• 01.
  • 02.
  • 03.

The 3rd International Conference on Networking, Information Systems & Security

The Faculty of Science and Techniques of Marrakech organizes the 3rd edition of the International Conference on Networking, Information Systems & Security (NISS 2020) NISS is a comprehensive conference focused on the various aspects of advances in Information systems, Security and Networking Technologies. The main purpose of NISS 2020 is to improve our research by achieving the highest capability and encourage open discussions on recent advances in computer communication and information technologies.
Authors are invited to submit original unpublished manuscripts that demonstrate recent advances in computer communications, wireless/mobile networks, information systems, intelligent systems and security in the theoretical and practical aspects. Accepted papers will be published in the ACM ICPS series with an assigned ISBN: 978-1-4503-7634-1.
All accepted papers will be available in ACM Digital Library and will be submitted for indexing on Scopus.
Extended (50%) of selected papers will be published as a chapters in the "Emerging Trends in ICT for Sustainable Development" Book ( Springer Series)

Update for Corona Virus (05.03.2020)

The organizing committee have been monitoring the developing COVID-2019 situation. The safety and well-being of all conference participants is our first priority. After studying and evaluating the announcements, guidance, and news released by relevant national departments, the organizing committee has made the decision to turn NISS 2020 into a virtual conference.

The Topics

01. Artificial Intelligence
02. Computing
03. Networking
04. Cloud Technlogies
05. Ambient Intelligence
06. e-Learning
07. Machine Vision
08. Security

01. Artificial Intelligence

  • Neural Networks
  • Deep Learning
  • Fuzzy Logic
  • Swarm Intelligence and Optimization
  • Natural Language Processing
  • Agents and Multi-agent Systems
  • Social computing and networks
  • Data Mining
  • Parallel Processing
  • Expert Systems

02. Computing

  • . Quantum Computing
  • . High Performance Computing
  • . Distributed and parallel systems
  • . Cognitive Computing
  • . Cloud Computing
  • . Grid Computing
  • . Embedded Computing
  • . Scalable Computing
  • . Human-centred Computing
  • . Mobile computing

03. Networking

  • Wireless/Mobile Networks (WBAN/WPAN/WLAN/WMAN/WWAN)
  • 5G/6G cellular systems and heterogeneous networks
  • Cognitive radio, cooperative communication and networking
  • Contents/Information centric networking (CCN/ICN)
  • Cross-layer design and optimization
  • Delay/Disruption tolerant network (DTN)
  • Device-to-device communications
  • Green Networks, and Smart Grid
  • Internet of things (IoT) and machine-to-machine (M2M) communications
  • Network survivability and reliability
  • Operating systems and middleware support for networking
  • Software defined networking (SDN) and network virtualization
  • Mobile Adhoc Networks
  • Vehicular and underwater networks
  • Ubiquitous home and office networking
  • Signal Processing
  • Satellite Communication Systems
  • Open Spectrum Solutions
  • Communication Protocols

04. Cloud Technologies

  • Cloud Architectures and Applications
  • Cloud Services and Applications
  • IoT and Mobile on Cloud
  • High Performance Computing using the Cloud
  • Distributed Cloud, Cloud Brokering or Edge Computing
  • Security and Privacy
  • Cloud Energy Efficiency

05. Ambient Intelligence

  • Smart Cities
  • Smart Grids and Energy Networks
  • Sensing and Sensor Networks
  • Ambient Assisted Living
  • Smart Healthcare
  • Intelligent Transportation
  • Data Science
  • Affective computing
  • Context-aware pervasive systems

06. E-Learning

  • e-Learning Tools
  • e-Learning Organisational Issues
  • Gamification
  • Collaborative Learning
  • Curriculum Content Desig
  • Educational Systems Design
  • Web-based Learning
  • Knowledge Base Development Models for AI
  • Knowledge Extraction tools and strategies
  • Learning Technologies
  • Science of Learning
  • M-Learning: Mobile Applications and Technologies 
  • Massive Open Online Courses (MOOC)
  • Virtual Learning Environments (VLE)
  • Learning Management Systems (LMS)  
  • Serious Games

