Technical Program
International Joint Conferences - Draft Technical Programme
9th International Conference on Soft Computing and Pattern Recognition (SoCPaR)
8th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA )
13th International Conference on Information Assurance and Security (IAS)
Venue: Rayad Mogador Kasbah Hotel, Marrakech, Morocco
Dates: December 11 - 13, 2O17
=========================================
Day 1, December 11, 2017
=========================================
08.00 - : Registration
08:15 - 08.30: Inauguration
08:30 - 09:30: Plenary Talk - I, Alexander Gelbukh, Instituto Politecnico Nacional, Mexico
09:30-10:00: Coffee break
=========================
Room A: 10:00-13:00: SoCPaR Session I
=====================================
10.00 - 10.15
ID7
An Energy-Efficient MAC protocol for Mobile Wireless Sensor Network Based on IR-UWB
Anouar Darif, Chaibi Hasna and Rachid Saadane
10.15 - 10.30
ID10
Obstacle Detection Algorithm By Stereoscopic Image Processing : Navigation Assistance For The Blind And Visually Impaired
Adil Elachhab and Mohammed Mikou
10.30 - 10.45
ID12
Local Directional Multi Radius Binary Pattern: Novel Descriptor For Face Recognition Application
Mohamed Kas, Youssef Elmerabet, Yassine Ruichek and Rochdi Messoussi
10.45 - 11.00
ID14
Content-Based Image Retrieval Approach Using Color And Texture Applied To Two Databases (Coil-100 And Wang)
El Mehdi El Aroussi, Noureddine El Houssif and Hassan Silkan
11.00 - 11.15
ID18
Shape Classification Using B-Spline Approximation And Contour Based Shape Descriptors
Youssef Ait Khouya and Faouzi Ghorbel
11.15 - 11.30
ID21
An Image Processing Based Framework Using Crowdsourcing for a Successful Suspect Investigation
Hasna Elalaoui Elabdallaoui, Fatima Zohra Ennaji and Elfazziki Abdelaziz
11.30 - 11.45
ID22
Recognition and Classification Of Arabic Fricative Consonants
Elfahm Youssef, Mounir Badia, Mounir Ilham, Elmaazouzi Laila and Farchi Abdelmajid
11.45 - 12.00
ID24
Cancer Classification Using Gene Expression Profiling: Application Of The Filter Approach With The Clustering Algorithm
Sara Haddou Bouazza, Khalid Auhmani, Abdelouhab Zeroual and Nezha Hamdi
12.00 - 12.15
ID25
Agrima Abdellah, Mounir Ilham, Elmazouzi Laila and Farchi Abdelmajid
Detection of negative emotion using Acoustic cues and Machine Learning Algorithms
12.15 - 12.30
ID26
Using Multiple Minimum Support to Auto-Adjust the Threshold of Support in Apriori Algorithm
Azzeddine Dahbi, Youssef Balouki and Taoufic Gadi
12.30 - 12.45
ID27
Prediction of the Degree of Parkinson's Condition Using Recordings of Patients' Voices
Clara Jimenez-Recio, Alexander Zlotnik, Ascension Gallardo-Antolin, Juan M. Montero and Juan Carlos Martinez-Castrillo
12.45 - 13.00
ID28
An Overview Of A Distributional Word Representation For An Arabic Named Entity Recognition System
Chaimae Azroumahli, Yacine El Younoussi and Ferdaous Achbal
ROOM B: 10:50-13:00: IAS Session I
==================================
10.00 - 10.15
ID2
A Semantic Approach towards Online Social Networks multi-aspects Analysis
Asmae El Kassiri and Fatima-Zahra Belouadha
10.15 - 10.30
ID3
Towards A New Generation of Wheelchairs Sensitive To Emotional Behavior Of Disabled People
Mohamed Moncef Ben Khelifa, Hachem A. Lamti and Adel M. Alimi
