-
Learner to learner fuzzy profiles similarity using a hybrid interaction analysis grid
Authors:
Chabane Khentout,
Khadidja Harbouche,
Mahieddine Djoudi
Abstract:
The analysis of remote discussions is not yet at the same level as the face-to-face ones. The present paper aspires twofold. On the one hand, it attempts to establish a suitable environment of interaction and collaboration among learners by using the speech acts via a semi structured synchronous communication tool. On the other, it aims to define behavioral profiles and interpersonal skills hybrid…
▽ More
The analysis of remote discussions is not yet at the same level as the face-to-face ones. The present paper aspires twofold. On the one hand, it attempts to establish a suitable environment of interaction and collaboration among learners by using the speech acts via a semi structured synchronous communication tool. On the other, it aims to define behavioral profiles and interpersonal skills hybrid grid by matching the BALES' IPA and PLETY's analysis system. By applying the fuzzy logic, we formalize human reasoning and, thus, giving very appreciable flexibility to the reasoning that use it, which makes it possible to take into account imprecisions and uncertainties. In addition, the educational data mining techniques are used to optimize the mapping of behaviors to learner's profile, with similarity-based clustering, using Eros and PCA measures. In order to show the validity of our system, we performed an experiment on real-world data. The results show, among others: (1) the usefulness of fuzzy logic to properly translate the profile text descriptions into a mathematical format, (2) an irregularity in the behavior of the learners, (3) the correlation between the profiles, (4) the superiority of Eros method to the PCA factor in precision.
△ Less
Submitted 1 October, 2021;
originally announced October 2021.
-
An Enhanced Corpus for Arabic Newspapers Comments
Authors:
Hichem Rahab,
Abdelhafid Zitouni,
Mahieddine Djoudi
Abstract:
In this paper, we propose our enhanced approach to create a dedicated corpus for Algerian Arabic newspapers comments. The developed approach has to enhance an existing approach by the enrichment of the available corpus and the inclusion of the annotation step by following the Model Annotate Train Test Evaluate Revise (MATTER) approach. A corpus is created by collecting comments from web sites of t…
▽ More
In this paper, we propose our enhanced approach to create a dedicated corpus for Algerian Arabic newspapers comments. The developed approach has to enhance an existing approach by the enrichment of the available corpus and the inclusion of the annotation step by following the Model Annotate Train Test Evaluate Revise (MATTER) approach. A corpus is created by collecting comments from web sites of three well know Algerian newspapers. Three classifiers, support vector machines, na{ï}ve Bayes, and k-nearest neighbors, were used for classification of comments into positive and negative classes. To identify the influence of the stemming in the obtained results, the classification was tested with and without stemming. Obtained results show that stemming does not enhance considerably the classification due to the nature of Algerian comments tied to Algerian Arabic Dialect. The promising results constitute a motivation for us to improve our approach especially in dealing with non Arabic sentences, especially Dialectal and French ones.
△ Less
Submitted 8 February, 2021;
originally announced February 2021.
-
SANA : Sentiment Analysis on Newspapers comments in Algeria
Authors:
Hichem Rahab,
Abdelhafid Zitouni,
Mahieddine Djoudi
Abstract:
It is very current in today life to seek for tracking the people opinion from their interaction with occurring events. A very common way to do that is comments in articles published in newspapers web sites dealing with contemporary events. Sentiment analysis or opinion mining is an emergent field who is the purpose is finding the behind phenomenon masked in opinionated texts. We are interested in…
▽ More
It is very current in today life to seek for tracking the people opinion from their interaction with occurring events. A very common way to do that is comments in articles published in newspapers web sites dealing with contemporary events. Sentiment analysis or opinion mining is an emergent field who is the purpose is finding the behind phenomenon masked in opinionated texts. We are interested in our work by comments in Algerian newspaper websites. For this end, two corpora were used SANA and OCA. SANA corpus is created by collection of comments from three Algerian newspapers, and annotated by two Algerian Arabic native speakers, while OCA is a freely available corpus for sentiment analysis. For the classification we adopt Supports vector machines, naive Bayes and knearest neighbors. Obtained results are very promising and show the different effects of stemming in such domain, also knearest neighbors give important improvement comparing to other classifiers unlike similar works where SVM is the most dominant. From this study we observe the importance of dedicated resources and methods the newspaper comments sentiment analysis which we look forward in future works.
