skip to main content
10.1145/3333165acmotherconferencesBook PagePublication PagesarabwicConference Proceedingsconference-collections
ArabWIC 2019: Proceedings of the ArabWIC 6th Annual International Conference Research Track
ACM2019 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ArabWIC 2019: ArabWIC 6th Annual International Conference Research Track Rabat Morocco March 7 - 9, 2019
ISBN:
978-1-4503-6089-0
Published:
07 March 2019
In-Cooperation:
Google Inc., Microsoft, Facebook, ORACLE, IBM
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 16 Feb 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
research-article
Exploratory Study on Estimating the Cost of an Open Source Platform for an Astronomy Center
Article No.: 1, Pages 1–7https://doi.org/10.1145/3333165.3333166

A huge interest in astronomy has caused many astronomers and developers to collaborate to create software programs in this field. Open source software (OSS) is playing a vital and positive role in space activities and can make a substantial difference ...

research-article
Inter Blockchain Communication: A Survey
Article No.: 2, Pages 1–6https://doi.org/10.1145/3333165.3333167

Blockchain technology is growing massively where the number of blockchain platforms and decentralized applications are increasing rapidly in the last years. However, most of the existing blockchain networks are operating in a standalone environment ...

research-article
Passage challenges from data-intensive system to knowledge-intensive system related to process mining field
Article No.: 3, Pages 1–6https://doi.org/10.1145/3333165.3333168

Process mining has emerged as a research field that focuses on the analysis of processes using event data. Process mining is a current topic that reveals several challenges, the most important of which have defined in the Process Mining Manifesto [1]. ...

research-article
Firmware Update Attacks and Security for IoT Devices: Survey
Article No.: 4, Pages 1–6https://doi.org/10.1145/3333165.3333169

The increasing vulnerabilities found in Internet of Things (IoT) devices have raised the need for a solid mechanism of securing the firmware update of these connected objects, since firmware updates are one way to patch vulnerabilities and add security ...

research-article
Towards a new generation of farming system: web services based online sales
Article No.: 5, Pages 1–6https://doi.org/10.1145/3333165.3333170

Agriculture is one of the pillars of the developing world's economy, which is the main source of livelihood for the majority of people in rural areas. However, information technology is not widely used for this sector. As a result, e-Government ...

research-article
Towards a Three Layer Architecture for Dynamic Spectrum Access in Cognitive Radio Networks
Article No.: 6, Pages 1–6https://doi.org/10.1145/3333165.3333171

Cognitive Radio (CR) is considered as one of the most promising technologies for future wireless communications. To make CR systems practical, CR networks must be able to coexist; this may cause interference to other users. To deal with this problem, ...

research-article
A new local algorithm for overlapping community detection based on clustering coefficient and common neighbor similarity
Article No.: 7, Pages 1–6https://doi.org/10.1145/3333165.3333172

Identification of communities represents one of the most important fields in social network analysis. In this paper, we propose a new local algorithm mainly focused on finding the initial communities then expanding them by using a new weighted belonging ...

research-article
Introducing an Artifact-driven language for Service Composition
Article No.: 8, Pages 1–6https://doi.org/10.1145/3333165.3333173

The most recent service composition approaches rely on the mechanism, which involves scalable and decentralized execution of services. Although some formal tools have been used to this effect, they are influenced by the standard of web service ...

research-article
DSS success: The intertwining of satisfaction and learning
Article No.: 9, Pages 1–6https://doi.org/10.1145/3333165.3333174

Satisfaction has long been used as a measure of decision support systems (DSS) success. Recent studies are suggesting some other effects of DSS on users such as learning. Decision makers learning has been described as an important metric of the decision ...

research-article
Moroccan Patient-centered Hospital Information System: Global Architecture
Article No.: 10, Pages 1–6https://doi.org/10.1145/3333165.3333175

In Morocco, most Hospital Information System projects undertaken by the Moroccan health sector are technical-oriented and executed as independent projects, with a focus on the management of administrative and financial activities above patient needs and ...