10.30 - 10.45
ID5
Performance Analysis of Majority Logic Decoding of CSOC Codes over GG Channels
Souad Labghough, Fouad Ayoub and Mostafa Belkasm
10.45 - 11.00
ID9
Straightforward MaaS to Ensure Interoperability in heterogeneous Environmen
Majda Elhozmari and Ahmed Ettalbi
11.00 - 11.15
ID10
A Practical Maturity Framework for Information Security Governance and Management
Mustapha Belaissaoui and Abdelkbir Sahid
11:15- 11:30
ID12
System Multi Agents for Automatic Negotiation of SLA in Cloud Computing
Zineb Bakraouy, Amine Baina and Mostafa Bellafkih
11:30 - 11:45
ID15
Modeling the Effect of Security Measures on Electronic Payment Risks
Marie Ndaw, Samuel Ouya and Gervais Mendy
11:45 - 12:00
ID17
Modeling An Anomaly-Based Intrusion Prevention System Using Game Theory
El Mehdi Kandoussi, Iman El Mir, Mohamed Hanini and Abdelkrim Haqiq
12:00 - 12:15
ID20
Optimized Security as A Service Platforms via Stochastic Modeling and Dynamic Programming
Oussama Mjihil, Abdelkrim Haqiq, Hamid Taramit and Dijiang Huang
12:15 - 12:30
ID22
Multi-View Web Services As A Key Security Layer In Internet Of Things Architecture Within A Cloud Infrastructure
nass Misbah and Ahmed Ettalbi
12:30 - 12:45
ID23
Access Domain-based Approach for Anomaly Detection and Resolution in XACML Policies
Maryem Ait El Hadj, Yahya Benkaouz, Ahmed Khoumsi and Mohammed Erradi
12:45 - 13:00
ID24
Biometric template privacy using Visual Cryptography
Sana Ibjaoun, Anas Abou El Kalam, Vincent Poirriez and Abdellah Ait Ouahman
13:00 - 14:00 : Lunch
================
14:00 -- 15.00: Plenary Talk - II, Oscar Castillo, Tijuana Institute of Technology, Mexico
Room A: 15:00-16:30 : SoCPaR Session II
=======================================
15.00 - 15.15
ID29
Discrete Particle Swarm Optimization for Travelling Salesman Problems: New Combinatorial Operators
Morad Bouzidi, Mohammed Essaid Riffi and Ahmed Serhir
15.15 - 15.30
ID31
On Maximal Frequent Itemsets Mining Enumeration
Said Jabbour, Fatima Zahra Mana and Lakhdar Sais
15.30 - 15.45
ID37
Particle swarm optimization as a new measure of machine translation efficiency
Angel Montes, Jolanta Mizera-Pietraszko, Ricardo Rodriguez Jorge and Edgar Alonso Mart抧ez Garc抋
15.45 - 16.00
ID42
A Human Identification Technique Through Dorsal Hand Vein Texture analysis based on NSCT Decomposition
Amira Oueslati Hermi, Nadia Feddaoui and Kamel Hamrouni
Room B: 15:00-16:00 : IAS Session II
=======================================
15:00 - 15.15
ID26
Scalable and Reactive Network Intrusion Detection and Prevention System
Safaa Mahrach, Oussama Mjihil and Abdelkrim Haqiq
15.15 - 15.30
ID29
A statistical analysis for high-speed stream cipher
Youssef Harmouch and Rachid Elkouch
15:30 - 15.45
ID31
Weighted Access Control Policies Cohabitation In Distributed Systems
Asmaa El Kandoussi and Hanan El Bakkali
15:45 - 16.00
ID32
A Comparative Study on Access Control Models and Security Requirements in Workflow Systems
Monsef Boughrous and Hanan El Bakkali
16:00-16:30: Coffee break
==========================
ROOM A: 16:30 - 18.00 : IBICA Session I
=======================================
16.30 - 16.45
ID1
Reducing Blackhole Effect In WSN
Sana Akourmis, Youssef Fakhri and Moulay Driss Rahmani