△ Less
Submitted 31 May, 2020;
originally announced June 2020.
-
A Cloud Security Framework Based on Trust Model and Mobile Agent
Authors:
Saddek Benabied,
Abdelhafid Zitouni,
Mahieddine Djoudi
Abstract:
Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data. Nevertheless, the management of data a…
▽ More
Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data. Nevertheless, the management of data and services are probably not fully trustworthy. Hence, data owners are uncomfortable to place their sensitive data outside their own system .i.e., in the cloud. Bringing transparency, trustworthiness and security in the cloud model, in order to fulfill client's requirements are still ongoing. To achieve this goal, our paper introduces two levels security framework: Cloud Service Provider (CSP) and Cloud Service User (CSU). Each level is responsible for a particular task of the security. The CSU level includes a proxy agent and a trust agent, dealing with the first verification. Then a second verification is performed at the CSP level. The framework incorporates a trust model to monitor users' behaviors. The use of mobile agents will exploit their intrinsic features such as mobility, deliberate localization and secure communication channel provision. This model aims to protect user's sensitive information from other internal or external users and hackers. Moreover, it can detect policy breaches, where the users are notified in order to take necessary actions when malicious access or malicious activity would occur.
△ Less
Submitted 22 January, 2020;
originally announced January 2020.
-
New Framework Model to Secure Cloud Data Storage
Authors:
Leila Beldjezzar,
Abdelhafid Zitouni,
Mahieddine Djoudi,
Beldjezzar Leila,
Zitouni Abdelhafid,
Djoudi Mahieddine
Abstract:
Nowadays companies are increasingly adopting the technology ofcloud computing. This technology is subject to a lot of research and continuousadvances are made. The use of cloud computing in the companies advantagessuch as: reducing costs, sharing and exchange of information between institutions,but the data in the Cloud computing are susceptible to be compromisedand the companies are exposing to s…
▽ More
Nowadays companies are increasingly adopting the technology ofcloud computing. This technology is subject to a lot of research and continuousadvances are made. The use of cloud computing in the companies advantagessuch as: reducing costs, sharing and exchange of information between institutions,but the data in the Cloud computing are susceptible to be compromisedand the companies are exposing to see their data loss. In this study, we addressthe subject of security in cloud computing; we expose and discuss someresearches that had been proposed to secure the data stored in the cloud. Andthen we will present our new frameworks that ensure confidentiality of datastorage in the cloud environment
△ Less
Submitted 22 January, 2020;
originally announced January 2020.
-
ARAACOM: ARAbic Algerian Corpus for Opinion Mining
Authors:
Zitouni Abdelhafid,
Hichem Rahab,
Abdelhafid Zitouni,
Mahieddine Djoudi
Abstract:
Nowadays, it is no more needed to do an enormous effort to distribute a lot of forms to thousands of people and collect them, then convert this from into electronic format to track people opinion about some subjects. A lot of web sites can today reach a large spectrum with less effort. The majority of web sites suggest to their visitors to leave backups about their feeling of the site or events. S…
▽ More
Nowadays, it is no more needed to do an enormous effort to distribute a lot of forms to thousands of people and collect them, then convert this from into electronic format to track people opinion about some subjects. A lot of web sites can today reach a large spectrum with less effort. The majority of web sites suggest to their visitors to leave backups about their feeling of the site or events. So, this makes for us a lot of data which need powerful mean to exploit. Opinion mining in the web becomes more and more an attracting task, due the increasing need for individuals and societies to track the mood of people against several subjects of daily life (sports, politics, television,...). A lot of works in opinion mining was developed in western languages especially English, such works in Arabic language still very scarce. In this paper, we propose our approach, for opinion mining in Arabic Algerian news paper. CCS CONCEPTS $\bullet$Information systems~Sentiment analysis $\bullet$ Computing methodologies~Natural language processing
△ Less
Submitted 22 January, 2020;
originally announced January 2020.
