Technical Program

 

International Joint Conferences - Draft Technical Programme

9th International Conference on Soft Computing and Pattern Recognition (SoCPaR)
8th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA )
13th International Conference on Information Assurance and Security (IAS)

Venue: Rayad Mogador Kasbah Hotel, Marrakech, Morocco

Dates: December 11 - 13, 2O17

=========================================

Day 1, December 11, 2017

=========================================

08.00 - : Registration

08:15 - 08.30: Inauguration

08:30 - 09:30: Plenary Talk - I, Alexander Gelbukh, Instituto Politecnico Nacional, Mexico

09:30-10:00: Coffee break
=========================

Room A: 10:00-13:00: SoCPaR Session I
=====================================

10.00 - 10.15
ID7
An Energy-Efficient MAC protocol for Mobile Wireless Sensor Network Based on IR-UWB
Anouar Darif, Chaibi Hasna and Rachid Saadane

10.15 - 10.30
ID10
Obstacle Detection Algorithm By Stereoscopic Image Processing : Navigation Assistance For The Blind And Visually Impaired
Adil Elachhab and Mohammed Mikou

10.30 - 10.45
ID12
Local Directional Multi Radius Binary Pattern: Novel Descriptor For Face Recognition Application
Mohamed Kas, Youssef Elmerabet, Yassine Ruichek and Rochdi Messoussi

10.45 - 11.00
ID14
Content-Based Image Retrieval Approach Using Color And Texture Applied To Two Databases (Coil-100 And Wang)
El Mehdi El Aroussi, Noureddine El Houssif and Hassan Silkan

11.00 - 11.15
ID18
Shape Classification Using B-Spline Approximation And Contour Based Shape Descriptors
Youssef Ait Khouya and Faouzi Ghorbel

11.15 - 11.30
ID21
An Image Processing Based Framework Using Crowdsourcing for a Successful Suspect Investigation
Hasna Elalaoui Elabdallaoui, Fatima Zohra Ennaji and Elfazziki Abdelaziz

11.30 - 11.45
ID22
Recognition and Classification Of Arabic Fricative Consonants
Elfahm Youssef, Mounir Badia, Mounir Ilham, Elmaazouzi Laila and Farchi Abdelmajid

11.45 - 12.00
ID24
Cancer Classification Using Gene Expression Profiling: Application Of The Filter Approach With The Clustering Algorithm
Sara Haddou Bouazza, Khalid Auhmani, Abdelouhab Zeroual and Nezha Hamdi

12.00 - 12.15
ID25
Agrima Abdellah, Mounir Ilham, Elmazouzi Laila and Farchi Abdelmajid
Detection of negative emotion using Acoustic cues and Machine Learning Algorithms

12.15 - 12.30
ID26
Using Multiple Minimum Support to Auto-Adjust the Threshold of Support in Apriori Algorithm
Azzeddine Dahbi, Youssef Balouki and Taoufic Gadi

 

12.30 - 12.45
ID27
Prediction of the Degree of Parkinson's Condition Using Recordings of Patients' Voices
Clara Jimenez-Recio, Alexander Zlotnik, Ascension Gallardo-Antolin, Juan M. Montero and Juan Carlos Martinez-Castrillo

12.45 - 13.00
ID28
An Overview Of A Distributional Word Representation For An Arabic Named Entity Recognition System
Chaimae Azroumahli, Yacine El Younoussi and Ferdaous Achbal

ROOM B: 10:50-13:00: IAS Session I
==================================

10.00 - 10.15
ID2
A Semantic Approach towards Online Social Networks multi-aspects Analysis
Asmae El Kassiri and Fatima-Zahra Belouadha

10.15 - 10.30
ID3
Towards A New Generation of Wheelchairs Sensitive To Emotional Behavior Of Disabled People
Mohamed Moncef Ben Khelifa, Hachem A. Lamti and Adel M. Alimi

10.30 - 10.45
ID5
Performance Analysis of Majority Logic Decoding of CSOC Codes over GG Channels
Souad Labghough, Fouad Ayoub and Mostafa Belkasm

