The National School of Applied Science of Kenitra organizes the 4th edition of the International Conference on Networking, Information Systems & Security (NISS 2021).
NISS is a comprehensive conference focused on the various aspects of advances in Information systems, Security and Networking Technologies. The main purpose of NISS is to improve our research by achieving the highest capability and encourage open discussions on recent advances in computer communication and information technologies.
Authors are invited to submit original unpublished manuscripts that demonstrate recent advances in computer communications, wireless/mobile networks, information systems, intelligent systems and security in the theoretical and practical aspects.
Depending on the author's preference, all accepted papers will be published as :
OR
Update for Corona Virus
In case the serious situation continue until the date, our event can be converted partly or fully to the Video Conference.
Thursday April 01
, 2021 |
||||
09h30-10h30am (UTC+1) |
Welcome Talk:
|
|||
10h30-11h10am |
Keynote Speaker: Dr. Joerg Widmer , IMDEA Networks Institute
, Madrid, Spain "Designing Scalable Millimeter-Wave Networks" Session moderated by Prof. Meet Link: https://meet.google.com/ |
|||
11h15-11h55am |
Keynote Speaker: Prof. Dr. Fakhri Youssef , Ibn Tofail University, Faculty of Sciences, Morocco "Title" Session moderated by Prof. Meet Link: https://meet.google.com/ |
|||
12h00-12h40 |
Keynote Speaker: Prof. Dr. A. Selcuk Uluagac , Florida International University, USA "Title of Talk " Session moderated by Prof. Meet Link: https://meet.google.com/ |
|||
Break |
||||
02h00-03h30pm |
Session 1 |
Session 2 |
Session 3 |
Session 4 |
Break |
||||
03h45-05h15pm |
Session 5 |
Session 6 |
Session 7 |
Session 8 |
Friday April 02
, 2021 |
||||
09h30-10h10am |
Keynote Speaker: Prof. Dr. Mohamed NAbil SRIFI , Ibn Tofail University, ENSA, Morocco "Title" Session moderated by Prof. Meet Link: https://meet.google.com/ |
|||
10h15-10h55 am |
Keynote Speaker: Prof. Dr. Horia-Nicolai L. Teodorescu Technical University of Iasi, Romania "Title" Session moderated by Prof. Meet Link: https://meet.google.com/ |
|||
11h00-12h30
| Session 9 |
Session 10 |
Session 11 |
Session 12 |
Break |
||||
02h00-03h30pm
| Session 13 |
Session 14 |
Session 15 |
Session 16 |
Break |
||||
03h45-05h15
| Session 17 |
Session 18 |
Session 19 |
Session 20 |
Break |
||||
06h00-06h30pm |
Conference Closure Meet Link: https://meet.google.com/xbw-bhqi-fsd |
87: A new design of an ant colony optimization (ACO) algorithm for optimization of Ad Hoc Network Hala Khankhour, Otman Abdoun and Jâafar Abouchabaka |
100: A cloud computing based intelligent traffic control system for vehicular networks Nihal Gaouar and Mohamed Lehsaini |
134: EE-FTR: An Energy-Efficient Fault-Tolerant Routing Protocol for Wireless Sensor Networks Khadidja Belkadi and Mohamed Lehsaini |
106: MmRPL: QoS aware routing for Internet of Multimedia Things Hadjer Bouzebiba and Oussama Hadj Abdelkader |
57: Advanced GAF routing protocol using the goal attainment method in WSN Duygu Çinar Umdu, Ebru Alakavuki |
175: A Comparative Study on Reactive Routing Protocols in VANET Aziz MAHBOUB |
95: Comparative Study between Network Layer Attacks in Mobile Ad Hoc Networks Oussama Sbai and Mohamed Elboukhari |
Session 2 : Artificial Intelligence 1 ; Chair: Prof. Meet Link: https://meet.google.com/zrm-xrai-qod |
85: BMGC: A Deep Learning Approach to Classify Bangla Music Genres Moumita Sen Sarma and Avishek Das |
141: Detection of Human Activities in Wildlands to prevent the occurrence of Wildfires using Deep Learning and Remote Sensing Ayoub Jadouli and Chaker El Amrani |
54: Tomato Plant Disease Detection And Classication Using Convolutional Neural Network Architectures Technologies Djalal Rafik Hammou and Boubaker Mechab |
157: Skin Detection Based on Convolutional Neural Network Yamina Bordjiba and Chemesse Ennehar Bencheriet |