-
Self Organization Agent Oriented Dynamic Resource Allocation on Open Federated Clouds Environment
Authors:
Kemchi Sofiane,
Abdelhafid Zitouni,
Mahieddine Djoudi
Abstract:
To ensure uninterrupted services to the cloud clients from federated cloud providers, it is important to guarantee an efficient allocation of the cloud resources to users to improve the rate of client satisfaction and the quality of the service provisions. It is better to get as more computing and storage resources as possible. In cloud domain several Multi Agent Resource Allocation methods have b…
▽ More
To ensure uninterrupted services to the cloud clients from federated cloud providers, it is important to guarantee an efficient allocation of the cloud resources to users to improve the rate of client satisfaction and the quality of the service provisions. It is better to get as more computing and storage resources as possible. In cloud domain several Multi Agent Resource Allocation methods have been proposed to implement the problem of dynamic resource allocation. However the problem is still open and many works to do in this field. In cloud computing robustness is important so in this paper we focus on auto-adaptive method to deal with changes of open federated cloud computing environment. Our approach is hybrid, we first adopt an existing organizations optimization approach for self organization in broker agent organization to combine it with already existing Multi Agent Resource Allocation approach on Federated Clouds. We consider an open clouds federation environment which is dynamic and in constant evolution, new cloud operators can join the federation or leave this one. At the same time our approach is multi criterion which can take in account various parameters (i.e. computing load balance of mediator agent, geographical distance (network delay) between costumer and provider...).
△ Less
Submitted 21 January, 2020;
originally announced January 2020.
-
Evaluation of a course mediatised with Xerte
Authors:
Ghalia Merzougui,
Roumaissa Dehkal,
Maheiddine Djoudi
Abstract:
Interactive multimedia educational content has recently been of interest to attract attention on the learner and increase understanding by the latter. In parallel several open source authoring tools offer a quick and easy production of this type of content. As such, our contribution is to mediatize a course i.e. 'English' with the authoring system 'Xerte' which is intended both for simple users an…
▽ More
Interactive multimedia educational content has recently been of interest to attract attention on the learner and increase understanding by the latter. In parallel several open source authoring tools offer a quick and easy production of this type of content. As such, our contribution is to mediatize a course i.e. 'English' with the authoring system 'Xerte' which is intended both for simple users and developers in ActionScript. An experiment of course is conducted on a sample of a private school's students. At the end of this experience, we administered a questionnaire to evaluate the device, the results obtained, evidenced by the favorable reception of interactive multimedia integration in educational content.
△ Less
Submitted 21 January, 2020;
originally announced January 2020.
-
A New Framework of Authentication Over Cloud Computing
Authors:
Megouache Leila,
Abdelhafid Zitouni,
Mahieddine Djoudi
Abstract:
The growth of local data annually implies extra charges for the customers, which makes their business slowing down. Cloud computing paradigm comes with new technologies that offer a very economic and cost-effective solution, but the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud a…
▽ More
The growth of local data annually implies extra charges for the customers, which makes their business slowing down. Cloud computing paradigm comes with new technologies that offer a very economic and cost-effective solution, but the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud and it is highly crucial to protect the sensitive data and systems in thecloud setting inorder toensure theprivacy ofits users. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view.
△ Less
Submitted 11 January, 2019;
originally announced February 2019.
-
Navigation Assistance and Web Accessibility Helper
Authors:
Abdelhakim Herrouz,
Chabane Khentout,
Mahieddine Djoudi
Abstract:
Web accessibility is actually the most important aspect for providing access to information and interaction for people with disabilities. However, it seems that the ability of users with disabilities to navigate over the Web is not dependent on the graphical complexity, but on the markup used to create the structure of the website. Consequently, it is necessary to design some software assistants t…
▽ More
Web accessibility is actually the most important aspect for providing access to information and interaction for people with disabilities. However, it seems that the ability of users with disabilities to navigate over the Web is not dependent on the graphical complexity, but on the markup used to create the structure of the website. Consequently, it is necessary to design some software assistants to help all users to mark themselves in space during a navigation session. In this paper, we propose an assistant for browsing on the Internet to allow user to get one s bearings within Web navigation. We describe our approach which puts at the disposal of the user a visited site map, thus giving an explicit representation of virtual space. Different levels of visualization are implemented in order to make the map more visible and less overloaded.
△ Less
Submitted 2 July, 2013;
originally announced July 2013.
