This book covers selected research works presented at the fifth International Conference on Networking, Information Systems and Security (NISS 2022), organized by the Research Center for Data and Information Sciences at the National Research and Innovation Agency (BRIN), Republic of Indonesia, and Moroccan Mediterranean Association of Sciences and Sustainable Development, Morocco, during March 30–31, 2022, hosted in online mode in Bandung, Indonesia. Building on the successful history of the conference series in the recent four years, this book aims to present the paramount role of connecting researchers around the world to disseminate and share new ideas in intelligent information systems, cyber-security, and networking technologies.
The 49 chapters presented in this book were carefully reviewed and selected from 115 submissions. They focus on delivering intelligent solutions through leveraging advanced information systems, networking, and security for competitive advantage and cost savings in modern industrial sectors as well as public, business, and education sectors. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.
Author(s): Mohamed Ben Ahmed, Boudhir Anouar Abdelhakim, Bernadetta Kwintiana Ane, Didi Rosiyadi
Series: Lecture Notes on Data Engineering and Communications Technologies, 147
Publisher: Springer
Year: 2022
Language: English
Pages: 547
City: Cham
Preface
Committee
Conference General Chair
Conference General Co-chairs
Conference Chairs
Technical Program Committee Chair
Treasurer Chair
Program (Paper/Special Session/Poster) Chair
Proceedings/Book Chair
Sponsorship, Event, and Logistics Chair
Event Publication and Documentation Chair
IT Support/Web Administrator Chair
Technical Program Committee Member
Event Publication and Documentation Member
IT Support/Web Administrator Member
International Advisory Committee
Steering Committee
Technical Program Committee
Keynote Speakers
Difficult Data Analysis
E-CARGO and Role-Based Collaboration
E-CARGO and Role-Based Collaboration
Feature Object Extraction – Fusing Evidence, Not Rolling the Die
AIoT: Cloud or Edge, Big or Small Data, Public or Private Model
Communication and Computing Resource Management for Internet of Things
Hardware-Software Co-design Approaches for Sustainable AI
Architectures, Challenges and Opportunities within 6G Emerging Technologies
Contents
A Bi-objective Evolutionary Algorithm to Improve the Service Quality for On-Demand Mobility
1 Introduction
2 The On-Demand Transport Problem
3 The Proposed Method
3.1 The Representation of a Solution
3.2 The Fitness Function
3.3 The Move Operator
4 Experimental Results
5 Conclusion and Prospects
References
A Dynamic Circular Hough Transform Based Iris Segmentation
1 Introduction
1.1 Related Work
2 Materials and Methods
2.1 Dataset
2.2 Proposed Methodology
3 Results
3.1 Comparing of the Segmentation Methods
4 Conclusion
References
A Game Theoretic Framework for Interpretable Student Performance Model
1 Introduction
2 Methodology
2.1 Model Creation
2.2 Model Evaluation
2.3 Model Interpretation
3 Experiments and Result Analysis
3.1 Data Description
3.2 Description of Experimental Protocol
3.3 Result Analysis
4 Conclusion
References
A New Telecom Churn Prediction Model Based on Multi-layer Stacking Architecture
1 Introduction
2 Description of the Problem
3 Machine Learning Using Stacknets
4 Methodology
4.1 Dataset
4.2 Data Preprocessing
4.3 Feature Engineering
4.4 Unbalanced Class in Binary Classification
4.5 Model Building
4.6 Performance Metrics
5 Results of Experiments
5.1 Used Algorithms
5.2 Performance Evaluation
5.3 Discussion
6 Conclusion
References
A Novel Hybrid Classification Approach for Predict Performance Student in E-learning
