- Sentiment Analysis and Opinion Mining
- Advanced Text Analysis Techniques
- Topic Modeling
- Vehicular Ad Hoc Networks (VANETs)
- Computational and Text Analysis Methods
- Energy Load and Power Forecasting
- Imbalanced Data Classification Techniques
- Mental Health via Writing
- IoT and Edge/Fog Computing
- Gene expression and cancer classification
- AI in cancer detection
- Advanced Steganography and Watermarking Techniques
- Image Retrieval and Classification Techniques
- Traffic control and management
- Machine Learning in Healthcare
- Text and Document Classification Technologies
- Spam and Phishing Detection
- Autonomous Vehicle Technology and Safety
- Social Acceptance of Renewable Energy
- Artificial Intelligence in Healthcare
- Network Security and Intrusion Detection
- Blockchain Technology Applications and Security
Université Ibn Zohr
2024
Chouaib Doukkali University
2019-2024
Blockchain (BC) technology has recently gained significant popularity due to its ability provide a secure and decentralized platform for data storage transactions. There are tens of thousands BC-based cryptocurrencies apps. However, the proof work consensus mechanism used by most BC networks requires energy consumption, leading concerns about environmental impact. According Cambridge Bitcoin Electricity Consumption Index, estimated annual electricity consumption mining in 2022 was...
Natural Language Processing (NLP) has built up so much importance in the past few years. With machine learning, NLP can detect a lot of unseen information from huge volume textual data, which be helpful for sentiment analysis and text classification. For those tasks, features extracted, operation bases on extracting an important subset data. However, identifying convenient is very improving tasks. Arabic process getting related difficult due to many reasons, example, this language most words...
Abstract Word embedding models become an increasingly important method that embeds words into a high dimensional space. These have been widely utilized to extract semantic and syntactic features for sentiment analysis. However, using word cannot be sufficient analysis tasks because they do not contain features. Therefore, adequately meet the comprehensive needs of applications rely on recognizing polarity sentence. In this paper, we propose model (Word2Sent model) tackle weaknesses existing...
Natural Language Processing problems generally require the use of pre-trained distributed word representations to be solved with deep learning models. However, usually rely on contextual information which prevents them from all important characteristics. The task sentiment analysis suffers such a problem because is ignored during process embeddings. performance can affected since two words similar vectors may have opposite orientations. present paper introduces novel model called Continuous...
The security of ad hoc networks continues to pose a major challenge in today's digital age. Threatened by unscrupulous users, especially decentralized and open architectures, ad-hoc vehicular make protection against malicious attacks difficult task. Vehicular networks, specific subset inherit vulnerabilities from their parent network. One the best-documented is black hole, which user attempts manipulate routing mechanism gain unauthorized access route, then intercepts discards data packets....
<title>Abstract</title> The world health organization (WHO) has officially declared the COVID-19 as a global pandemic in March 2020. Consequently, nations worldwide took some preventive measures, including lockdowns, quarantines, and social distancing to slow down spread of coronavirus. This unprecedented event profoundly disrupted normal way life. had devastating impacts on various aspects society such healthcare systems, life, economy, education. People from around began expressing...