10.45 - 11.00
ID9
Straightforward MaaS to Ensure Interoperability in heterogeneous Environmen
Majda Elhozmari and Ahmed Ettalbi

11.00 - 11.15
ID10
A Practical Maturity Framework for Information Security Governance and Management
Mustapha Belaissaoui and Abdelkbir Sahid

11:15- 11:30
ID12
System Multi Agents for Automatic Negotiation of SLA in Cloud Computing
Zineb Bakraouy, Amine Baina and Mostafa Bellafkih

11:30 - 11:45
ID15
Modeling the Effect of Security Measures on Electronic Payment Risks
Marie Ndaw, Samuel Ouya and Gervais Mendy

11:45 - 12:00
ID17
Modeling An Anomaly-Based Intrusion Prevention System Using Game Theory
El Mehdi Kandoussi, Iman El Mir, Mohamed Hanini and Abdelkrim Haqiq

12:00 - 12:15
ID20
Optimized Security as A Service Platforms via Stochastic Modeling and Dynamic Programming
Oussama Mjihil, Abdelkrim Haqiq, Hamid Taramit and Dijiang Huang

12:15 - 12:30
ID22
Multi-View Web Services As A Key Security Layer In Internet Of Things Architecture Within A Cloud Infrastructure
nass Misbah and Ahmed Ettalbi

12:30 - 12:45
ID23
Access Domain-based Approach for Anomaly Detection and Resolution in XACML Policies
Maryem Ait El Hadj, Yahya Benkaouz, Ahmed Khoumsi and Mohammed Erradi

12:45 - 13:00
ID24
Biometric template privacy using Visual Cryptography
Sana Ibjaoun, Anas Abou El Kalam, Vincent Poirriez and Abdellah Ait Ouahman

 

13:00 - 14:00 : Lunch
================

 

14:00 -- 15.00: Plenary Talk - II, Oscar Castillo, Tijuana Institute of Technology, Mexico

Room A: 15:00-16:30 : SoCPaR Session II
=======================================

15.00 - 15.15
ID29
Discrete Particle Swarm Optimization for Travelling Salesman Problems: New Combinatorial Operators
Morad Bouzidi, Mohammed Essaid Riffi and Ahmed Serhir

15.15 - 15.30
ID31
On Maximal Frequent Itemsets Mining Enumeration
Said Jabbour, Fatima Zahra Mana and Lakhdar Sais

15.30 - 15.45
ID37
Particle swarm optimization as a new measure of machine translation efficiency
Angel Montes, Jolanta Mizera-Pietraszko, Ricardo Rodriguez Jorge and Edgar Alonso Mart抧ez Garc抋

15.45 - 16.00
ID42
A Human Identification Technique Through Dorsal Hand Vein Texture analysis based on NSCT Decomposition
Amira Oueslati Hermi, Nadia Feddaoui and Kamel Hamrouni

 

Room B: 15:00-16:00 : IAS Session II
=======================================

15:00 - 15.15
ID26
Scalable and Reactive Network Intrusion Detection and Prevention System
Safaa Mahrach, Oussama Mjihil and Abdelkrim Haqiq

15.15 - 15.30
ID29
A statistical analysis for high-speed stream cipher
Youssef Harmouch and Rachid Elkouch

 

15:30 - 15.45
ID31
Weighted Access Control Policies Cohabitation In Distributed Systems
Asmaa El Kandoussi and Hanan El Bakkali

15:45 - 16.00
ID32
A Comparative Study on Access Control Models and Security Requirements in Workflow Systems
Monsef Boughrous and Hanan El Bakkali

16:00-16:30: Coffee break
==========================

ROOM A: 16:30 - 18.00 : IBICA Session I
=======================================

16.30 - 16.45
ID1
Reducing Blackhole Effect In WSN
Sana Akourmis, Youssef Fakhri and Moulay Driss Rahmani