07. Machine Vision

  • Human Computer Interaction
  • Computer Vision
  • Image Processing
  • Brain-Machine Interface
  • Geographic Information Systems
  • Video Analysis
  • Medical Diagnosis
  • Segmentation Techniques
  • Augmented Reality
  • Virtual Reality

08. Security

  • Cryptography
  • Quantum Cryptology
  • hardware implementations and side channel attacks
  • Intrusion Detection & Prevention
  • Mobile Security
  • Smart cards Security
  • Identity and Security in IoT
  • Security Policies, Formal methods & verification
  • Access Control Models
  • Communication and Information Security
  • Security and privacy for big data
  • Steganography
  • Watermarking
  • Fingerprinting
  • Stream ciphers
  • Privacy
  • Surveillance
  • Biometrics
  • Internet Security
  • Secure Transactions
  • Secure Protocols
  • Cyber Security

Fianl Program

Tuesday  March 31 , 2020
Welcome Talk:

  • Prof. BOUDHIR ANOUAR Abdelhakim , Mediterranean Association of Sciences and Technologies , Conference Co-Chair

  • Prof. Mohamed BEN AHMED, Mediterranean Association of Sciences and Technologies , Conference Co-Chair
  • 09h00-10h00am
    Keynote Speaker: Prof. Steven Furnell , Centre for Security, Communications & Network Research at the University of Plymouth UK
    "Passwords: A lesson in cybersecurity failure? "
    Session moderated by Prof. Boudhir Anouar Abdelhakim
    Session 1
    Session 2
    Session 3
    Session 4 & Nice20
    Session 5
    Session 6
    Session 7
    Session 8 & Nice 20
    Keynote Speaker: Prof. Mohammed BOUHOMRA Abdelmalek Essaadi University
    " IoT: Architectures & Applications"
    Session moderated by Prof. Mohamed BEN AHMED
    Keynote Speaker: Prof. Serge MIRANDA Nice Sophia Antipolis University, Nice, France
    " owards a unifying theory for BIG DATA management (and data lakes) based upon CATEGORIES"
    Session moderated by Prof. Lotfi EL ACHAAK.
    Session 9
    Session 10
    Session 11
    Session 12 & MLA
    Poster Session 1
    Poster Session 2
    Awards Attribution
    Conference Cloture

    Session 1 : Artificial Intelligence 1; Chair: Prof. Lotfi EL ACHAAK
    Tuesday, March 31 From 3:00pm to 04:30pm
    Three-level binary tree structure for sentiment classification in Arabic text
    Redouane Ezzahir, Hajar Ait Addi and Abdelhak Mahmoudi
    Recidivism forecasting: A study on process of feature selection
    Amal Azeroual, Youssef Taher and Benayad Nsiri
    Inferring SQL Queries Using Interactivity
    Karam Ahkouk, Mustapha Machkour and Jilali Antari
    Ankle Gait-Pattern Generators
    Amine Mohamed Mamou and Nadia Saadia
    Frequency Assignement
    Mohamed El Bouti, Rouan El Ghazi, Lamia Benameur and Jihane Alami Chentoufi
    A Question Answering System with a Sequence to Sequence Grammatical Correction
    Afrae Bghiel, Mohamed Ben Ahmed and Abdelhakim Boudhir Anouar
    A Smart Chatbot Architecture based NLP and Machine learning for health care assistance
    Ayanouz Soufyane, A.Boudhir & M.Ben Ahmed

    Session 2 : CLOUD COMPUTING & BIGDATA TECHNOLOGIES 1; Chair: Prof. BOUDHIR Anouar Abdelhakim
    Tuesday, March 31 From 3:00pm to 04:30pm
    CSMAS: Improving Multi-Agent Credit Scoring System by Integrating Big Data and the new generation of Gradient Boosting Algorithms
    Youssef Tounsi, Houda Anoun and Larbi Hassouni
    Fog Computing for Smart Healthcare data Analytics: an urgent necessity
    Hayat Khaloufi, Karim Abouelmehdi and Abderrahim Beni-Hssane
    Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud
    Nickson M Karie, Ikuesan Richard Adeyemi, Victor R. Kebande and Mehdi Mehdi Sookhak
    Mobile Cloud Computing: Architecture, Advantages and Security Issues
    Hadjer Fellah, Mezioud Chaker and Mohammed Chaouki Batouche