140: A combined 2D Unet - 2D Convolutional LSTM for cardiac cine MRI short-axis sequences segmentation. Abderazzak Ammar, Omar Bouattane and Mohammed Youssfi |
120 : Comparison Support Vector Machines and K-Nearest Neighbors in Classifying Ischemic Stroke by Using Convolutional Neural Networks as a Feature Extraction Glori Saragih and Zuherman Rustam |
130 : Classification of Remote Sensing scenes using Semi-Supervised Domain Adaptation based on Entropy Adversarial Optimization
Tariq Lasloum, Haikel Alhichri and Yakoub Bazi |
15: Proposal for an alert and monitoring solution based on the SIP and IoT protocol: the case of agriculture Latyr Ndiaye, Kéba Gueye and Samuel Ouya |
7: Build a malware detection software for IOT network Using Machine learning Somaya Haiba and Tomadar Mazri |
53: Smart agriculture solution based on IoT and TVWS for arid regions of the Central African Republic Edgard Ndassimba, Nadege Gladys Ndassimba, Ghislain Mervyl Kossingou and Samuel Ouya |
86: IoT Protocols – MQTT versus CoAP Alyaziya Almheiri and Zakaria Maamar |
162: DTN gateway For an Interoperable IoT architecture Rajae Tamri and Said Rakrak |
48 : A Survey on SDN based energy-efficiency approaches in IoT Taki Eddine Chaib Ainou, Soheyb Ayad and Labib Sadek Terrissa |
112: BMGC: Enhancing the Security of Railway System Using Honey Trap Train and IPS/IDS Design Rasha Ali and Rayya Muhammad |
114: Classification of security attacks in WBAN for medical healthcare Asmae Bengag, Amina Bengag and Omar Moussaoui |
126: Security Analysis of Mobile Banking Application in Qatar Shaymaa Al-Delayel and Richard Adeyemi Ikuesan |
133: SDN Control Plane Security: Issues and Solutions Kiran Fatima, Narmeen Zakaria Bawany and Kanwal Zahoor |
118: Effects of Jamming Attack in the Internet of Things Imane Kerrakchou, Sara Chadli, Mohammed Saber and Mohammed Ghaouth Belkasmi |
42 : Attacks and defenses on autonomous vehicles: A comprehensive Study Manale Boughanja and Tomader Mazri |
137: A Novel Design of Frequency Reconfigurable Antenna For 5G Mobile Phones Sanaa Errahili, Asma Khabba, Saida Ibnyaich and Moha M'rabet Hassani |
153: NB-IoT and eMTC towards Massive MTC: Performance evaluation and comparison for 5G mMTC Adil Abou El Hassan, Abdelmalek El Mehdi and Mohammed Saber |
131: Study and comparison of the different elements of handover execution: a case of the LTE network Samia Hakkou, Tomader Mazri and Nabil Hmina |
27: On the Performance of 5G Narrow-Band Internet of Things for Industrial Applications Chehri Abdellah, Saadane Rachid, Ouafiq El Mehdi and Slalmi Ahmed |
78: Deep Learning Models for Security in 5G Networks: Proposition of Security Assessment Process Asmaa Ftaimi and Tomader Mazri |
79: Secure user authentication scheme for the Virtual Doctor System enabled H-iot through 5G Network: A comparison study Fatima Rougaii and Mazri Tomader |
152: Already 6G? Why? Oumaima El Rhazal and Tomader Mazri |
Session 6 : Artificial Intelligence 2 ; Chair: Prof. Meet Link: https://meet.google.com/zrm-xrai-qod |
72: Prediction of international trade evolution through the Support Vector Machine: The case of a port complex Ouail El Imrani |
18: CRAN: An Hybrid CNN-RNN Attention-Based Model for Arabic Machine Translation Nouhaila Bensalah, Habib Ayad, Abdellah Adib and Abdelhamid Ibn El Farouk |
41: Data Stream clustering for detecting misbehavior in an intelligent transportation system Sara Ftaimi and Tomader Mazri |
70: Approach of Digital Devices Diagnostic On The Basis Of Fuzzy Logic Dmitriy Bystrov |
64: Personalized question-answering over linked data Anas El-Ansari, Mohamed El Fissaoui and Abderrahim Beni-Hssane |
5: Towards a Smart City Approach: A Comparative Study Zineb Korachi and Bouchaïb Bounabat |
60 : Web Based Composition using Machine Learning Approaches: A Literature Review Yapo Jesus Ekie, Bassirou Gueye, Ibrahima Niang and Atse Marcellin Tresor Ekie |