1 Introduction
2 Related Work
3 Proposed Method
4 Applied Algorithms
4.1 Voting
4.2 Random Forest
5 Results
5.1 Dataset
5.2 Validation
6 Discussion
7 Conclusions
References
A Proposed Big Data Architecture Using Data Lakes for Education Systems
1 Introduction
2 Background
2.1 Traditional Data Warehouse
2.2 Modern Data Warehouse
2.3 The Data Lake
3 Literature Review
4 Proposed System
4.1 Data Source Layer
4.2 Data Consolidation Layer
4.3 Data Warehouse Layer
4.4 Data Consumption Layer
4.5 Potential Application
5 Discussion
6 Conclusion and Future Works
References
A SVM Approach for Assessing Traffic Congestion State by Similarity Measures
1 Introduction
2 Traffic Congestion Identification
2.1 Jaccard Similarity Coefficient
2.2 Dice Similarity Coefficient
2.3 BF (Boundary F1) Score
3 Methodology
3.1 Data Collection
3.2 Pre-treatment
3.3 SVM Learning
3.4 Classification
3.5 Results
4 Experiments
4.1 Data Sources
4.2 Traffic Classification Based on SVM
5 Conclusion and Future Work
References
A Tool for the Analysis, Characterization, and Evaluation of Serious Games in Teaching
1 Introduction
2 Related Works
3 Research Method
3.1 Experimental Study
3.2 Proposed Approach
4 Evaluation
4.1 Presentation of the Analysis Tool
4.2 Evaluation Protocol
4.3 Results
5 Discussion
6 Conclusion
References
Analysis and Examination of the Bus Control Center (BCC) System: Burulaş Example
1 Introduction
2 Material and Method
3 Application
3.1 General Features of the Bus Control Center (BCC) System and Determination of Application Areas
3.2 Identification of Lines, Routes, Vehicles and Stops
3.3 Services Planning
3.4 Emergency Management
3.5 Violation Management
4 Discussion and Recommendations
5 Conclusion
References
Analyze Symmetric and Asymmetric Encryption Techniques by Securing Facial Recognition System
1 Introduction
2 Literature Review
3 Methodology
3.1 AES (Advanced Encryption Standard)
3.2 RSA (Rivest Shamir Adleman)
3.3 Efficiency Criteria
4 Experimental Result
4.1 Histogram Analysis
4.2 PSNR Analyses
4.3 Entropy Analyses
4.4 Elapsed Time Analyses
5 Discussion
6 Conclusion
References
Aspect-Based Sentiment Analysis of Indonesian-Language Hotel Reviews Using Long Short-Term Memory with an Attention Mechanism
1 Introduction
2 Methods
2.1 Data Collection
2.2 Data Cleaning
2.3 Data Preprocessing
2.4 Word2vec Model Training
2.5 Data Splitting
2.6 Model Training
2.7 Testing
2.8 Evaluation
3 Results and Discussion
4 Conclusion
References
Big Data and Machine Learning in Healthcare: Concepts, Technologies, and Opportunities
1 Introduction
2 The Concept of Big Data
2.1 Big Data Definition
2.2 Characteristics of Big Data
2.3 Big Data in Healthcare
3 Big Data Analytics
3.1 Hadoop
3.2 Spark
4 The Concept of Machine Learning
4.1 Machine Learning Definition
4.2 Deep Learning
4.3 Machine Learning in Healthcare
5 The Impact of Big Data on Healthcare
6 The Impact of Machine Learning in Healthcare
7 Conclusion and Future Work
References
Classification of Credit Applicants Using SVM Variants Coupled with Filter-Based Feature Selection
1 Introduction
2 Related Works
3 Background
3.1 SVM Variants
3.2 Filter-Based Feature Selection
4 Experimental Design
5 Results and Discussions
6 Conclusion
References
Classification of Hate Speech Language Detection on Social Media: Preliminary Study for Improvement
1 Introduction
2 Related Work
3 Method
3.1 Building a Dataset
3.2 Hate Speech and Abusive Language Detection
4 Experiments and Results
4.1 Experiment Results
4.2 Discussion and Limitation
5 Conclusion and Future Work
References
CoAP and MQTT: Characteristics and Security
1 Introduction
2 Background
3 CoAP Security
3.1 DTLS Based Communications
3.2 Related Works