    Session 3 : Security 1; Chair: Prof. Moulay Driss LAANAOUI & Prof Mohamed BEN AHMED
    Tuesday, March 31 From 3:00pm to 04:30pm
    FSpeedy and efficient malwares images classifier using reduced GIST features for a new defense guide
    Ikram Ben Abdel Ouahab, Lotfi El Aachak, Anouar Abdelhakim Boudhir and Mohammed Bouhorma
    Compressive Sensing Based on Homomorphic Encryption and Attack Classification using Machine Learning Algorithm in WSN Security
    Samir Ifzarne, Imad Hafidi and Nadia Idrissi
    An Algorithm for Digital Image Watermarking using 2-Level DWT, DCT and QR Decomposition based on Optimal Blocks Selection
    Zairi Mourad, Boujiha Tarik and Ouelli Abdelhaq
    Practical Approach to Urban Crime Prevention in Developing Nations
    Richard Ikuesan, Yusuf Opaluwa, Shefiu Ganiyu, Ismaila Idris, Oluibukun Ajayi, Umar Dauda, Umar Majigi and Jonathan Gondyi

    Session 4 : E-Learning ; Chair: Prof. Yassine EL YOUSSEFI
    Tuesday, March 31 From 3:00pm to 04:30pm
    Unified Process to Design and Develop Serious Games for Schoolchild
    Younes Alaoui, Lotfi Elaachak, Mohammed Bouhorma and Amine Belahbibe
    An Adaptive Learning Approach for Better Retention of Learners in MOOCs
    El Miloud Smaili, Soukaina Sraidi, Salma Azzouzi and My El Hassan Charaf
    Smartphone learning for kids edutainment
    Ehlem Zigh, Ayoub Elhoucine, Abderrahmane Mallek, Mohammed Kadiri, Belkacem Kouninef and Tolga Ensari
    A new approach to reduce the dropout rate in E-learning
    Dhaiouir Ilham, Ezziyyani Mostafa and Khaldi Mohamed
    Adaptive E-learning: Adaptation of content according to the continuous evolution of the learner during his training
    Mohammed Zaoudi and Hicham Belhadaoui
    Knowledge Management in the Expert Model of the Smart Tutoring System
    Fatima-Zohra Hibbi, Otman Abdoun and Haimoudi El Khatir
    Proposal of the solution of virtual basic schools in rural areas of African countries in conflict: Case of the Central African Republic
    Ghislain Mervyl Saint-Juste Kossingou, Nadege Ndassimba, Edgard Ndassimba, Keba Gueye and Samuel Pr. Ouya

    Session 5 : Artificial Intelligence 2; Chair: Prof. Said RAGHAY & Prof Lotfi EL ACHAAK
    Tuesday, March 31 From 05:00pm to 06:30pm
    Pathological Images Classification using Deep Convolutional Networks
    Yousra Dahdouh, Abdelhakim Anouar Boudhir and Mohamed Ben Ahmed
    Towards analyzing crash events for novice drivers under reduced-visibility settings: A simulator study
    Zouhair Elamrani Abou Elassad, Hajar Mousannif and Hassan Al Moatassime
    Contribution of Artificial Neural Network in Predicting Completeness Through the Impact and Complexity of its Improvement
    Jaouad Maqboul and Bouchaib Bounaba
    LSTM-based Models for Earthquake Prediction
    Asmae Berhich, Fatima-Zahra Belouadha and Mohammed Issam Kabbaj
    Diabetes Diseases Prediction Using Supervised Machine Learning and Neighbourhood Components Analysis
    Othmane Daanouni, Bouchaib Cherradi and Amal Tmiri
    Machine Learning Methods for Air Quality Monitoring
    Mohamed Akram Zaytar and Chaker El Amrani
    Study and Analysis of Data Analysis Systems (Reconstruction of a Learning Data from the Initial Data)
    Sara Belattar, Otman Abdoun and El Khatir Haimoudi
    Recognition and reconstruction of road markings with Generative Adversarial Networks (GANs)
    Samir Allach, Mohamed Ben Ahmed and Anouar Abdelhakim Boudhir

