• 01.
  • 02.
  • 03.

The 3rd International Conference on Networking, Information Systems & Security

The Faculty of Science and Techniques of Marrakech organizes the 3rd edition of the International Conference on Networking, Information Systems & Security (NISS 2020) NISS is a comprehensive conference focused on the various aspects of advances in Information systems, Security and Networking Technologies. The main purpose of NISS 2020 is to improve our research by achieving the highest capability and encourage open discussions on recent advances in computer communication and information technologies.
Authors are invited to submit original unpublished manuscripts that demonstrate recent advances in computer communications, wireless/mobile networks, information systems, intelligent systems and security in the theoretical and practical aspects. Accepted papers will be published in the ACM ICPS series with an assigned ISBN: 978-1-4503-7634-1.
All accepted papers will be available in ACM Digital Library and will be submitted for indexing on Scopus.
Extended papers (50%) will be published as a chapters in one of specialized Book Series( Pending)

The Topics

01. Artificial Intelligence
02. Computing
03. Networking
04. Cloud Technlogies
05. Ambient Intelligence
06. e-Learning
07. Machine Vision
08. Security

01. Artificial Intelligence

  • Neural Networks
  • Deep Learning
  • Fuzzy Logic
  • Swarm Intelligence and Optimization
  • Natural Language Processing
  • Agents and Multi-agent Systems
  • Social computing and networks
  • Data Mining
  • Parallel Processing
  • Expert Systems

02. Computing

  • . Quantum Computing
  • . High Performance Computing
  • . Distributed and parallel systems
  • . Cognitive Computing
  • . Cloud Computing
  • . Grid Computing
  • . Embedded Computing
  • . Scalable Computing
  • . Human-centred Computing
  • . Mobile computing

03. Networking

  • Wireless/Mobile Networks (WBAN/WPAN/WLAN/WMAN/WWAN)
  • 5G/6G cellular systems and heterogeneous networks
  • Cognitive radio, cooperative communication and networking
  • Contents/Information centric networking (CCN/ICN)
  • Cross-layer design and optimization
  • Delay/Disruption tolerant network (DTN)
  • Device-to-device communications
  • Green Networks, and Smart Grid
  • Internet of things (IoT) and machine-to-machine (M2M) communications
  • Network survivability and reliability
  • Operating systems and middleware support for networking
  • Software defined networking (SDN) and network virtualization
  • Mobile Adhoc Networks
  • Vehicular and underwater networks
  • Ubiquitous home and office networking
  • Signal Processing
  • Satellite Communication Systems
  • Open Spectrum Solutions
  • Communication Protocols

04. Cloud Technologies

  • Cloud Architectures and Applications
  • Cloud Services and Applications
  • IoT and Mobile on Cloud
  • High Performance Computing using the Cloud
  • Distributed Cloud, Cloud Brokering or Edge Computing
  • Security and Privacy
  • Cloud Energy Efficiency

05. Ambient Intelligence

  • Smart Cities
  • Smart Grids and Energy Networks
  • Sensing and Sensor Networks
  • Ambient Assisted Living
  • Smart Healthcare
  • Intelligent Transportation
  • Data Science
  • Affective computing
  • Context-aware pervasive systems

06. E-Learning

  • e-Learning Tools
  • e-Learning Organisational Issues
  • Gamification
  • Collaborative Learning
  • Curriculum Content Desig
  • Educational Systems Design
  • Web-based Learning
  • Knowledge Base Development Models for AI
  • Knowledge Extraction tools and strategies
  • Learning Technologies
  • Science of Learning
  • M-Learning: Mobile Applications and Technologies 
  • Massive Open Online Courses (MOOC)
  • Virtual Learning Environments (VLE)
  • Learning Management Systems (LMS)  
  • Serious Games

07. Machine Vision

  • Human Computer Interaction
  • Computer Vision
  • Image Processing
  • Brain-Machine Interface
  • Geographic Information Systems
  • Video Analysis
  • Medical Diagnosis
  • Segmentation Techniques
  • Augmented Reality
  • Virtual Reality

08. Security

  • Cryptography
  • Quantum Cryptology
  • hardware implementations and side channel attacks
  • Intrusion Detection & Prevention
  • Mobile Security
  • Smart cards Security
  • Identity and Security in IoT
  • Security Policies, Formal methods & verification
  • Access Control Models
  • Communication and Information Security
  • Security and privacy for big data
  • Steganography
  • Watermarking
  • Fingerprinting
  • Stream ciphers
  • Privacy
  • Surveillance
  • Biometrics
  • Internet Security
  • Secure Transactions
  • Secure Protocols
  • Cyber Security