16.45 - 17.00
ID2
Minimum Spanning Tree In Trapezoidal Fuzzy Neutrosophic Environment
Said Broumi, Assia Bakali, Mohamed Talea, Florentin Smarandache and Vakkas Ulu鏰y

17.00 - 17.15
ID3
Differential Evolution Assisted MUD for MC-CDMA Systems Using Non-Orthogonal Spreading Codes
Atta Rahman, Kiran Sultan, Nahier Aldhafferi and Abdullah Alqahtani

17.15 - 17.30
ID8
A survey of Cross-Layer Design for Wireless Visual Sensor Networks
Afaf Mosaif and Said Rakrak

17.30 - 17.45
ID9
An IPv6 Flow Label Based Approach for Mobile IPTV Quality of Service
Mohamed Matoui, Noureddine Moumkine and Abdellah Adib

 

17.45- 18.00
ID10
NWP Model Revisions using Polynomial Similarity Solutions of the General Partial Differential Equation
Ladislav Zjavka and Stanislav Mi氠k

 

ROOM A: 16:30 - 18.00 : IBICA Session II
=======================================

16.30 - 16.45
ID15
Energy Consumption and Cost Analysis For Data Centers With Workload Control
Abdellah Ouammou, Mohamed Hanini, Said El Kafhali and Abdelghani Ben Taha

16.45 - 17.00
ID19
A Stochastic Game Analysis of the Slotted ALOHA Mechanism Combined with ZigZag Decoding and Transmission Cost
Ahmed Boujnoui, Abdellah Zaaloul and Abdelkrim Haqiq

17.00 - 17.15
ID21
Analytic Approach Using Continuous Markov Chain To Improve The Qos Of A Wireless Network
Adnane El Hanjri, Abdellah Zaaloul and Abdelkrim Haqiq

17.15 - 17.45
ID22
Determining, Studying And Evaluating The Most Route Lifetime As The Most Stable Path Between Two Vehicles in VANET
Mohamed Nabil, Abdelmajid Hajami and Abdelkrim Haqiq

17.45 - 18.00
ID24
Performance Improvement of Bio-Inspired Strategies through Feedback Laws
Lairenjam Obiroy Singh and Rajagopalan Devanathan

 

18.00 - 18.15 Closing Ceremony

 

--------------------------------
Virtual Presentations
--------------------------------

IBICA 2017 - ID7
Solving the Problem Of Distribution Of Fiscal Coupons By Using A Steady State Genetic Algorithm
Q雗dres?Hyseni, Sule Yildirim Yayilgan, Bujar Krasniqi and Kadri Sylejmani

IBICA 2017 - ID23
Reverse Extraction of Early-age Hydration Kinetic Equation of Portland Cement Using Gene Expression Programming With Similarity Weight Tournament Selection
Mengfan Zhi, Ziqiang Yu, Bo Yang, Wang Lin, Liangliang Zhang, Jifeng Guo and Xuehui Zhu

IBICA 2017 - INV1
Oscar Castillo, Fevrier Valdez and Frumen Olivas
Dynamic parameter adaptation using interval type-2 fuzzy logic in bio-inspired optimization methods

 

IAS 2017 - ID4
A Comprehensive Technical Review on security techniques and low power target architectures for Wireless Sensor Networks
Manel Elleuchi

IAS 2017 - ID14
A Comparison Between A Normal And An Epileptic Rest State Model
Ridha Jarray, Nawel Jmail, Abir Hadriche and Tarek Frikha

IAS 2017 - ID27
A Hybrid Feature Selection For MRI Brain Tumor Classification
Ahmed Kharrat and Mahmoud N閖i

 

SoCPaR 2017 - ID 11
A Simultaneous Topic and Sentiment Classfication of Tweets
Doaa Salem

SoCPaR 2017 - ID 40
Nizar Rokbani, Ikram Twir and Abdelkrim Haqiq
Experimental Investigation of Ant Supervised by Simplified PSO with Local Search Mechanism (SASPSO-2Opt)

====================================================

Day 2 and 3 , December 12 -13, 2017

No technical sessions

====================================================