    Session 6 : Networking 1; Chair: Prof. BOUDHIR Anouar Abdelhakim
    Tuesday, March 31 From 05:00pm to 06:30pm
    Considering the environment's characteristics in wireless networks simulations and emulations: case of popular Simulators and WSN
    Abdelhak El-Mouaffak and Abdelbaki El Belrhiti El Alaoui
    An Adaptive Clustering Algorithm Based on k-means for VANET road safety
    Aziz MAHBOUB
    Adaptation of quality for video streaming in a Bittorrent P2P IMS network
    Adnane Ghani, El Hassan Ibn El Haj, Ahmed Hammouch and Abdelaali Chaoub
    Sensors Transposing Technique for Minimizing the Path Loss Effect and Enhancement of Battery Lifetime in Wireless Body Area Sensor Networks
    Rahat Ali Khan and Shahzad Memon
    A comparative study of Machine learning algorithms for VANET networks
    Sara Ftaimi and Tomader Mazri
    Comparative analysis of TCP congestion control mechanisms
    Kaoutar Bazi and Bouchaib Nassereddine

    Session 7 : Security 2; Chair: Prof. Mohamed BEN AHMED
    Tuesday, March 31 From 05:00pm to 06:30pm
    Internet of Things: Classification of attacks using CTM method
    Hind Meziane, Noura Ouerdi, Mohammed Amine Kasmi and Sanae Mazouz
    Verification of Integrity in Vehicle Architectures
    Christine Jakobs, Billy Naumann, Matthias Werner and Karsten Schmidt
    Web OAuth-based SSO Systems Security
    Yassine Sadqi, Yousra Belfaik and Said Safi
    Performance Assessment of Open Source IDS for improving IoT Architecture Security Focus on Snort, Suricata, and BRO implemented on WBANs, Network and cloud layers
    Mouna Boujrad, Saiida Lazaar and Mohammed Hassine
    Definition and implementation of an elliptic curve cryptosystem using a new message mapping scheme
    Younes Lahraoui, Youssef Amal and Saiida Lazaar

    Session 8 : CLOUD COMPUTING & BIGDATA TECHNOLOGIES 2 ; Chair: Moulay Driss LAANAOUI & Prof. Yassine EL YOUSSEFI
    Tuesday, March 31 From 5:00pm to 06:30pm
    Model Transformation From Object Relational Database to NoSQL Column Based Database
    Fouad Toufik and Mohamed Bahaj
    Real-time prediction of accident using Big data system
    Mouad Tantaoui, My Driss Laanaoui and Mustapha Kabil
    Modelling Sustainability, Cloud computing and knowledge transmission in education in developing countries
    Ahmed Mehrez and Lamia Aladel
    An improved modeling method for profile-based personalized search
    Anas El-Ansari, Abderrahim Beni-Hssane and Mostafa Saadi

    Session 9 : Image Processing ; Chair: Prof. Aziz MAHBOUB
    Wednesday, April 01 From 10h45am to 12h30pm
    Post-Fall Time Accounting for Fall Detection Using a Portable Camera
    Isma Boudouane, Amina Makhlouf, Mohamed Aures Harkat, Nadia Saadia and Amar Ramdane-Cherif
    Approach of Constructing An Islamic Pattern Respecting The "Hasba" Method
    Yassine Ait Lahcen, Abdelaziz Jali and Ahmed El Oirrak
    Motion Detection Using the Dynamic Color Texture
    Bellamine Insaf, Silkan Hassan and Tmiri Amal
    Speckle correlation fringes denoising and demodulation using directional total variation and ridgelet transform
    Mustapha Bahich and Mohammed Bailich
    A machine learning color-based segmentation for object detection within dual X-ray baggage images
    Mohamed Chouai, Mostefa Merah, José-Luis Sancho-Gómez and Mimi Malika
    Cooling Fan Combined Fault Vibration Analysis Using Convolutional Neural Network Classifier
    Azzeddine Dekhane, Adel Djellal, Fouaz Boutebbakh and Rabah Lakel