71: Model-driven engineering: From SQL relational database to column – oriented database in big data context. Fatima Zahra Belkadi and Redouane Esbai |
111: Endorsing Energy Efficiency Through Accurate Appliance-Level Power Monitoring, Automation and Data Visualization Aya Sayed, Abdullah Alsalem, Yassine Himeur, Faycal Bensaali and Abbes Amira |
55: Towards a Flexible Relational Database Query System Rachid Mama and Mustapha Machkour |
26: The importance of data catalog in managing data lakes Mohamed Cherradi, Anass El Haddadi and Hayat Routaib |
123 : Comparative study of data preparation methods in quantum clustering algorithms Oumayma Ouedrhiri, Oumayma Banouar, Said Raghay and Salah Elhadaj |
142: State of art of PLS Regression for non quantitative data and in Big Data context Yasmina Al Marouni and Youssef Bentaleb |
91: Cryptography over the twisted Hessian curve H^{3}_{a,d} Grini Abdelali |
33: Method for Designing Countermeasures for Crypto-Ransomware Based on the NIST CSF Hector Torres-Calderon, Marco Velasquez and David Mauricio |
23: Enhanced Intrusion Detection System based on AutoEncoder network and Support Vector Machine Sihem Dadi and Mohamed Abid |
129: Generative and Autoencoder Models for Large-Scale Mutivariate Unsupervised Anomaly Detection Nabila Ounasser, Maryem Rhanoui, Mounia Mikram and Bouchra El Asri |
62 : Privacy threat modeling in personalized search systems Anas El-Ansari, Marouane Birjali and Abderrahim Beni Hssane |
149: Preserving Privacy in a Smart Healthcare System Based on IoT Rabie Barhoun and Maryam Ed-Daibouni |
46: A Review of Intrusion Detection Systems: Datasets and machine learning methods Aouatif Arqane, Hicham Boukhriss, Omar Boutkhoum and Abdelmajid El Moutaouakkil |
43: An Analysis of The Content in Social Networks During Covid-19 Pandemic Mironela Pirnau |
154: COVID-19 Contact Tracing Mobile Application in Big Data Ecosystem El Aachak Lotfi, Ikram Ben Abdel Ouahab, Fatiha Elouaai and Mohammed Bouhorma |
49: Missing Data Analysis in the Healthcare Field: Covid-19 Case Study Hayat Bihri, Sara Hsaini, Salma Azzouzi and My El Hassan Charaf |
161: Data-based automatic Covid-19 rumors detection in social networks Bolaji Bamiro and Ismail Assayad |
9: Detection of COVID-19 from Chest X-ray images using Deep learning Insaf Bellamine, Hakim Nasaoui and Hassan Silkan |
37: X-ray image classification using Deep Learning method for Covid-19 diagnostic Samira Achki, Abdelali El Gourari and Layla Aziz |
43: An Analysis of The Content in Social Networks During Covid-19 Pandemic Mironela Pirnau |
154: COVID-19 Contact Tracing Mobile Application in Big Data Ecosystem El Aachak Lotfi, Ikram Ben Abdel Ouahab, Fatiha Elouaai and Mohammed Bouhorma |
49: Missing Data Analysis in the Healthcare Field: Covid-19 Case Study Hayat Bihri, Sara Hsaini, Salma Azzouzi and My El Hassan Charaf |
161: Data-based automatic Covid-19 rumors detection in social networks Bolaji Bamiro and Ismail Assayad |
9: Detection of COVID-19 from Chest X-ray images using Deep learning Insaf Bellamine, Hakim Nasaoui and Hassan Silkan |
37: X-ray image classification using Deep Learning method for Covid-19 diagnostic Samira Achki, Abdelali El Gourari and Layla Aziz |
36: Extracting learner's model variables for dynamic grouping system Gouasmi Noureddine, Mahnane Lamia and Lafifi Yacine |
128: Discrete Large-scale Multi-Objective Teaching-Learning-Based Optimization Algorithm Wafa Aouadj, Mohamed Rida Abdessemed and Rachid Seghir |
82 : E-learning and the new pedagogical practices of Moroccan teachers Rochdi Sara and El Ouesdadi Nadia |
13: Smart Campus Ibn Tofail Approaches and Implementation Ahmed Srhir and Tomader Mazri |
117: Boosting Students Motivation through Gamified Hybrid Learning Environments: Bleurabbit Case Study Mohammed Berehil |
122: A Sentiment Analysis based Approach to Fight MOOCs' Drop Out Soukaina Sraidi, El Miloud Smaili, Salma Azzouzi and Charaf My El Hassan |
