Next Issue
Volume 7, IOCMA 2023
Previous Issue
Volume 5, ICTIST’22
 
 

Comput. Sci. Math. Forum, 2023, ICSAM 2023

The 3rd International Day on Computer Science and Applied Mathematics

Errachidia, Morocco | 13 May 2023

Volume Editors:
Abdeslam Jakimi, Moulay Ismail University, Morocco
Mohamed Oualla, Moulay Ismail University, Morocco

Number of Papers: 12
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Cover Story (view full-size image): ICSAM’23 is an ideal forum for different researchers to present excellent results and new challenges facing the field of computer science and applied mathematics. ICSAM’23 reaches its 3rd [...] Read more.
Order results
Result details
Select all
Export citation of selected articles as:

Editorial

Jump to: Other

2 pages, 162 KiB  
Editorial
The 3rd International Day on Computer Science and Applied Mathematics (ICSAM’23)
by Abdeslam Jakimi and Mohamed Oualla
Comput. Sci. Math. Forum 2023, 6(1), 10; https://doi.org/10.3390/cmsf2023006010 - 12 Jul 2023
Viewed by 816
Abstract
ICSAM’23 is an ideal forum for different researchers to present excellent results and new challenges facing the field of computer science and applied mathematics [...] Full article
(This article belongs to the Proceedings of The 3rd International Day on Computer Science and Applied Mathematics)
2 pages, 180 KiB  
Editorial
Preface: The 3rd International Day on Computer Science and Applied Mathematics (ICSAM’23)
by Abdeslam Jakimi and Mohamed Oualla
Comput. Sci. Math. Forum 2023, 6(1), 11; https://doi.org/10.3390/cmsf2023006011 - 31 Aug 2023
Viewed by 1196
Abstract
The Scientific Association of Academic Researchers (ASCA) and Software Engineering & Information Systems Engineering Team (GL-ISI) organized, in collaboration with Moulay Ismail University, the 3rd International Day on Computer Science and Applied Mathematics (ICSAM’23) on May 13, 2023, in the Faculty of Sciences [...] Read more.
The Scientific Association of Academic Researchers (ASCA) and Software Engineering & Information Systems Engineering Team (GL-ISI) organized, in collaboration with Moulay Ismail University, the 3rd International Day on Computer Science and Applied Mathematics (ICSAM’23) on May 13, 2023, in the Faculty of Sciences and Technology of Errachidia. Full article
(This article belongs to the Proceedings of The 3rd International Day on Computer Science and Applied Mathematics)

Other

Jump to: Editorial

5 pages, 209 KiB  
Proceeding Paper
Secure and Efficient Code-Based Cryptography for Multi-Party Computation and Digital Signatures
by Abdellatif Kichna and Abderrazak Farchane
Comput. Sci. Math. Forum 2023, 6(1), 1; https://doi.org/10.3390/cmsf2023006001 - 26 May 2023
Cited by 2 | Viewed by 1803
Abstract
Code-based cryptography is a promising candidate for post-quantum cryptography due to its strong security guarantees and efficient implementations. In this paper, we explore the use of code-based cryptography for multi-party computation and digital signatures, two important cryptographic applications. We present several efficient and [...] Read more.
Code-based cryptography is a promising candidate for post-quantum cryptography due to its strong security guarantees and efficient implementations. In this paper, we explore the use of code-based cryptography for multi-party computation and digital signatures, two important cryptographic applications. We present several efficient and secure code-based protocols for these applications, based on the McEliece cryptosystem and its variants. Our protocols offer strong security guarantees against both classical and quantum attacks, and have competitive performance compared to other post-quantum cryptographic schemes. We also compare code-based cryptography with other post-quantum schemes, including lattice-based and hash-based cryptography, and discuss the advantages and disadvantages of each approach. Full article
(This article belongs to the Proceedings of The 3rd International Day on Computer Science and Applied Mathematics)
5 pages, 834 KiB  
Proceeding Paper
A Sketch of a Model-Driven Approach to Develop Smart Tourism Mobile Applications
by Hamza Abdelmalek, Lahbib Naimi, Ismaïl Khriss and Abdeslam Jakimi
Comput. Sci. Math. Forum 2023, 6(1), 2; https://doi.org/10.3390/cmsf2023006002 - 30 May 2023
Viewed by 2051
Abstract
Several approaches have been proposed to accelerate software development. Model-driven engineering (MDE) is one approach that aims to abstract and automate the development process using models and transformations as the main artifacts. This paper presents our model-driven approach to developing smart tourism mobile [...] Read more.
Several approaches have been proposed to accelerate software development. Model-driven engineering (MDE) is one approach that aims to abstract and automate the development process using models and transformations as the main artifacts. This paper presents our model-driven approach to developing smart tourism mobile applications. Full article
(This article belongs to the Proceedings of The 3rd International Day on Computer Science and Applied Mathematics)
Show Figures