4 MQTT Security
4.1 TLS Based Communications
4.2 Related Works
5 Conclusion
References
Combining Static and Contextual Features: The Case of English Tweets
1 Introduction
2 The Proposed Model
3 Experiments
3.1 Data Preprocessing
3.2 Experimental Settings
4 Conclusion
References
Comparative Study on the Density and Velocity of AODV and DSDV Protocols Using OMNET++
1 Introduction
2 Related Works
3 Methods and Techniques
3.1 Routing Protocols Overview
3.2 Simulation Environment
3.3 Performance Metrics
3.4 Simulation Scenario
4 Results and Discussions
4.1 Node Density Versus AODV and DSDV
4.2 Pause Time Versus AODV and DSDV
4.3 Comparison Between OMNET++ and NS2 for AODV
4.4 Comparison Between OMNET++ and NS2 for DSDV
5 Conclusion and Future Work
References
Cybersecurity Awareness Through Serious Games: A Systematic Literature Review
1 Introduction
2 Methodology
2.1 Systematic Literature Review
2.2 Research Question
2.3 Search Strategy
3 Results and Discussion
4 Conclusion
References
Design and Implementation of a Serious Game Based on Recommender Systems for the Learning Assessment Process at Primary Education Level
1 Introduction
2 Background
2.1 Learning Assessment
2.2 Serious Game
2.3 Recommendation Systems
3 Proposed Approach
3.1 Learning Assessment
3.2 Recommendation Process
4 Results and Discussion
5 Conclusion
References
DLDB-Service: An Extensible Data Lake System
1 Introduction
2 Related Works
2.1 Data Lake Concept
2.2 Metadata Management
3 DLDB-Service Architecture
3.1 Data Ingestion
3.2 Data Storage
3.3 Data Analysis
3.4 Data Exploration
4 Technical Demonstration
5 Discussion
6 Conclusion
References
Effect of Entropy Reshaping of the IP Identification Covert Channel on Detection
1 Introduction
2 The Proposed REIPIC Method
2.1 Parameters and Notations
2.2 Frequencies of Occurrence Matrix
2.3 REIPIC Algorithm
2.4 Frequencies of Occurrence Treatment (FOT)
3 Experiment and Settings
4 Results and Discussion
4.1 REIPIC Effect on Entropy Reshaping
4.2 REIPIC Effect on the IP ID CC Detection
5 Conclusion and Future Work
References
Explainable Machine Learning Model for Performance Prediction MAC Layer in WSNs
1 Introduction
2 Methodology
2.1 Prepossessing
2.2 Models Development
2.3 Interpretation of ML Models Using SHAP Values
2.4 Interpretation of ML Models Using SHAP Values
3 Experiments and Results Analysis
3.1 WSN Dataset
3.2 Results
3.3 Results of Model Prediction Interpretation
4 Conclusion
References
Hadoop-Based Big Data Distributions: A Comparative Study
1 Introduction
2 Hadoop Distributions
2.1 Stand-Alone Hadoop Distributions
2.2 Hybrid Hadoop Distributions
2.3 Cloud-Based Hadoop Distributions
3 A Comparison of Hadoop Distributions
3.1 Comparing Factors
3.2 Comparing Hadoop Distributions
3.3 Advantages and Disadvantages of Hadoop Distributions
3.4 Discussion
4 Conclusion
References
HDFS Improvement Using Shortest Path Algorithms
1 Introduction
2 HADOOP Platform
2.1 HDFS – Reliable Storage
2.2 DIJKSTRA’s Algorithm Presentation
2.3 DIJKSTRA’s Algorithm Examples
2.4 SubAlgorithm Dijkstra(Dijkstratype)
3 Article Sections
4 Proposed Work
4.1 Little Reminder
4.2 The Proposed Approach for Small File Management
5 Experimental
5.1 Experimental Environment (RatioTable)
5.2 Phases Algorithms
5.3 Results
5.4 Conclusion and Future Works
References
Improved Hourly Prediction of BIPV Photovoltaic Power Building Using Artificial Learning Machine: A Case Study
1 Introduction
2 Materials and Methods
2.1 Proposed BIPV Study of Case
2.2 Description of Machine Learning Models
3 Empirical Evaluations
3.1 Datasets
3.2 Error Metrics
3.3 Results and Interpretation
4 Conclusion
References
Improving Speaker-Dependency/Independency of Wavelet-Based Speech Emotion Recognition
