-
2024Jihene LATRECH, Zahra Kodia, Nadia Ben Azzouna
Twit-CoFiD: a hybrid recommender system based on tweet sentiment analysis
Social Network Analysis and Mining, 14(1), 123., 2024
Abstract
Internet users are overwhelmed by the vast number of services and products to choose from. This data deluge has led to the need for recommender systems. Simultaneously, the explosion of interactions on social networks is constantly increasing. These interactions produce a large amount of content that incites organizations and individuals to exploit it as a support for decision making. In our research, we propose, Twit-CoFiD, a hybrid recommender system based on tweet sentiment analysis which performs a demographic filtering to use its outputs in an enhanced collaborative filtering enriched with a sentiment analysis component. The demographic filtering, based on a Deep Neural Network (DNN), allows to overcome the cold start problem. The sentiment analysis of Twitter data combined with the enhanced collaborative filtering makes recommendations more relevant and personalized. Experiments were conducted on 1M and 100K Movielens datasets. Our system was compared to other existing methods in terms of predictive accuracy, assessed using Root Mean Square Error (RMSE) and Mean Absolute Error (MAE) metrics. It yielded improved results, achieving lower RMSE and MAE rates of 0.4474 and 0.3186 on 100K Movielens dataset and of 0.3609 and 0.3315 on 1M Movielens dataset.
-
2023Saoussen Bel Haj Kacem, Sabeur Elkosantini, ,,
On the Different Concepts and Taxonomies of eXplainable Artificial Intelligence
In : International Conference on Intelligent Systems and Pattern Recognition. Cham : Springer Nature, 2023, 75-85., 2023
Abstract
Presently, Artificial Intelligence (AI) has seen a significant shift in focus towards the design and development of interpretable or explainable intelligent systems. This shift was boosted by the fact that AI and especially the Machine Learning (ML) field models are, currently, more complex to understand due to the large amount of the treated data. However, the interchangeable misuse of XAI concepts mainly “interpretability” and “explainability” was a hindrance to the establishment of common grounds for them. Hence, given the importance of this domain, we present an overview on XAI, in this paper, in which we focus on clarifying its misused concepts. We also present the interpretability levels, some taxonomies of the literature on XAI techniques as well as some recent XAI applications.
Hamdi Ouechtati, Nadia Ben Azzouna, Lamjed Ben SaidA fuzzy logic-based model for filtering dishonest recommendations in the Social Internet of Things
Journal of Ambient Intelligence and Humanized Computing, 14(5), 6181-6200., 2023
Abstract
In the recent year, Internet of Things (IoT) has been adopted in several real-world applications such as smart transportation, smart city, retail, agriculture, smart factory, etc. to make human life more reliable. The integration of social networking concepts into the IoT led to the rise of a new paradigm: the Social Internet of Things (SIoT). In the SIoT environment, the objects are capable of establishing in an autonomous way many social relationships anywhere and anytime with other trusted objects. However, in such environment, objects may provide dishonest recommendations due to malicious reasons such as bad mouthing, ballot stuffing, random opinion, etc. In order to cater these challenges, we propose a new fuzzy logic-based model to filter dishonest recommendations and estimate their trust level based on (1) their values and sending time and the place coordinates and (2) the social relationship parameters of the recommenders. Results prove that our proposed approach is able to detect 100% of the fake Sybil attack and achieves 100% of Recognition Proportion, Sensitivity, Specificity, Accuracy and F1 score and gets 0% of False Negative and False Positive Proportions in presence of up to 90% dishonest recommendations.