Figure 1

6 pages, 1215 KiB  
Proceeding Paper
Developing Conversational Agent Using Deep Learning Techniques
by Charaf Ouaddi, Lamya Benaddi, Ismaïl Khriss and Abdeslam Jakimi
Comput. Sci. Math. Forum 2023, 6(1), 3; https://doi.org/10.3390/cmsf2023006003 - 30 May 2023
Cited by 10 | Viewed by 2163
Abstract
Recent advances in artificial intelligence and natural language processing have been widely used in recent years, and one of the best applications of these technologies is conversational agents. These agents are computer programs that can converse with users in natural languages. Developing conversational [...] Read more.
Recent advances in artificial intelligence and natural language processing have been widely used in recent years, and one of the best applications of these technologies is conversational agents. These agents are computer programs that can converse with users in natural languages. Developing conversational agents using artificial intelligence techniques is an exciting prospect in natural language processing. In this study, we built an intelligent conversational agent using deep learning techniques. We used a sequence-to-sequence model with encoder–decoder architecture. This encoder–decoder uses a recurrent neural network with long–short-term memory cells. The encoder was used to understand the user’s question, and the decoder was to provide the answer. Full article
(This article belongs to the Proceedings of The 3rd International Day on Computer Science and Applied Mathematics)
Show Figures

Figure 1

6 pages, 1701 KiB  
Proceeding Paper
A Software Factory for Accelerating the Development of Recommender Systems in Smart Tourism Mobile Applications: An Overview
by Loubna Mamad, Mamadou Mbow, Ismaïl Khriss and Abdeslam Jakimi
Comput. Sci. Math. Forum 2023, 6(1), 4; https://doi.org/10.3390/cmsf2023006004 - 30 May 2023
Cited by 3 | Viewed by 2087
Abstract
Recommender Systems (RSs) have become essential for suggesting personalized recommendations to users across various fields, especially in tourism. Due to the rising popularity of mobile devices, mobile RSs have emerged as a potential research area. However, developing these systems into smart tourism mobile [...] Read more.
Recommender Systems (RSs) have become essential for suggesting personalized recommendations to users across various fields, especially in tourism. Due to the rising popularity of mobile devices, mobile RSs have emerged as a potential research area. However, developing these systems into smart tourism mobile applications requires a significant investment in artificial intelligence experts and software engineering. Hence, to reduce the cost of this investment, we propose building a software factory that provides a robust set of assets such as domain-specific languages for accelerating the development process. To this aim, we apply a model-driven engineering approach that uses models, metamodels, and model transformations to support the designing and implementation of these software systems. In this paper, we introduce an overview of our software factory to support the development of several models of RSs. Full article
(This article belongs to the Proceedings of The 3rd International Day on Computer Science and Applied Mathematics)
Show Figures