    Session 10 : Networking 2 ; Chair: Prof. Moulay Driss LAANAOUI & Prof. BOUDHIR Anour Abdelhakim
    Wednesday, April 01 From 10h45am to 12h30pm
    Normality Test to Detect the Congestion in MANET by Using OLSR Protocol
    Abdellah Nabou, My Driss Laanaoui, Mohammed Ouzzif and Mohammed-Alamine El Houssaini
    Evaluation and Comparative Study of the Both Algorithm LEACH and PEGASIS Based on Energy Consumption
    Fatima Es-Sabery and Abdellatif Hair
    AGEM-based Multipath Routing Protocol using Triangle Link Quality for Wireless Multimedia Sensor networks
    Asma Chikh and Mohamed Lehsaini
    Massive-MIMO Configuration of Multipolarized ULA and UCA in 5G Wireless Communications
    Abdelhamid Riadi, Mohamed Boulouird and Hassani Moha M'rabet
    New Frequency Reconfigurable Patch Antenna for Wireless Communication
    Sanaa Errahili, Asma Khabba, Saida Ibnyaich and Moha M'Rabet Hassani
    A Novel Design of Miniaturized Leaf Shaped Antenna For 5G Mobile phones
    Asma Khabba, Sanaa Errahili, Saida Ibnyaich and Moha M'Rabet Hassani

    Session 11 : Computing ; Chair: Prof. Said RAGHAY & Prof EL ACHAAK & Prof EL YOUSSEFI
    Wednesday, April 01 From 10h45am to 12h30pm
    A Theoretical Study on Project Delivery and Leadership Style
    Muhammad Hanif Nor Azman, Azlinah Mohamed and Edzreena Edza Odzaly
    Role of Information Technologies in Supply Chain Management
    Asmae Heddoun and Rhizlane Benrrezzouq
    Online Advertising On Consumer Purchasing Behavior: Effective Elements And Its Impact
    Nur Nadira Izlyn Kamaruddin, Azlinah Mohamed and Syaripah Ruzaini Syed Aris
    A new Framework to improve Change Mining in Configurable Process
    Asmae Hmami, Hanae Sbai and Mounia Fredj
    Feature Selection Methods in Sentiment Analysis
    Nurilhami Izzatie Khairi, Azlinah Mohamed and Nor Nadiah Yusof
    Collaborative Consumption Motives
    Nur Zahrah Farida Ruslan, Azlinah Mohamad and Norjansalika Janom
    Some Properties of Free Cyclic Codes over Finite Chain Rings
    Mohammed Sabiri, Youssef Bensalih and Aziz Elbour

    Session 12 : Security 3 : Chair: Prof. EL ARBI ABDELLAOUI ALAOUI
    Wednesday, April 01 From 10h45am to 12h30pm
    Enhanced Duplicate Count Strategy: Towards New Algorithms To Improve Duplicate Detection
    Youssef Aassem, Imad Hafidi and Noureddine Aboutabit
    IT Security and IT Governance Alignment
    Norli Shariffuddin and Azlinah Mohamed
    A Distributed Information Retrieval Approach for Copyright Protection
    Sonia Benbelgacem, Larbi Guezouli and Rachid Seghir
    Challenges & Emerging Threats on Cybersecurity
    Abdulla Hussain, Azlinah Mohamed and Suriyati Razali

    Invited Session MLA ; Chair: Prof. EL Arbi ABDELLAOUI ALAOUI
    Wednesday, April 01 From 10h45am to 12h30pm
    Sampling techniques for Arabic Sentiment Classification: A comparative study
    Hajar Ait Addi and Redouane Ezzahir
    Machine learning Approach for Early Detection of Glaucoma from Visual Fields
    El Arbi Abdellaoui Allaoui, Stephane Cedric Koumetio Tekouabou,Imane Chabbar, Imane Chabbar, Hassan Silkan
    Artificial Intelligence in Learning Skills Assessment: a Pedagogical Innovation
    Okacha Diyer, Naceur Achtaich and Khalid Najib

    Session Poster 1 ; Chair: Prof. Mohamed BEN AHMED
    Tuesday, March 31 From 04h15am to 04h45pm
    Face Sketch Recognition-An Overview
    Khalid Ounachad, Mohamed Oualla, Abdelghani Souhar and Abdelalim Sadiq
    Big Data Solutions Proposed for Cluster Computing Systems Challenges: A survey
    Fatima Es-Sabery and Abdellatif Hair
    Latest Trends in Recommender Systems applied in the medical domain: A Systematic Review
    Oumaima Stitini, Omar Bencharef and Soulaimane Kaloun
    Deep Learning Algorithm and Their Applications in the Perception Problem
    Redouane Lhiadi
    Advanced Recommendation Systems Through Deep Learning
    Mohamed Khoali, Abdelhak Tali and Yassin Laaziz