Provisional Program

Tuesday  March 31 , 2020
08h30-09h30am
Registration
9h30-10h30am
Opening Ceremony
  • Prof. ,
    Dean of Faculty of Sciences and Techniques of Marrakech, Morocco,
  • Prof. Said RAGHAY,
    Faculty of Sciences and Techniques of Marrakech, Conference Co-Chair,
  • Prof. Moulay Driss LAANAOUI,
    Faculty of Sciences and Techniques of Marrakech, Conference Co-Chair,
  • Prof. BOUDHIR Anouar Abdelhakim,
    Mediterranean Association of Sciences and Technologies, Conference Co-Chair,
10h30-11h00am
Welcome Coffee Break
11h00-11h45am
Keynote Speaker: Prof. Carlo Ghezzi , Politecnico di Milano, Italy
"Talk Title"
Session moderated by Prof.
11h45-12h30pm
Keynote Speaker: Prof. Mohammed BOUHOMRA Abdelmalek Essaadi University
" Talk Title"
Session moderated by Prof.
3h00-4h30pm
Session 1
Session 2
Session 3
Session 4
4h30-5h00pm
Coffee Break + Poster Session 1
5h00-6h30pm
Session 5
Session 6
Session 7
Session 8
Wednesday  April 01 , 2020
8h00 - 9h30am
Registration
09h30-10h15am
Keynote Speaker: Prof. , University,
" Talk Title"
Session moderated by Prof.
10h15-10h45am
Coffee Break + Poster Session 2
10h45-12h15pm
Session 9
Session 10
Session 11
Session 12 + MLA
12h15-12h45pm
Awards Attribution
Conference Cloture
15h00-19h00pm
Social Event : Marrakech City Sightseeing Tour

Session 1 : Artificial Intelligence 1; Chairs: Prof. & Prof.
Tuesday, March 31 From 3:00pm to 04:30pm
Three-level binary tree structure for sentiment classification in Arabic text
Redouane Ezzahir, Hajar Ait Addi and Abdelhak Mahmoudi
Recidivism forecasting: A study on process of feature selection
Amal Azeroual, Youssef Taher and Benayad Nsiri
Human Language Question To SQL Query Using Deep Learning
Karam Ahkouk, Mustapha Machkour and Jilali Antari
Ankle Gait-Pattern Generators
Amine Mohamed Mamou and Nadia Saadia
Frequency Assignement
Mohamed El Bouti, Rouan El Ghazi, Lamia Benameur and Jihane Alami Chentoufi
A comparative study of Machine learning algorithms for VANET networks
Sara Ftaimi and Tomader Mazri

Session 2 : CLOUD COMPUTING & BIGDATA TECHNOLOGIES 1; Chairs: Prof. & Prof.
Tuesday, March 31 From 3:00pm to 04:30pm
CSMAS: Improving Multi-Agent Credit Scoring System by Integrating Big Data and the new generation of Gradient Boosting Algorithms
Youssef Tounsi, Houda Anoun and Larbi Hassouni
Fog Computing for Smart Healthcare data Analytics: an urgent necessity
Hayat Khaloufi, Karim Abouelmehdi and Abderrahim Beni-Hssane
Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud
Nickson M Karie, Ikuesan Richard Adeyemi, Victor R. Kebande and Mehdi Mehdi Sookhak
Mobile Cloud Computing: Architecture, Advantages and Security Issues
Hadjer Fellah, Mezioud Chaker and Mohammed Chaouki Batouche

Session 3 : Security 1; Chairs: Prof. & Prof.
Tuesday, March 31 From 3:00pm to 04:30pm
FSpeedy and efficient malwares images classifier using reduced GIST features for a new defense guide
Ikram Ben Abdel Ouahab, Lotfi El Aachak, Anouar Abdelhakim Boudhir and Mohammed Bouhorma
Compressive Sensing Based on Homomorphic Encryption and Attack Classification using Machine Learning Algorithm in WSN Security
Samir Ifzarne, Imad Hafidi and Nadia Idrissi
An Algorithm for Digital Image Watermarking using 2-Level DWT, DCT and QR Decomposition based on Optimal Blocks Selection
Zairi Mourad, Boujiha Tarik and Ouelli Abdelhaq
Practical Approach to Urban Crime Prevention in Developing Nations
Richard Ikuesan, Yusuf Opaluwa, Shefiu Ganiyu, Ismaila Idris, Oluibukun Ajayi, Umar Dauda, Umar Majigi and Jonathan Gondyi