research-article
Behavio2Auth: Sensor-based Behavior Biometric Authentication for Smartphones
Article No.: 11, Pages 1–6https://doi.org/10.1145/3333165.3333176

Many mobile applications use mobile built-in sensors to provide users with a plethora of services to collect and store a mass of sensitive data. These mobile devices need to be protected from unauthorized access and allow access for legitimate users ...

research-article
Investigating algorithmic variations of an RS Graph-based collaborative filtering approach
Article No.: 12, Pages 1–6https://doi.org/10.1145/3333165.3333177

A personalized recommendation system learns users specific profiles from users feedback and content in order to deliver information tailored to each individual user's interest. Although great effort has been devoted to the proposal, implementation and ...

research-article
Long-Term Digital Preservation: A Preliminary Study on Software and Format Obsolescence
Article No.: 13, Pages 1–6https://doi.org/10.1145/3333165.3333178

Long-term digital preservation aims to ensure the accessibility, authenticity, intelligibility, and integrity of digital objects for long periods that may be unlimited. It is a big challenge for institutions seeking to preserve their sensitive, ...

research-article
TONE: A Method for Terminological Ontology Evaluation
Article No.: 14, Pages 1–10https://doi.org/10.1145/3333165.3333179

Selecting the most appropriate candidate domain ontology is necessary to ensure that the ontology covers the domain of interest at a reasonable level of detail. Existing approaches have the following drawbacks:

(1) Focused on the ontology coverage of ...

research-article
Open Government Data: Towards a comparison of Data Lifecycle models
Article No.: 15, Pages 1–6https://doi.org/10.1145/3333165.3333180

Government, through Open Government Data "OGD, becomes one of the important producers of open data. OGD is an opportunity to create valuable services and innovative products useful for citizens as a primarily targeted consumer. However, the expected ...

research-article
User Centric Community Structure for Intelligent Transport Network applications
Article No.: 16, Pages 1–6https://doi.org/10.1145/3333165.3333181

The urban traffic system is one of the most critical infrastructures. It can be abstracted into a complex network composed of strongly connected groups. Understanding the composition of such networks requires a decomposition of the network into modules, ...

research-article
Building a Process Meta Model Extended for Cycles
Article No.: 17, Pages 1–7https://doi.org/10.1145/3333165.3333182

Process modeling is an important and delicate step, and it is among reasons that cause failure in the implementation or the improvement of any type of system. Indeed, process modeling is based on the inter-relationship between the processes that make up ...

research-article
A personalized e-Gov framework to bridge silos between Moroccan administrations
Article No.: 18, Pages 1–7https://doi.org/10.1145/3333165.3333183

E-Government plays a crucial role in modernizing public sectors and developing social and economic life of citizens. To raise these challenges, our country has adopted since 2009 the e-Moroccan strategy that aims to facilitate the access and the use of ...

research-article
Query Expansion Using DBpedia and WordNet
Article No.: 19, Pages 1–6https://doi.org/10.1145/3333165.3333184

This paper presents a semantic approach based on DBpedia and WordNet to extract the candidate terms for query expansion. We divided DBpedia features into: general features and specific features that are available depending on the domain of the resource. ...

research-article
Deep Learning for Sentiment Analysis of Arabic Text
Article No.: 20, Pages 1–8https://doi.org/10.1145/3333165.3333185

Deep learning has been very successful in the past decades, especially in Computer Vision and Speech Recognition fields. It has been also used successfully in the Natural Language Processing field because of the availability of an enormous amount of ...

Contributors
  • IBM Thomas J. Watson Research Center
  • Mohammadia School of Engineers
  • Mohammadia School of Engineers
  • Wayne State University
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

ArabWIC 2019 Paper Acceptance Rate 20 of 36 submissions, 56%;
Overall Acceptance Rate 20 of 36 submissions, 56%
YearSubmittedAcceptedRate
ArabWIC 2019362056%
Overall362056%