    Session Poster 2 : Chair: Prof. Moulay Driss LAANAOUI & BOUDHIR Anouar Abdelhakim
    Wednesday, April 01 From 10h15am to 10h45pm
    Handwriting Recognition with Artificial Neural Networks A Decade Literature Review
    Ahmed Remaida, Aniss Moumen, Younes El Bouzekri El Idrissi and Zineb Sabri
    Role Of Reengineering In Training Of Specialists
    Dmitry Bystrov, Sanjar Giyasov, Mirzokhid Taniev and Sardor Urokov
    Fuzzy Systems For Computational Linguistics And Natural Language
    Dmitry Bystrov, Olimjon Toirov, Gulzoda Mustafakulova and Dilfuza Yakubova
    A survey on QoS-based communication protocols for IoT systems
    Nogaye Lo and Ibrahima Niang
    Big Data security and privacy techniques
    Lamia El Haourani, Anas Abou El Kalam and Abdellah Ait Ouahman
    A Survey of Intrusion Detection Algorithm in VANET
    Manale Boughnja and Tomader Mazri
    Using Machine Learning to Deal with Phishing and Spam Detection: An Overview
    Oumaima El Kouari, Hafssa Benaboud and Saiida Lazaar
    Natural Convection in a Differentially Heated Cavity with a Heated and Cooled Circular Cylinders
    Mohammed Boukendil, Lahcen El Moutaouakil, Zaki Zrikem and Abdelhalim Abdelbaki


    Faculty of Sciences and Techniques, Tangier, Morocco
    Centre for Security, Communications & Network Research at the University of Plymouth, UK
    Nice Sophia Antipolis University, Nice, France
    Politecnico di Milano, Italy
    Digital Society Institute Berlin, Germany
    University of Derby, UK
    Saint Jospeh University, Beyrouth, Lebanon

    Submit your Paper

    Authors are invited to submit original and unpublished work. Manuscripts should respect the conference template, including figures, tables, and references.The paper must be prepared by using the template in MS Word or LaTeX as PDF files through Easychair. The direct link for paper submission is  

    Papers are reviewed on the basis that they do not contain plagiarized material and have not been submitted to any other conference at the same time (double submission), a specific tool willbe used to detect plagiarism.. Each paper will be reviewed by at least three regular PC members in tow round of review . The acceptance decisions will take into account paper novelty, technical depth, elegance, practical or theoretical impact, and presentation. Authors of high quality papers will be invited to submit an extended version of their work for potential publication in a special issue/section of an international journal.

    Important Dates

    01. Extended Submission Deadline
    January 05, 2020
    02. Notification of Acceptance
    January 26, 2020
    03. Early Registration
    February 06, 2020
    04. Camera Ready Submission
    February 16, 2020

    Orginizers and Partners



    Registration is now open for the conference. The Early Bird Registration is available until February 06, 2020. In order to include accepted papers in the proeedings, at least one of the authors of the paper must be registered.

    Each paper must be presented by an author at the conference. Failure to present a paper in the conference will result in the withdrawal of the paper from the conference. All attendees must pay the registration fees


    • Payment to : Association Mediteranienne des Sciences et Technologies
    • IBAN: 164 640 2111610546290014 23
    • Bank Name : Banque Populaire
    • Bank Address : Agence SIDI DRISS, Tanger Maroc
    • Reference Reason: niss2020

    Conference registration fees includes:

          1. Paper indexing fee
          2. Admission to keynote sessions,
          3. Admission to technical sessions,
          4. Basic tea/coffee breaks .
          5. Conference attending certificate

    Student Registration

    Students must provide a valid student ID card or a letter from their University during registration.
    1600 Dhs / 160 Euros
    PhD Students
    120 Dhs /120 Euros
    900 Dhs / 90 Euros


    Faculty of Sciences and Techniques, Gueliz, Marrakech, Morocco
    e-mail: ic.niss20@gmail.com