Session 4 : E-Learning ; Chairs: Prof. & Prof.
Tuesday, March 31 From 3:00pm to 04:30pm
Unified Process to Design and Develop Serious Games for Schoolchild
Younes Alaoui, Lotfi Elaachak, Mohammed Bouhorma and Amine Belahbibe
An Adaptive Learning Approach for Better Retention of Learners in MOOCs
El Miloud Smaili, Soukaina Sraidi, Salma Azzouzi and My El Hassan Charaf
Smartphone learning for kids edutainment
Ehlem Zigh, Ayoub Elhoucine, Abderrahmane Mallek, Mohammed Kadiri, Belkacem Kouninef and Tolga Ensari
A new approach to reduce the dropout rate in E-learning
Dhaiouir Ilham, Ezziyyani Mostafa and Khaldi Mohamed
Adaptive E-learning: Adaptation of content according to the continuous evolution of the learner during his training
Mohammed Zaoudi and Hicham Belhadaoui

Session 5 : Artificial Intelligence 2; Chairs: Prof. & Prof.
Tuesday, March 31 From 05:00pm to 06:30pm
Towards analyzing crash events for novice drivers under reduced-visibility settings: A simulator study
Zouhair Elamrani Abou Elassad, Hajar Mousannif and Hassan Al Moatassime
Contribution of Artificial Neural Network in Predicting Completeness Through the Impact and Complexity of its Improvement
Jaouad Maqboul and Bouchaib Bounaba
LSTM-based Models for Earthquake Prediction
Asmae Berhich, Fatima-Zahra Belouadha and Mohammed Issam Kabbaj
Diabetes Diseases Prediction Using Supervised Machine Learning and Neighbourhood Components Analysis
Othmane Daanouni, Bouchaib Cherradi and Amal Tmiri
Machine Learning Methods for Air Quality Monitoring
Mohamed Akram Zaytar and Chaker El Amrani
Study and Analysis of Data Analysis Systems (Reconstruction of a Learning Data from the Initial Data)
Sara Belattar, Otman Abdoun and El Khatir Haimoudi

Session 6 : Networking 1; Chairs: Prof. & Prof.
Tuesday, March 31 From 05:00pm to 06:30pm
Considering the environment's characteristics in wireless networks simulations and emulations: case of popular Simulators and WSN
Abdelhak El-Mouaffak and Abdelbaki El Belrhiti El Alaoui
Adaptation of quality for video streaming in a Bittorrent P2P IMS network
Adnane Ghani, El Hassan Ibn El Haj, Ahmed Hammouch and Abdelaali Chaoub
Sensors Transposing Technique for Minimizing the Path Loss Effect and Enhancement of Battery Lifetime in Wireless Body Area Sensor Networks
Rahat Ali Khan and Shahzad Memon
Comparative analysis of TCP congestion control mechanisms
Kaoutar Bazi and Bouchaib Nassereddine

Session 7 : Security 2; Chairs: Prof. & Prof.
Tuesday, March 31 From 05:00pm to 06:30pm
Internet of Things: Classification of attacks using CTM method
Hind Meziane, Noura Ouerdi, Mohammed Amine Kasmi and Sanae Mazouz
Verification of Integrity in Vehicle Architectures
Christine Jakobs, Billy Naumann, Matthias Werner and Karsten Schmidt
Web OAuth-based SSO Systems Security
Yassine Sadqi, Yousra Belfaik and Said Safi
Performance Assessment of Open Source IDS for improving IoT Architecture Security Focus on Snort, Suricata, and BRO implemented on WBANs, Network and cloud layers
Mouna Boujrad, Saiida Lazaar and Mohammed Hassine
Definition and implementation of an elliptic curve cryptosystem using a new message mapping scheme
Younes Lahraoui, Youssef Amal and Saiida Lazaar

Session 8 : CLOUD COMPUTING & BIGDATA TECHNOLOGIES 2 ; Chairs: Prof. & Prof.
Tuesday, March 31 From 5:00pm to 06:30pm
Model Transformation From Object Relational Database to NoSQL Column Based Database
Fouad Toufik and Mohamed Bahaj
Real-time prediction of accident using Big data system
Mouad Tantaoui, My Driss Laanaoui and Mustapha Kabil
Modelling Sustainability, Cloud computing and knowledge transmission in education in developing countries
Ahmed Mehrez and Lamia Aladel
An improved modeling method for profile-based personalized search
Anas El-Ansari, Abderrahim Beni-Hssane and Mostafa Saadi


