Mohamed Chiny

Mohamed Chiny
Ibn Tofaïl University · Laboratory of Computer Sciences

Doctor of Engineering

About

13
Publications
9,477
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
119
Citations
Introduction
Improve the methods that allow companies to evaluate their e-reputation through social networks and review platforms based on artificial intelligence, namely machine learning, deep learning and NLP.

Publications

Publications (13)
Article
Full-text available
Word embedding has become the most popular method of lexical description in a given context in the natural language processing domain, especially through the word to vector (Word2Vec) and global vectors (GloVe) implementations. Since GloVe is a pre-trained model that provides access to word mapping vectors on many dimensionalities, a large number o...
Article
Full-text available
Sentiment analysis has become more and more requested by companies to improve their services. However, the main contribution of this paper is to present the results of the study which consists in proposing a combined model of sentiment analysis that is able to find the binary polarity of the analyzed text.The proposed model is based on a Bidirectio...
Conference Paper
Full-text available
Netflix is the most popular on-demand broadcast platform available today. Its service is available in 190 countries and includes movies and TV shows. In our study, we conducted an exploratory analysis of data obtained from Flixable, which is a search engine that lists the content available on Netflix. A dataset of 7,787 unique records was analyzed...
Article
Full-text available
With the emergence of social networks and their adoption by a large number of users, the importance of influencers continues to grow and companies are in a frantic race to recruit those most likely to promote their reputation and brand image. However, in the existing literature, there is little work that conducts quantitative studies on this subjec...
Conference Paper
Full-text available
Due to the social and economic fallout from the COVID-19 pandemic, we sought to gauge the attitudes of social network users, in this case, Twitter, towards the topic using a sentiment analysis approach. We collected 178,683 tweets using the Twitter API based on queries for the high-frequency hashtag #covid19. After the preprocessing step, we classi...
Article
Full-text available
Most sentiment analysis models that use supervised learning algorithms consume a lot of labeled data in the training phase in order to give satisfactory results. This is usually expensive and leads to high labor costs in real-world applications. This work consists in proposing a hybrid sentiment analysis model based on a Long Short-Term Memory netw...
Conference Paper
Full-text available
Most companies make customer satisfaction a top priority. Indeed, satisfaction is considered as one of the pillars of customer loyalty in order to bring them to use a product or a service again and the tourism sector is not an exception. In fact, all the companies working in this sector strive to provide the best possible service to their customers...
Article
Full-text available
Understanding the determinants of satisfaction in P2P hosting is crucial, especially with the emergence of platforms such as Airbnb, which has become the largest platform for short-term rental accommodation. Although many studies have been carried out in this direction, there are still gaps to be filled, particularly with regard to the apprehension...
Article
Full-text available
Due to the social and economic fallout from the COVID-19 pandemic, we sought to gauge the attitudes of social network users, in this case, Twitter, towards the topic using a sentiment analysis approach. We collected 178,683 tweets using the Twitter API based on queries for the high-frequency hashtag #covid19. After the preprocessing step, we classi...
Conference Paper
In this paper, we first discussed the rationale behind the attacks on biometric authentication systems. We also discussed the eight conceptual points of vulnerability that an attacker can use to bypass a biometric recognition system. Among all the attacks, the spoofing attacks (providing false biometric features for the sensor) gained much attentio...
Conference Paper
Depuis quelques années, le Maroc connaît une croissance considérable d'attaques relevant de la cybercriminalité. Ces attaques ont comme cibles les réseaux et systèmes appartenant à des individus, entreprises, organisations et administrations. Cette croissance évolue en parallèle avec l'informatisation accrue que connaît le pays depuis plus d'une dé...

Network

Cited By