66: An intelligent Chat boot system for E-learning Application Youness Saadna, Anouar Abdelhakim Boudhir and Ben Ahmed Mohamed |
127: The personalization of learners courses in e-learning Dhaiouir Ilham, Ezziyyani Mostafa and Khaldi Mohamed |
Session 11 : Cloud & Distributed Systems; Chair: Prof. Meet Link: https://meet.google.com/zrm-xrai-qod |
11: A study of task scheduling algorithms in cloud computing Zakaria Benlalia, Abouelmehdi Karim, Abderrahim Beni Hssane and Abdellah Ezzati |
30: Real-Time Distributed Pipeline Architecture for Pedestrians' trajectories Kaoutar Bella and Azedine Boulmakoul |
51 : A comparative analysis of SOAP and REST Web service composition based on performance in local and remote Cloud environments Yapo Jesus Ekie, Bassirou Gueye and Ibrahima Niang |
100: A cloud computing based intelligent traffic control system for vehicular networks Nihal Gaouar and Mohamed Lehsaini |
88: Distributed Architecture for Interoperable Signaling Interlocking Ikram Abourahim, Mohsine Eleuldj and Mustapha Amghar |
145: Survey on improving the performance of MapReduce in Hadoop: Nour-Eddine Bakni and Ismail Assayad |
14: H-RCBAC: Hadoop Access Control Based on Roles and Content Sarah Nait Bahloul, Karim Bessaoud and Meriem Abid |
32 : Towards a safe pedestrian walkability: A real-time reactive microservice oriented ecosystem Ghyzlane Cherradi, Azedine Boulmakoul, Lamia Karim and Mandar Meriem |
47: Image-based malware classification using Multi-Layer Perceptron Ikram Ben Abdel Ouahab, Lotfi Elaachak and Mohammed Bouhorma |
94: Comparative study of Keccak and Blake2 Hash functions Hind El Makhtoum and Youssef Bentaleb |
56: A literature survey on anti-phishing in websites Rania Zaimi, Mohamed Hafidi and Lamia Mahnane |
97: A survey on e-voting based on blockchain Fatih Rabia, Arezki Sara and Taoufiq Gadi |
24: IoT and AI based intelligent system to fight against COVID-19 Asmae Bouchareb, Abdelhak Boulaalam and Insaf Bellamine |
34 : Security and privacy protection in remote monitoring system for Covid-19 patients Mounira Sassi and Mohamed Abid |
93: A comprehensive survey of smart city technologies for monitoring and control-ling the epidemic spread of COVID-19 Siham Aouad, Abderrahim Maizate and Abdelouahed Zakari |
139: Assessing the impact of COVID-19 on Parkinson's disease patients from social networks: Hanane Grissette and El Habib Nfaoui |
110: Proposal for a platform for the continuity of distance learning in African schools and universities at the end of the politico-military crisis in the face of covid-19: case of the Central African Republic Ghislain Mervyl Saint-Juste Kossingou, Bessan Degboe, Nadege Gladys Ndassimba and Samuel Ouya |
29: Channel Estimation in Massive MIMO Systems for Spatially Correlated Channels with Pilot Contamination Jamal Amadid, Mohamed Boulouird and Abdelhamid Riadi |
63 : A New 2x2MIMO Trapezoidal Shaped Antenna with High Gain and Wide Bandwidth for 37-40GHz Millimeter Wave Applications Asma Khabba, Sanaa Errahili, Saida Ibnyaich and Abdelouhab Zeroual |
102: On Channel Estimation of UpLink TDD Massive MIMO Systems through different Pilot Structures Jamal Amadid, Mohamed Boulouird and Abdelhamid Riadi |
139: Assessing the impact of COVID-19 on Parkinson's disease patients from social networks: Hanane Grissette and El Habib Nfaoui |
70: Frequency Reconfigurable Antenna Design for RFID Tag: A Study Assiya Amri and Tomader Mazri |
89: PBMN TO UML class diagram using QVT Med Achraf Habri, Redouane Esbai and Yasser Lamlili |
98 : The proposition of Process flow model for Scrum and eXtreme Programming Soukaina Merzouk, Abdessamad Cherkaoui, Abdelaziz Marzak, Nawal Sael and Fatima-Zahra Guerss |
135 : Evaluation of Similarity Measures in Semantic Web Service Discovery Mourad Fariss, El Allali Naoufal, Hakima Asaidi and Mohamed Bellouki |
Session 16 : Mobility and Localization ; Chair: Prof. Meet Link: https://meet.google.com/zrm-xrai-qod |