Session 9 : Image Processing ; Chairs: Prof. & Prof.
Wednesday, April 01 From 10h45am to 12h30pm
Post-Fall Time Accounting for Fall Detection Using a Portable Camera
Isma Boudouane, Amina Makhlouf, Mohamed Aures Harkat, Nadia Saadia and Amar Ramdane-Cherif
Approach of Constructing An Islamic Pattern Respecting The "Hasba" Method
Yassine Ait Lahcen, Abdelaziz Jali and Ahmed El Oirrak
Motion Detection Using the Dynamic Color Texture
Bellamine Insaf, Silkan Hassan and Tmiri Amal
Speckle correlation fringes denoising and demodulation using directional total variation and ridgelet transform
Mustapha Bahich and Mohammed Bailich
A machine learning color-based segmentation for object detection within dual X-ray baggage images
Mohamed Chouai, Mostefa Merah, José-Luis Sancho-Gómez and Mimi Malika
Cooling Fan Combined Fault Vibration Analysis Using Convolutional Neural Network Classifier

Session 10 : Networking 2 ; Chairs: Prof. & Prof.
Wednesday, April 01 From 10h45am to 12h30pm
Normality Test to Detect the Congestion in MANET by Using OLSR Protocol
Abdellah Nabou, My Driss Laanaoui, Mohammed Ouzzif and Mohammed-Alamine El Houssaini
Evaluation and Comparative Study of the Both Algorithm LEACH and PEGASIS Based on Energy Consumption
Fatima Es-Sabery and Abdellatif Hair
AGEM-based Multipath Routing Protocol using Triangle Link Quality for Wireless Multimedia Sensor networks
Asma Chikh and Mohamed Lehsaini
Massive-MIMO Configuration of Multipolarized ULA and UCA in 5G Wireless Communications
Abdelhamid Riadi, Mohamed Boulouird and Hassani Moha M'rabet
New Frequency Reconfigurable Patch Antenna for Wireless Communication
Sanaa Errahili, Asma Khabba, Saida Ibnyaich and Moha M'Rabet Hassani
A Novel Design of Miniaturized Leaf Shaped Antenna For 5G Mobile phones
Asma Khabba, Sanaa Errahili, Saida Ibnyaich and Moha M'Rabet Hassani

Session 11 : Computing ; Chairs: Prof. & Prof.
Wednesday, April 01 From 10h45am to 12h30pm
A Theoretical Study on Project Delivery and Leadership Style
Muhammad Hanif Nor Azman, Azlinah Mohamed and Edzreena Edza Odzaly
Role of Information Technologies in Supply Chain Management
Asmae Heddoun and Rhizlane Benrrezzouq
Online Advertising On Consumer Purchasing Behavior: Effective Elements And Its Impact
Nur Nadira Izlyn Kamaruddin, Azlinah Mohamed and Syaripah Ruzaini Syed Aris
A new Framework to improve Change Mining in Configurable Process
Asmae Hmami, Hanae Sbai and Mounia Fredj
Feature Selection Methods in Sentiment Analysis
Nurilhami Izzatie Khairi, Azlinah Mohamed and Nor Nadiah Yusof
Collaborative Consumption Motives
Nur Zahrah Farida Ruslan, Azlinah Mohamad and Norjansalika Janom
Some Properties of Free Cyclic Codes over Finite Chain Rings
Mohammed Sabiri, Youssef Bensalih and Aziz Elbour

Session 12 : Security 3 ; Chairs: Prof. & Prof.
Wednesday, April 01 From 10h45am to 12h30pm
Enhanced Duplicate Count Strategy: Towards New Algorithms To Improve Duplicate Detection
Youssef Aassem, Imad Hafidi and Noureddine Aboutabit
IT Security and IT Governance Alignment
Norli Shariffuddin and Azlinah Mohamed
A Distributed Information Retrieval Approach for Copyright Protection
Sonia Benbelgacem, Larbi Guezouli and Rachid Seghir
Challenges & Emerging Threats on Cybersecurity
Abdulla Hussain, Azlinah Mohamed and Suriyati Razali

Invited Session MLA ; Chairs: Prof. & Prof.
Wednesday, April 01 From 10h45am to 12h30pm
Sampling techniques for Arabic Sentiment Classification: A comparative study
Hajar Ait Addi and Redouane Ezzahir
Stabilization of Schrödinger equations with constant coefficients and fractional boundary
Artificial Intelligence in Learning Skills Assessment: a Pedagogical Innovation
Okacha Diyer, Naceur Achtaich and Khalid Najib