-
Overview of Web Content Mining Tools
Authors:
Abdelhakim Herrouz,
Chabane Khentout,
Mahieddine Djoudi
Abstract:
Nowadays, the Web has become one of the most widespread platforms for information change and retrieval. As it becomes easier to publish documents, as the number of users, and thus publishers, increases and as the number of documents grows, searching for information is turning into a cumbersome and time-consuming operation. Due to heterogeneity and unstructured nature of the data available on the W…
▽ More
Nowadays, the Web has become one of the most widespread platforms for information change and retrieval. As it becomes easier to publish documents, as the number of users, and thus publishers, increases and as the number of documents grows, searching for information is turning into a cumbersome and time-consuming operation. Due to heterogeneity and unstructured nature of the data available on the WWW, Web mining uses various data mining techniques to discover useful knowledge from Web hyperlinks, page content and usage log. The main uses of web content mining are to gather, categorize, organize and provide the best possible information available on the Web to the user requesting the information. The mining tools are imperative to scanning the many HTML documents, images, and text. Then, the result is used by the search engines. In this paper, we first introduce the concepts related to web mining; we then present an overview of different Web Content Mining tools. We conclude by presenting a comparative table of these tools based on some pertinent criteria.
△ Less
Submitted 2 July, 2013;
originally announced July 2013.
-
Overview of Visualization Tools for Web Browser History Data
Authors:
Abdelhakim Herrouz,
Chabane Khentout,
Mahieddine Djoudi
Abstract:
Nowadays, the Web has become one of the most widespread platforms for information change and retrieval. As it becomes easier to publish documents, as the number of users, and thus publishers, increases and as the number of documents grows, searching for information is turning into a cumbersome and time-consuming operation. Because of the loose interconnection between documents, people have difficu…
▽ More
Nowadays, the Web has become one of the most widespread platforms for information change and retrieval. As it becomes easier to publish documents, as the number of users, and thus publishers, increases and as the number of documents grows, searching for information is turning into a cumbersome and time-consuming operation. Because of the loose interconnection between documents, people have difficulty remembering where they have been and returning to previously visited pages. Navigation through the web faces problems of locating oneself with respect to space and time. The idea of graphical assistance navigation is to help users to find their paths in hyperspace by adapting the style of link presentation to the goals, knowledge and other characteristics of an individual user. We first introduce the concepts related to web navigation; we then present an overview of different graphical navigation tools and techniques. We conclude by presenting a comparative table of these tools based on some pertinent criteria.
△ Less
Submitted 27 February, 2013;
originally announced April 2013.
-
An Authoring System for Editing Lessons in Phonetic English in SMIL3.0
Authors:
G. Merzougui,
M. Djoudi
Abstract:
One of the difficulties of teaching English is the prosody, including the stress. French learners have difficulties to encode this information about the word because it is irrelevant for them. Therefore, they have difficulty to produce this stress when they speak that language. Studies in this area have concluded that the dual-coding approach (auditory and visual) of a phonetic phenomenon helps a…
▽ More
One of the difficulties of teaching English is the prosody, including the stress. French learners have difficulties to encode this information about the word because it is irrelevant for them. Therefore, they have difficulty to produce this stress when they speak that language. Studies in this area have concluded that the dual-coding approach (auditory and visual) of a phonetic phenomenon helps a lot to improve its perception and memorization for novice learners. The aim of our work is to provide English teachers with an authoring named SaCoPh for editing multimedia courses that support this approach. This course is based on a template that fits the educational aspects of phonetics, exploiting the features of version 3.0 of the standard SMIL (Synchronized Multimedia Integration Language) for the publication of this course on the web.
△ Less
Submitted 25 January, 2012;
originally announced January 2012.
-
Conception and Use of Ontologies for Indexing and Searching by Semantic Contents of Video Courses
Authors:
Ghalia Merzougui,
Mahieddine Djoudi,
Amel Behaz
Abstract:
Nowadays, the video documents like educational courses available on the web increases significantly. However, the information retrieval systems today can not return to the users (students or teachers) of parts of those videos that meet their exact needs expressed by a query consisting of semantic information. In this paper, we present a model of pedagogical knowledge of current videos. This knowle…
▽ More
Nowadays, the video documents like educational courses available on the web increases significantly. However, the information retrieval systems today can not return to the users (students or teachers) of parts of those videos that meet their exact needs expressed by a query consisting of semantic information. In this paper, we present a model of pedagogical knowledge of current videos. This knowledge is used throughout the process of indexing and semantic search segments instructional videos. Our experimental results show that the proposed approach is promising.
△ Less
Submitted 24 January, 2012;
originally announced January 2012.