Figure 1

5 pages, 496 KiB  
Proceeding Paper
Analysis of Tools for the Development of Conversational Agents
by Lamya Benaddi, Charaf Ouaddi, Ismaïl Khriss and Brahim Ouchao
Comput. Sci. Math. Forum 2023, 6(1), 5; https://doi.org/10.3390/cmsf2023006005 - 30 May 2023
Cited by 11 | Viewed by 1543
Abstract
Conversational agents are being increasingly adopted in various domains, such as e-commerce and customer services, and as a direct communication channel between companies and end-users. Several tools have been developed to facilitate their definition and deployment. They exploit existing cloud infrastructures and artificial [...] Read more.
Conversational agents are being increasingly adopted in various domains, such as e-commerce and customer services, and as a direct communication channel between companies and end-users. Several tools have been developed to facilitate their definition and deployment. They exploit existing cloud infrastructures and artificial intelligence (AI) techniques to efficiently process users’ input and extract conversational information. Major Information Technology (IT) companies, such as Google, IBM, Microsoft, and Amazon, have provided powerful tools to develop conversational agents. Still, choosing the most appropriate tool is not easy, as it may require high costs associated with automatic natural language processing (NLP) services and expertise in software engineering and AI. Therefore, this paper aims to analyze different tools to help developers and non-developers to choose the optimal tool for their specific scenario of creating a conversational agent. Full article
(This article belongs to the Proceedings of The 3rd International Day on Computer Science and Applied Mathematics)
Show Figures

Figure 1

5 pages, 694 KiB  
Proceeding Paper
Kiln Process Fan Vibrations Prediction Based on Machine Learning Models: Application to the Raw Mill Fan
by Mohammed Toum Benchekroun, Smail Zaki, Brahim Hezzem and Hicham Laacha
Comput. Sci. Math. Forum 2023, 6(1), 6; https://doi.org/10.3390/cmsf2023006006 - 31 May 2023
Cited by 2 | Viewed by 2441
Abstract
Kiln process fans play a crucial role in the cement manufacturing process. This article presents a study on the use of machine learning models to predict kiln process fan vibrations based on process fan running parameters. The study tested three different models, namely, [...] Read more.
Kiln process fans play a crucial role in the cement manufacturing process. This article presents a study on the use of machine learning models to predict kiln process fan vibrations based on process fan running parameters. The study tested three different models, namely, k-nearest neighbors, linear regression, and random forest, and it found that all three could accurately predict fan vibrations. However, the random forest model performed the best due to its ability to handle non-linear relationships. The findings have significant implications for the maintenance and operation of kiln process fans, as predictive maintenance can reduce downtime and improve operational efficiency. Full article
(This article belongs to the Proceedings of The 3rd International Day on Computer Science and Applied Mathematics)
Show Figures

Figure 1

6 pages, 928 KiB  
Proceeding Paper
Blockchain Architecture for IoT: Comparative Survey
by Yassin Elgountery, Amal Boushaba, Mohamed Oualla and Hassain Sadki
Comput. Sci. Math. Forum 2023, 6(1), 7; https://doi.org/10.3390/cmsf2023006007 - 1 Jun 2023
Cited by 1 | Viewed by 1575
Abstract
Blockchain technology is increasingly being used in the internet of things (BCoT: Blockchain for IoT) to ensure the security and reliability of data exchanged between connected devices. There are several generic blockchain architectures for IoT that differ in their network and consensus characteristics. [...] Read more.
Blockchain technology is increasingly being used in the internet of things (BCoT: Blockchain for IoT) to ensure the security and reliability of data exchanged between connected devices. There are several generic blockchain architectures for IoT that differ in their network and consensus characteristics. Blockchain architectures for IoT can be compared based on various criteria such as the type of storage used, consensus, and security. They should be selected based on the specific needs of each use case, and the resource constraints of connected devices and security and resilience requirements. In this article, we present a review of blockchain architectures for the internet of things that have been studied and applied in some well-known contemporary applications. Full article
(This article belongs to the Proceedings of The 3rd International Day on Computer Science and Applied Mathematics)
Show Figures