Session Poster 1 ; Chairs: Prof. & Prof.
Tuesday, March 31 From 04h15am to 04h45pm
Face Sketch Recognition-An Overview
Khalid Ounachad, Mohamed Oualla, Abdelghani Souhar and Abdelalim Sadiq
Big Data Solutions Proposed for Cluster Computing Systems Challenges: A survey
Fatima Es-Sabery and Abdellatif Hair
Latest Trends in Recommender Systems applied in the medical domain: A Systematic Review
Oumaima Stitini, Omar Bencharef and Soulaimane Kaloun
Deep Learning Algorithm and Their Applications in the Perception Problem
Redouane Lhiadi
Advanced Recommendation Systems Through Deep Learning
Mohamed Khoali, Abdelhak Tali and Yassin Laaziz

Session Poster 2 ; Chairs: Prof. & Prof.
Wednesday, April 01 From 10h15am to 10h45pm
Handwriting Recognition with Artificial Neural Networks A Decade Literature Review
Ahmed Remaida, Aniss Moumen, Younes El Bouzekri El Idrissi and Zineb Sabri
Role Of Reengineering In Training Of Specialists
Dmitry Bystrov, Sanjar Giyasov, Mirzokhid Taniev and Sardor Urokov
Fuzzy Systems For Computational Linguistics And Natural Language
Dmitry Bystrov, Olimjon Toirov, Gulzoda Mustafakulova and Dilfuza Yakubova
A survey on QoS-based communication protocols for IoT systems
Nogaye Lo and Ibrahima Niang
Big Data security and privacy techniques
Lamia El Haourani, Anas Abou El Kalam and Abdellah Ait Ouahman
A Survey of Intrusion Detection Algorithm in VANET
Manale Boughnja and Tomader Mazri
Using Machine Learning to Deal with Phishing and Spam Detection: An Overview
Oumaima El Kouari, Hafssa Benaboud and Saiida Lazaar
Natural Convection in a Differentially Heated Cavity with a Heated and Cooled Circular Cylinders
Mohammed Boukendil, Lahcen El Moutaouakil, Zaki Zrikem and Abdelhalim Abdelbaki

Speakers

Faculty of Sciences and Techniques, Tangier, Morocco
Politecnico di Milano, Italy
Digital Society Institute Berlin, Germany
University of Derby, UK
Saint Jospeh University, Beyrouth, Lebanon

Submit your Paper

Authors are invited to submit original and unpublished work. Manuscripts should respect the conference template, including figures, tables, and references.The paper must be prepared by using the template in MS Word or LaTeX as PDF files through Easychair. The direct link for paper submission is  

Papers are reviewed on the basis that they do not contain plagiarized material and have not been submitted to any other conference at the same time (double submission), a specific tool willbe used to detect plagiarism.. Each paper will be reviewed by at least three regular PC members in tow round of review . The acceptance decisions will take into account paper novelty, technical depth, elegance, practical or theoretical impact, and presentation. Authors of high quality papers will be invited to submit an extended version of their work for potential publication in a special issue/section of an international journal.

Important Dates

01. Extended Submission Deadline
January 05, 2020
02. Notification of Acceptance
January 26, 2020
03. Early Registration
February 06, 2020
04. Camera Ready Submission
February 16, 2020

Orginizers and Partners

fstt
fstt
fstt
fstt
fstt
fstt

Registration

Registration is now open for the conference. The Early Bird Registration is available until February 06, 2020. In order to include accepted papers in the proeedings, at least one of the authors of the paper must be registered.

Each paper must be presented by an author at the conference. Failure to present a paper in the conference will result in the withdrawal of the paper from the conference. All attendees must pay the registration fees

PAYMENT

  • Payment to : Association Mediteranienne des Sciences et Technologies
  • SWIFT: BCPOMAMC
  • IBAN: 164 640 2111610546290014 23
  • Bank Name : Banque Populaire
  • Bank Address : Agence SIDI DRISS, Tanger Maroc
  • Reference Reason: niss2020


Conference registration fees includes:

        1. Paper indexing fee
        2. Admission to keynote sessions,
        3. Admission to technical sessions,
        4. Basic tea/coffee breaks .
        5. Conference attending certificate

Student Registration

Students must provide a valid student ID card or a letter from their University during registration.
ACADEMICS
1600 Dhs / 160 Euros
PhD Students
120 Dhs /120 Euros
Listener
900 Dhs / 90 Euros

Contact

Faculty of Sciences and Techniques, Gueliz, Marrakech, Morocco
e-mail: ic.niss20@gmail.com