132 : Location Finder Mobile Application using Android and Google SpreadSheets Adeosun Nehemiah Olufemi and Melike Sah |
8: Simulation Daily Mobility in Rabat region Khalid Qbouche and Khadija Rhoulami |
45 : Virtual spider for real time finding Things Close to pedestrians Souhail Elkaissi and Azedine Boulmakoul |
104 : The evolution of the traffic congestion prediction and AI application Badr-Eddine Soussi Niaimi, Mohamed Bouhorma and Hassan Zili |
Session 17 : Multi-criteria decision-making & Optimization Chair: Prof. Meet Link: https://meet.google.com/zrm-xrai-qod |
28: Optimization of a multi-criteria cognitive radio user through autonomous learning Naouel Seghiri, Mohammed Zakarya Baba-Ahmed, Badr Benmammar and Nadhir Houari |
59 : Optimal User Association using BWM Tool Layla Aziz, Samira Achki and Hanane Aznaoui |
81 : An enhanced Social-Spider Colony Optimization for global optimization Farouq Zitouni, Saad Harous and Ramdane Maamri |
108 : SeqVectorizer: Sequence Representation in Vector Space Md. Kowsher, Avishek Das and Md. Murad Hossain Sarker |
17: Sign language recognition with Quaternion moment Invariants : A comparative study Ilham Elouariachi, Rachid Benouini, Khalid Zenkouar, Arsalane Zarghili and Hakim El Fadili |
31 : A review of the NL to SQL Frameworks Karam Ahkouk, Mustapha Machkour, Khadija Majhadi and Rachid Mama |
44 : Evaluating the impact of oversampling on Arabic L1 and L2 readability prediction performances Naoual Nassiri, Abdelhak Lakhouaja and Violetta Cavalli-Sforza |
65: Contribution of the Internet of Things to agricultural education and breeding in rural areas of African countries in conflict: case of the Central African Republic Ghislain Mervyl Saint-Juste Kossingou, Nadege Gladys Ndassimba, Edgard Ndassimba and Samuel Ouya |
80 : Comparative Study Between Smart Aquaponics Systems Khaoula Taji, Rachida Ait Abdelouahid, Ibtissame Ezzahoui and Abdelaziz Marzak |
39 : Review on Embedded Systems and the Internet of Things: Comparative Study Abdessamad Cherkaoui, Soukaina Merzouk, Abdelaziz Marzak and Mostapha Hain |
75: Reconfiguration of the radial distribution for multiple DGs by using an improved PSO Meriem M'Dioud, Rachid Bannari and Ismail Elkafazi |
96: DNN2FPGA: Generic Design Flow to Implement DNNs on FPGAs El Hadrami Cheikh Tourad and Mohsine Eleuldj |
107: ECG signal diagnosis using Discrete Wavelet Transform and K-Nearest Neighbor classifier Youssef Toulni, Taoufiq Belhoussine Drissi and Benayad Nsiri |
69: Direct modeling method of acoustic streaming using lat-tice Boltzmann approach Jaouad Benhamou, Mohammed Jami and Ahmed Mezrhab |
Authors are invited to submit original and unpublished work.
The paper must be prepared by using the template in MS Word or LaTeX as PDF files through Easychair. The direct link for paper submission is
Papers are reviewed on the basis that they do not contain plagiarized material and have not been submitted to any other conference at the same time (double submission), a specific tool will be used to detect plagiarism.. Each paper will be reviewed by three regular PC members in tow round of review . The acceptance decisions will take into account paper novelty, technical depth, elegance, practical or theoretical impact, and presentation.
In order to include accepted papers in the proceedings, at least one of the authors of the paper must be registered. Each paper must be presented by an author at the conference. All participants must register and pay the registration fees before February 10, 2021.The authors not registered, their papers will not be included in the conference program. The registration fees includes: Publication fees, Basic tea/coffee breaks, Electronic version of the conference proceedings and Admission to the all sessions.
Your venue info goes here. Ecole Nationale des Sciences Appliquées Adresse : campus universitaire, B.P 241, Kénitra - Maroc.
Aeroport Rabat - Salé
Bus N°.
TGV Station.
Your venue info goes here.
Search Hotels