Lilia Rejeb,,Tailoring project management practices for decision making: an in-depth comparative study
International Journal of Project Organisation and ManagementVol. 15, No. 2, pp 158-183. DOI: 10.1504/IJPOM.2023.131677, 2023
Abstract
The efforts to successfully complete projects lead to the development of various project management (PM) standards, best practices and guidelines, issued by different organisational bodies. These PM practices, when appropriately implemented, lead to a better project performance. However, studies on how to adopt and adapt such practices according to management needs, remain limited. In this paper, we are going to focus on how to map the project requirements with the suitable PM practices to support the PM decision making. To respond this question, we put forward an in-depth comparative study amongst the well-established PM practices considering a set of features to pick out their challenges, limits as well as their applicability. Through this comparison, we extend the discussion of PM practices features by contrasting them to three distinct categories of requirements which are technical, contextual and behavioural. This analysis allows us to map each category to its corresponding practice(s). Our finding provides comprehensive recommendation guidelines to both practitioners and researchers in order to improve their decision making in line with the project environment.
Abir Chaabani, Mouna Karaja, Lamjed Ben SaidAn Efficient Non-dominated Sorting Genetic Algorithm For Multi-objective Optimization.
9th International Conference on Control, Decision and Information Technologies, CoDIT 2023, Rome, Italy., 2023
Abstract
Multi-Objective Evolutionary Algorithms (MOEAs) is actually one of the most attractive and active research field in computer science. Significant research has been conducted in handling complex multi-objective optimization problems within this research area. The Non-Dominated Sorting Genetic Algorithm (NSGA-II) has garnered significant attention in various domains, emphasizing its specific popularity. However, the complexity of this algorithm is found to be O(MN2) with M objectives and N solutions, which is considered computationally demanding. In this paper, we are proposing a new variant of NSGA-II termed (Efficient-NSGA-II) based on our recently proposed quick non-dominated sorting algorithm with quasi-linear average time complexity; thereby making the NSGA-II algorithm efficient from a computational cost viewpoint. Experiments demonstrate that the improved version of the algorithm is indeed much faster than the previous one. Moreover, comparisons results against other multi-objective algorithms on a variety of benchmark problems show the effectiveness and the efficiency of this multi-objective version.
Samira Harrabi, Ines Ben Jaafar,Survey on IoV Routing Protocols
Wireless Personal Communications 128(1), 2023
Abstract
Internet of vehicles (IoV) can be considered as a superset of vehicular ad-hoc networks (VANETs). It extends VANET’s structure, applications and scale. Unlike, the traditional intelligent transportation system (ITS), IoV focus more on information interactions between vehicles, roadside units (RSU) and humans. The principal aim is to make people obtain road traffic information easily and in real-time, to ensure the travel convenience, and to increase the travel comfort. The goal behind the Internet of vehicles is essentially to be used in urban traffic environment to ensure network access for passengers and drivers. The environment of the IoV is the combination of different wireless network environment as well as road conditions. Despite its continuing expansion, the IOV contains different radio access technologies that lead to a heterogeneous network, and make it more crucial than the VANET. These drawbacks pose numerous challenges, especially the routing one. In IoV environment, the routing protocol must cope with events such as link failure and to find the best route to propagate the data toward the desired destination. In this paper, we mainly focus on surveying the IoV routing protocols, hence we present and compare unicast, multicast and broadcast protocols.
