 11 : Computing ; Chair: Prof. Said RAGHAY & Prof EL ACHAAK & Prof EL YOUSSEFI Wednesday, April 01 From 10h45am to 12h30pm |
A Theoretical Study on Project Delivery and Leadership Style Muhammad Hanif Nor Azman, Azlinah Mohamed and Edzreena Edza Odzaly |
Role of Information Technologies in Supply Chain Management Asmae Heddoun and Rhizlane Benrrezzouq |
Online Advertising On Consumer Purchasing Behavior: Effective Elements And Its Impact Nur Nadira Izlyn Kamaruddin, Azlinah Mohamed and Syaripah Ruzaini Syed Aris |
A new Framework to improve Change Mining in Configurable Process Asmae Hmami, Hanae Sbai and Mounia Fredj |
Feature Selection Methods in Sentiment Analysis Nurilhami Izzatie Khairi, Azlinah Mohamed and Nor Nadiah Yusof |
Collaborative Consumption Motives Nur Zahrah Farida Ruslan, Azlinah Mohamad and Norjansalika Janom |
Some Properties of Free Cyclic Codes over Finite Chain Rings Mohammed Sabiri, Youssef Bensalih and Aziz Elbour |
Session 12 : Security 3 : Chair: Prof. EL ARBI ABDELLAOUI ALAOUI Wednesday, April 01 From 10h45am to 12h30pm |
Enhanced Duplicate Count Strategy: Towards New Algorithms To Improve Duplicate Detection Youssef Aassem, Imad Hafidi and Noureddine Aboutabit |
IT Security and IT Governance Alignment Norli Shariffuddin and Azlinah Mohamed |
A Distributed Information Retrieval Approach for Copyright Protection Sonia Benbelgacem, Larbi Guezouli and Rachid Seghir |
Challenges & Emerging Threats on Cybersecurity Abdulla Hussain, Azlinah Mohamed and Suriyati Razali |
Invited Session MLA ; Chair: Prof. EL Arbi ABDELLAOUI ALAOUI Wednesday, April 01 From 10h45am to 12h30pm |
Sampling techniques for Arabic Sentiment Classification: A comparative study Hajar Ait Addi and Redouane Ezzahir |
Machine learning Approach for Early Detection of Glaucoma from Visual Fields El Arbi Abdellaoui Allaoui, Stephane Cedric Koumetio Tekouabou,Imane Chabbar, Imane Chabbar, Hassan Silkan |
Artificial Intelligence in Learning Skills Assessment: a Pedagogical Innovation Okacha Diyer, Naceur Achtaich and Khalid Najib |
Session Poster 1 ; Chair: Prof. Mohamed BEN AHMED Tuesday, March 31 From 04h15am to 04h45pm |
Face Sketch Recognition-An Overview Khalid Ounachad, Mohamed Oualla, Abdelghani Souhar and Abdelalim Sadiq |
Big Data Solutions Proposed for Cluster Computing Systems Challenges: A survey
Fatima Es-Sabery and Abdellatif Hair |
Latest Trends in Recommender Systems applied in the medical domain: A Systematic Review Oumaima Stitini, Omar Bencharef and Soulaimane Kaloun |
Deep Learning Algorithm and Their Applications in the Perception Problem Redouane Lhiadi |
Advanced Recommendation Systems Through Deep Learning Mohamed Khoali, Abdelhak Tali and Yassin Laaziz |
Session Poster 2 : Chair: Prof. Moulay Driss LAANAOUI & BOUDHIR Anouar Abdelhakim Wednesday, April 01 From 10h15am to 10h45pm |
Handwriting Recognition with Artificial Neural Networks A Decade Literature Review Ahmed Remaida, Aniss Moumen, Younes El Bouzekri El Idrissi and Zineb Sabri |
Role Of Reengineering In Training Of Specialists Dmitry Bystrov, Sanjar Giyasov, Mirzokhid Taniev and Sardor Urokov |
Fuzzy Systems For Computational Linguistics And Natural Language Dmitry Bystrov, Olimjon Toirov, Gulzoda Mustafakulova and Dilfuza Yakubova |
A survey on QoS-based communication protocols for IoT systems Nogaye Lo and Ibrahima Niang |
Big Data security and privacy techniques Lamia El Haourani, Anas Abou El Kalam and Abdellah Ait Ouahman |
A Survey of Intrusion Detection Algorithm in VANET Manale Boughnja and Tomader Mazri |
Using Machine Learning to Deal with Phishing and Spam Detection: An Overview Oumaima El Kouari, Hafssa Benaboud and Saiida Lazaar |
Natural Convection in a Differentially Heated Cavity with a Heated and Cooled Circular Cylinders Mohammed Boukendil, Lahcen El Moutaouakil, Zaki Zrikem and Abdelhalim Abdelbaki |
Authors are invited to submit original and unpublished work. Manuscripts should respect the conference template, including figures, tables, and references.The paper must be prepared by using the template in MS Word or LaTeX as PDF files through Easychair. The direct link for paper submission is
Papers are reviewed on the basis that they do not contain plagiarized material and have not been submitted to any other conference at the same time (double submission), a specific tool willbe used to detect plagiarism.. Each paper will be reviewed by at least three regular PC members in tow round of review . The acceptance decisions will take into account paper novelty, technical depth, elegance, practical or theoretical impact, and presentation. Authors of high quality papers will be invited to submit an extended version of their work for potential publication in a special issue/section of an international journal.
Registration is now open for the conference. The Early Bird Registration is available until February 06, 2020. In order to include accepted papers in the proeedings, at least one of the authors of the paper must be registered.
Each paper must be presented by an author at the conference. Failure to present a paper in the conference will result in the withdrawal of the paper from the conference. All attendees must pay the registration fees
PAYMENT
Conference registration fees includes:
Student Registration
Students must provide a valid student ID card or a letter from their University during registration.Faculty of Sciences and Techniques, Gueliz, Marrakech, Morocco
e-mail: ic.niss20@gmail.com