1 Introduction
2 Speech Emotion Recognition Literature
3 Multilevel Wavelet Transform
3.1 1-D Discrete Wavelet Transform (DWT)
3.2 1-D Stationary Wavelet Transform (SWT)
4 Methods
4.1 Feature Extraction and Selection
4.2 Classification
5 Experimental Setups and Results
5.1 Speaker-Dependent (SD)
5.2 Speaker-Independent (SI)
5.3 Comparison with SER Studies
6 Conclusion and Future Work
References
Improving the Quality of Service Within Multi-objective Customer-Oriented Dial-A-Ride Problems
1 Introduction
1.1 Presentation of DARP
1.2 The Customer Oriented Design of the Quality of Service in DARPs
1.3 Contributions
2 Literature Review
2.1 The Quality of Service in DARPs
2.2 Customized Service Quality in Multi-objective DARPs
3 The Multi-objective Customer Oriented DARP
3.1 Description of the Problem
3.2 Mathematical Formulation of the Problem
4 Preliminary Tests
5 Discussion and Conclusion
References
Interpretability Based Approach to Detect Fake Profiles in Instagram
1 Introduction
2 Methodology
2.1 Dataset and Features
2.2 Data Preprocessing
2.3 Over-simpling
2.4 Models Construction
2.5 Interpretation of Machine Learning Models
3 Results and Analysis
4 Conclusion
References
Learning Styles Prediction Using Social Network Analysis and Data Mining Algorithms
1 Introduction
2 Learning Styles
3 The Relationship Between Learning Styles and Social Networks
4 Proposed Method
5 Conclusion
References
Managing Spatial Big Data on the Data LakeHouse
1 Introduction
2 Background and Related Works
3 Data LakeHouse
4 Spatial Big Data on the LakeHouse
5 Experimental Study
5.1 The Spatial Lakehouse Architecture
5.2 Storage and Query Optimization
5.3 Input Datasets
5.4 Setup and Hardware
5.5 Analysis and Results
6 Conclusion
References
Medication Decision for Cardiovascular Disease Through Fermatean Fuzzy Bipolar Soft Set
1 Introduction
2 Literature Review
3 Fermatean Fuzzy Sets with Soft Sets
4 Medication Decision (Selection of the CVD Therapies)
5 Conclusion
References
Microservices: Investigating Underpinnings
1 Introduction
2 Fundamental Concepts of MSA
2.1 Internal Structure of Microservices
2.2 MSA Design Patterns in DevOps
3 Different Aspects of Microservices Architecture
3.1 Core Principles for MSA
3.2 Service Management Activities
4 Discussion
4.1 Motivations Behind the Migration to MSA
4.2 Open Research Challenges in MSA
5 Conclusion
References
Network Slicing User Association Under Optimal Input Covariance Matrix in Virtual Network MVNO
1 Introduction
2 Related Work
3 System Model
4 Ergodic Capacity of MIMO
4.1 Without Channel State Information (CSI)
4.2 With Channel State Information (CSI)
5 Proposed Slice Selection Method: Softmax
6 Numerical Investigation
7 Conclusion and Future Work
References
Pedagogical Classification Model Based on Machine Learning
1 Introduction
2 Related Work
3 Methodologies
3.1 Theoretical Foundation of Our Proposed Approach
3.2 Approach
4 Experimental Study
4.1 Evaluation Metrics
4.2 Datasets Analysis and Exploration
4.3 Environment Setup and Implementation
4.4 Results and Analysis
5 Conclusion
References
Performance Evaluation of NS2 and NS3 Simulators Using Routing Protocols in Mobile Ad Hoc Networks
1 Introduction
2 Related Works
3 Methods and Technics
4 Results and Discussions
5 Conclusion and Future Work
References
Gamification in Software Development: Systematic Literature Review
1 Introduction
2 Relevant Theory
2.1 Gamification
2.2 Software Development
3 Methodology
4 Results and Discussion
4.1 Publication
4.2 RQ1 What Gamification Elements Have Been Used
4.3 RQ2 What Gamification Framework Has Been Used
5 Conclusion
References
Robust Method for Estimating the Fundamental Matrix by a Hybrid Optimization Algorithm