Rihab Abidi, Nadia Ben Azzouna, , Lamjed Ben Said,ECOTRUST: A novel model for Energy COnsumption TRUST assurance in electric vehicular networks
Ad Hoc Networks, 149, 103246., 2023
Abstract
Electric Vehicles (EVs) emerged new kinds of applications that strongly depend upon the energy information such as identifying the optimal path towards the vehicle’s destination where the EV maximizes the recovered electrical power, displaying the energetic map that provides an overview about the required energy consumption on each lane, etc. The quality of these applications relies on the reliability of the vehicle-related information (e.g. location, energy consumption). EVs may provide wrong energy information due to sensors’ failure, selfish or malicious reasons. To this aim, a fuzzy-based energy consumption trust (ECOTRUST) model is proposed herein to evaluate the quality of energy information based on two fuzzy inference systems: Instant Energy Trust (IEN-Trust) and Total Energy Trust (TEN-Trust) systems. IEN-TRUST relies on a series of plausibility checks to evaluate the coherence between the reported energy information and other parameters (slope degree, speed and acceleration rate) while TEN-TRUST relies on the similarity between neighbouring vehicles. The performance of the ECOTRUST model is evaluated in terms of the system’s robustness and accuracy under different traffic intensities. We varied the traffic volume and the percentage of malicious vehicles and their behaviours. Results show that IEN-TRUST is resilient to false messages with/without the collusion attack. However, it is unable to deal with complex behaviours of malicious vehicles (e.g. on-off attack, bush telegraph). TEN-TRUST was proposed to deal with the latter issue. Simulation results show that it can accurately deal with complex behaviours in different traffic volumes.Rihab Abidi, , Nadia Ben Azzouna, ,Monitoring Traffic Congestion Using Trust-Based Smart Road Signs
In: Klein, C., Jarke, M., Ploeg, J., Berns, K., Vinel, A., Gusikhin, O. (eds) Smart Cities, Green Technologies, and Intelligent Transport Systems. SMARTGREENS VEHITS 2023 2023. Communications in Computer and Information Science, vol 1989. Springer, Cham., 2023
Abstract
The evolution of Intelligent Transportation Systems (ITSs) enabled the emergence of traffic management applications, with the aim to enhance the traffic flow and ease the congestion by monitoring the traffic. However, the efficiency of these applications resides on the accuracy of the shared traffic information. Accordingly, trust management models are applied to secure the Vehicular Ad-hoc NETwork (VANET) and to assess the reliability of the data shared within the vehicular network. In this paper, we propose a proof-of-concept of the trust framework proposed in . The main objective is to observe the utility of applying trust management models to the intelligent transportation systems. The simulation results show that deploying trust-based Smart Road Signs (SRSs) helps to alleviate the traffic congestion around junctions by displaying the traffic state to users and offering them the opportunity to take alternative roads.Besma Ben Amara, Hédia Sellemi, Lamjed Ben SaidAn Approach for Serious Games Requirements Specification based on Design Challenges and Characteristics Taxonomy
Multi-Conference OCTA'2023., 2023
Abstract
As in software development projects, the most critical activity in
Serious Game (SG) design process is the requirements specification due to SG's
multidisciplinary and characteristics complexity. In the literature, specific
design methodologies with requirements specification strategies are still needed
to achieve an engaged SG. This paper proposes an approach that assists
designers and design stakeholders when specifying required SG features and
their relationships. We shaped this approach into three stages with three
abstraction levels based on both characteristics taxonomy model and the SG
design challenges we propose in this work. We practiced the proposed process
in specifying an SG for health safety environment training for workers in fuel
storage sites. The feedback shows that such a strategy would be highly
beneficial for the participatory design process since it reduces game features'
complexity and thus their understanding by the design team members. It also
promotes game design artifacts evaluation and allows effective processing of
the game requirement changes.Lamjed Ben Said, ,Fuzzy logic based multi-objective optimization of a multi-agent transit control system.
Memetic Comp. 15, 71–87 (2023)., 2023
Abstract
This paper models a transit control system for the management of traffic perturbations of public transport. The transit system data is voluminous and highly dynamic. Moreover, the transit domain has a remarkable lack of intelligent systems to monitor and maintain better performance. Consequently, realizing an intelligent transit control system has become a consistent need. The modeling of the system addresses a problem of optimizing performance measures based on key performance indicators. Its objective is to find the optimal control action in disturbance cases. The solution consists in combining all performance measures in a single measure by using fuzzification without neglecting the space and time requirements of the traffic. To model and implement our system we used a multi-agent approach. The experiments performed were based on real network traffic data. The obtained results demonstrate the relevance of the proposed fuzzy approach in our optimization problem and show the advantage of the multi-agent system in the modeling of our control system. We prove that the proposed control system achieves better results than certain existing fuzzy approaches and is able to manage disturbances with a better performance than the existing solutions.