Figure 1

7 pages, 1717 KiB  
Proceeding Paper
Quantum Cryptography Simulation of Entanglement and Quantum Teleportation
by Brahim Ouchao
Comput. Sci. Math. Forum 2023, 6(1), 8; https://doi.org/10.3390/cmsf2023006008 - 5 Jun 2023
Viewed by 1083
Abstract
The objective of this article is to present a simulation of quantum information. We take advantage of quantum entanglement to ensure the spontaneous transfer of a state from one qubit to another similar qubit. Similarly, the principle of quantum teleportation is conceived in [...] Read more.
The objective of this article is to present a simulation of quantum information. We take advantage of quantum entanglement to ensure the spontaneous transfer of a state from one qubit to another similar qubit. Similarly, the principle of quantum teleportation is conceived in the application; it is not about transfer of matter, but of information. Indeed, two systems already exist, and at the end of the teleportation, the process is destructive—the first system will no longer be in the same state as the initial state and the second system takes the state of the first, which does not contradict the no-cloning theorem. Full article
(This article belongs to the Proceedings of The 3rd International Day on Computer Science and Applied Mathematics)
Show Figures

Figure 1

6 pages, 491 KiB  
Proceeding Paper
The Criteria for Adapting a Blockchain Consensus Algorithm to IoT Networks
by Mohamed Aghroud, Mohamed Oualla and Lahcen El Bermi
Comput. Sci. Math. Forum 2023, 6(1), 9; https://doi.org/10.3390/cmsf2023006009 - 7 Jun 2023
Cited by 1 | Viewed by 1172
Abstract
The Internet of Things (IoT) is a network of smart objects connected via the Internet, where each object is identified by a unique, accessible, and programmable address, while Blockchain is a technology for storing and transmitting information based on a decentralized system such [...] Read more.
The Internet of Things (IoT) is a network of smart objects connected via the Internet, where each object is identified by a unique, accessible, and programmable address, while Blockchain is a technology for storing and transmitting information based on a decentralized system such that the centralized validation of transactions is replaced by a consensus mechanism. The integration of these two technologies requires consensus protocols to overcome the major challenges encountered in IoT systems, including issues related to security, storage capacity limits, computing power, etc. Therefore, different consensus algorithms have been implemented. For this purpose, this paper presents a research study on the criteria that would render a Blockchain consensus algorithm suitable for IoT networks, namely, computing power, latency, storage capacity, and security. Full article
(This article belongs to the Proceedings of The 3rd International Day on Computer Science and Applied Mathematics)
Show Figures

Figure 1

6 pages, 570 KiB  
Proceeding Paper
Contribution to the Characterization of the Kidney Ultrasound Image Using Singularity Levels
by Mustapha Tahiri Alaoui and Redouan Korchiyne
Comput. Sci. Math. Forum 2023, 6(1), 12; https://doi.org/10.3390/cmsf2023006012 - 28 Sep 2023
Viewed by 1121
Abstract
The aim to improve diagnosis decision systems of kidneys led to the concept of many methods of texture characterization of kidneys from ultrasound images. Here, as a first main contribution, we propose a texture characterization method based on the singularity defined by the [...] Read more.
The aim to improve diagnosis decision systems of kidneys led to the concept of many methods of texture characterization of kidneys from ultrasound images. Here, as a first main contribution, we propose a texture characterization method based on the singularity defined by the Hölder exponent, which is multifractal local information. Indeed, the originality of our contribution here is to build a singularity-level matrix corresponding to different levels of regularities, from which we extract new texture features. Finally, as a second main contribution, we will evaluate the potential of our proposed multifractal features to characterize textured ultrasound images of the kidney. Having more reproducibility of the texture features first requires a good choice of Choquet capacity to calculate the irregularities and a selection of a more representative region of interest (ROIs) to analyze by carrying out an adapted virtual puncture in the kidney components. The results of the supervised classification, using three classes of images (young, healthy, and glomerulonephritis), are interesting and promising since the classification accuracy reaches about 80%. This encourages conducting further research to yield better results by overcoming the limitations and taking into account the recommendations made in this article. Full article
(This article belongs to the Proceedings of The 3rd International Day on Computer Science and Applied Mathematics)
Show Figures

Figure 1

Previous Issue
Back to TopTop