1 Introduction
2 Fundamental Matrix
3 Estimation of the Fundamental Matrix by an AG-LM Algorithm
4 Experiments
5 Conclusion
References
SDN Southbound Protocols: A Comparative Study
1 Introduction
2 SDN Background
2.1 SDN Architecture
2.2 SDN Interfaces
3 Overview of SDN Southbound Protocols
3.1 OpenFlow
3.2 ForCES
3.3 P4
4 Discussion
5 Conclusion
References
Simulating and Modeling the Vaccination of Covid-19 Pandemic Using SIR Model - SVIRD
1 Introduction
2 Overview
3 Method and Model Description
3.1 SIR Model
3.2 SVIRD Extention of SIR Model
4 Sample and Analysis
4.1 Low Vaccinated Population
4.2 High Vaccinated Population
5 Simulator Description
5.1 Simulation Parameter
5.2 Simulation Process
6 Conclusion
References
The New Generation of Contact Tracing Solution: The Case of Morocco
1 Introduction
2 State of the Art
3 Method
3.1 System Architecture
3.2 The Proposed Algorithms
3.3 Assessment of Concerns for General Contact Tracing Applications
3.4 Privacy Policy and Data Confidentiality
3.5 Results
4 Discussion of Results
5 Conclusion
References
The Prediction Stock Market Price Using LSTM
1 Introduction
2 Related Works
3 Methodology
3.1 Raw Data
3.2 Data Processing
3.3 Model
3.4 Training
3.5 Compared Methods
3.6 Performance Evaluation
4 Results
4.1 Simulation Tools
4.2 Experimental Results
5 Discussion
6 Conclusion and Future Work
References
Hybrid Movie Recommender System Based on Word Embeddings
1 Introduction
2 Related Work
2.1 Recommendation Based on Content Filtering
2.2 Recommendation Based on Collaborative Filtering
3 Proposed Approach
3.1 Hybrid Recommendation
3.2 Word2vec
3.3 K Nearest Neighbor
3.4 The Overall Approach
4 Experiments
5 Conclusion
References
Towards Big Data-based Sustainable Business Models and Sustainable Supply Chain
1 Context and Motivations
2 Overview
2.1 Sustainability and Supply Chain
2.2 Business Models Vs Sustainable Business Models
2.3 Sustainable Business Models and Sustainable Supply Chain
3 Big Data-driven Sustainable Business Models
4 Conclusion and Future Work Directions
References
Treatment of Categorical Variables with Missing Values Using PLS Regression
1 Introduction and Literature Review
2 PLS1 for Categorical Predictors with Missing Values
3 Comparative Case Study
3.1 Data Description
3.2 Matrix Quantification
3.3 PLS1-NIPLAS Application
4 Conclusion
References
Type 2 Fuzzy PID for Robot Manipulator
1 Introduction
2 System Modeling of Two-Link Robot Manipulator
3 Proposed Controller Design
4 Simulations Results
5 Conclusion
References
Using Latent Class Analysis (LCA) to Identify Behavior of Moroccan Citizens Towards Electric Vehicles
1 Introduction
2 Proposed Method: Latent Class Analysis
3 Description of Data
4 Experimental Results
4.1 Multiple Correspondence Analysis Application
4.2 Interpretation of MCA Results
4.3 LCA Method Application
4.4 Analysis and Discussion
5 Conclusion
References
Using Learning Analytics Techniques to Calculate Learner’s Interaction Indicators from Their Activity Traces Data
1 Introduction
2 Research Background
3 LA Techniques and Their Application in E-Learning Systems
4 LA Techniques to Get Interaction Indicators in E-Learning Environments
4.1 Learner Interaction Indicators
4.2 Classification of Interaction Indicators
5 Synthesis and Discussion
6 Conclusion and Future Work
References
Web-Based Dyscalculia Screening with Unsupervised Clustering: Moroccan Fourth Grade Students
1 Introduction
2 Related Works
3 Non-verbal Intelligence and Mathematical Performances
4 Materials and Methods
4.1 Participants
4.2 Measures
4.3 Screening Model
5 Results and Discussion
5.1 Dendrogram
5.2 Silhouette Score
5.3 Dataset Clustering
6 Conclusion
References
Author Index