16.45 - 17.00
ID2
Minimum Spanning Tree In Trapezoidal Fuzzy Neutrosophic Environment
Said Broumi, Assia Bakali, Mohamed Talea, Florentin Smarandache and Vakkas Ulu鏰y
17.00 - 17.15
ID3
Differential Evolution Assisted MUD for MC-CDMA Systems Using Non-Orthogonal Spreading Codes
Atta Rahman, Kiran Sultan, Nahier Aldhafferi and Abdullah Alqahtani
17.15 - 17.30
ID8
A survey of Cross-Layer Design for Wireless Visual Sensor Networks
Afaf Mosaif and Said Rakrak
17.30 - 17.45
ID9
An IPv6 Flow Label Based Approach for Mobile IPTV Quality of Service
Mohamed Matoui, Noureddine Moumkine and Abdellah Adib
17.45- 18.00
ID10
NWP Model Revisions using Polynomial Similarity Solutions of the General Partial Differential Equation
Ladislav Zjavka and Stanislav Mi氠k
ROOM A: 16:30 - 18.00 : IBICA Session II
=======================================
16.30 - 16.45
ID15
Energy Consumption and Cost Analysis For Data Centers With Workload Control
Abdellah Ouammou, Mohamed Hanini, Said El Kafhali and Abdelghani Ben Taha
16.45 - 17.00
ID19
A Stochastic Game Analysis of the Slotted ALOHA Mechanism Combined with ZigZag Decoding and Transmission Cost
Ahmed Boujnoui, Abdellah Zaaloul and Abdelkrim Haqiq
17.00 - 17.15
ID21
Analytic Approach Using Continuous Markov Chain To Improve The Qos Of A Wireless Network
Adnane El Hanjri, Abdellah Zaaloul and Abdelkrim Haqiq
17.15 - 17.45
ID22
Determining, Studying And Evaluating The Most Route Lifetime As The Most Stable Path Between Two Vehicles in VANET
Mohamed Nabil, Abdelmajid Hajami and Abdelkrim Haqiq
17.45 - 18.00
ID24
Performance Improvement of Bio-Inspired Strategies through Feedback Laws
Lairenjam Obiroy Singh and Rajagopalan Devanathan
18.00 - 18.15 Closing Ceremony
--------------------------------
Virtual Presentations
--------------------------------
IBICA 2017 - ID7
Solving the Problem Of Distribution Of Fiscal Coupons By Using A Steady State Genetic Algorithm
Q雗dres?Hyseni, Sule Yildirim Yayilgan, Bujar Krasniqi and Kadri Sylejmani
IBICA 2017 - ID23
Reverse Extraction of Early-age Hydration Kinetic Equation of Portland Cement Using Gene Expression Programming With Similarity Weight Tournament Selection
Mengfan Zhi, Ziqiang Yu, Bo Yang, Wang Lin, Liangliang Zhang, Jifeng Guo and Xuehui Zhu
IBICA 2017 - INV1
Oscar Castillo, Fevrier Valdez and Frumen Olivas
Dynamic parameter adaptation using interval type-2 fuzzy logic in bio-inspired optimization methods
IAS 2017 - ID4
A Comprehensive Technical Review on security techniques and low power target architectures for Wireless Sensor Networks
Manel Elleuchi
IAS 2017 - ID14
A Comparison Between A Normal And An Epileptic Rest State Model
Ridha Jarray, Nawel Jmail, Abir Hadriche and Tarek Frikha
IAS 2017 - ID27
A Hybrid Feature Selection For MRI Brain Tumor Classification
Ahmed Kharrat and Mahmoud N閖i
SoCPaR 2017 - ID 11
A Simultaneous Topic and Sentiment Classfication of Tweets
Doaa Salem
SoCPaR 2017 - ID 40
Nizar Rokbani, Ikram Twir and Abdelkrim Haqiq
Experimental Investigation of Ant Supervised by Simplified PSO with Local Search Mechanism (SASPSO-2Opt)
====================================================
Day 2 and 3 , December 12 -13, 2017
No technical sessions
====================================================