You are on page 1of 53

Information Systems and Technologies

to Support Learning Proceedings of


EMENA ISTL 2018 Álvaro Rocha
Visit to download the full and correct content document:
https://textbookfull.com/product/information-systems-and-technologies-to-support-lear
ning-proceedings-of-emena-istl-2018-alvaro-rocha/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Information Technology and Systems Proceedings of ICITS


2019 Álvaro Rocha

https://textbookfull.com/product/information-technology-and-
systems-proceedings-of-icits-2019-alvaro-rocha/

Proceedings of the International Conference on


Information Technology & Systems (ICITS 2018) 1st
Edition Álvaro Rocha

https://textbookfull.com/product/proceedings-of-the-
international-conference-on-information-technology-systems-
icits-2018-1st-edition-alvaro-rocha/

New Advances in Information Systems and Technologies


1st Edition Álvaro Rocha

https://textbookfull.com/product/new-advances-in-information-
systems-and-technologies-1st-edition-alvaro-rocha/

New Knowledge in Information Systems and Technologies


Volume 2 Álvaro Rocha

https://textbookfull.com/product/new-knowledge-in-information-
systems-and-technologies-volume-2-alvaro-rocha/
New Knowledge in Information Systems and Technologies
Volume 3 Álvaro Rocha

https://textbookfull.com/product/new-knowledge-in-information-
systems-and-technologies-volume-3-alvaro-rocha/

Trends and Innovations in Information Systems and


Technologies Volume 2 Álvaro Rocha

https://textbookfull.com/product/trends-and-innovations-in-
information-systems-and-technologies-volume-2-alvaro-rocha/

Marketing and Smart Technologies Proceedings of


ICMarkTech 2019 Álvaro Rocha

https://textbookfull.com/product/marketing-and-smart-
technologies-proceedings-of-icmarktech-2019-alvaro-rocha/

Emerging Technologies in Data Mining and Information


Security Proceedings of IEMIS 2018 Volume 2 Ajith
Abraham

https://textbookfull.com/product/emerging-technologies-in-data-
mining-and-information-security-proceedings-of-
iemis-2018-volume-2-ajith-abraham/

Emerging Technologies in Data Mining and Information


Security Proceedings of IEMIS 2018 Volume 1 Ajith
Abraham

https://textbookfull.com/product/emerging-technologies-in-data-
mining-and-information-security-proceedings-of-
iemis-2018-volume-1-ajith-abraham/
Smart Innovation, Systems and Technologies 111

Álvaro Rocha
Mohammed Serrhini Editors

Information
Systems and
Technologies to
Support Learning
Proceedings of EMENA-ISTL 2018

123
Smart Innovation, Systems and Technologies

Volume 111

Series editors
Robert James Howlett, Bournemouth University and KES International,
Shoreham-by-sea, UK
e-mail: rjhowlett@kesinternational.org

Lakhmi C. Jain, University of Technology Sydney, Broadway, Australia;


University of Canberra, Canberra, Australia; KES International, UK
e-mail: jainlakhmi@gmail.com; jainlc2002@yahoo.co.uk
The Smart Innovation, Systems and Technologies book series encompasses the
topics of knowledge, intelligence, innovation and sustainability. The aim of the
series is to make available a platform for the publication of books on all aspects of
single and multi-disciplinary research on these themes in order to make the latest
results available in a readily-accessible form. Volumes on interdisciplinary research
combining two or more of these areas is particularly sought.
The series covers systems and paradigms that employ knowledge and intelligence
in a broad sense. Its scope is systems having embedded knowledge and intelligence,
which may be applied to the solution of world problems in industry, the environment
and the community. It also focusses on the knowledge-transfer methodologies and
innovation strategies employed to make this happen effectively. The combination of
intelligent systems tools and a broad range of applications introduces a need for a
synergy of disciplines from science, technology, business and the humanities. The
series will include conference proceedings, edited collections, monographs, hand-
books, reference books, and other relevant types of book in areas of science and
technology where smart systems and technologies can offer innovative solutions.
High quality content is an essential feature for all book proposals accepted for the
series. It is expected that editors of all accepted volumes will ensure that
contributions are subjected to an appropriate level of reviewing process and adhere
to KES quality principles.

More information about this series at http://www.springer.com/series/8767


Álvaro Rocha Mohammed Serrhini

Editors

Information Systems
and Technologies
to Support Learning
Proceedings of EMENA-ISTL 2018

123
Editors
Álvaro Rocha Mohammed Serrhini
Departamento de Engenharia Informática, Departement informatique, Faculté des
Faculdade de Ciências e Tecnologia Sciences
Universidade de Coimbra Université Mohammed Ier
Coimbra, Portugal Oujda, Morocco

ISSN 2190-3018 ISSN 2190-3026 (electronic)


Smart Innovation, Systems and Technologies
ISBN 978-3-030-03576-1 ISBN 978-3-030-03577-8 (eBook)
https://doi.org/10.1007/978-3-030-03577-8

Library of Congress Control Number: 2018960635

© Springer Nature Switzerland AG 2019


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, express or implied, with respect to the material contained herein or
for any errors or omissions that may have been made. The publisher remains neutral with regard to
jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

This book contains a selection of papers accepted for presentation and discussion at
the second edition of international conference Europe, Middle East, and North
Africa Conference on Information Systems and Technologies to Support Learning
2018 (EMENA-ISTL’18). This Conference had the support of the University
Mohamed First Oujda, Morocco, AISTI (Iberian Association for Information
Systems and Technologies/Associação Ibérica de Sistemas e Tecnologias de
Informação), and Private University of Fez, Morocco. It took place in Fez,
Morocco, from October 25 to 27, 2018.
EMENA-ISTLL’18 conference has two aims: First, it provides the ideal
opportunity to bring together professors, researchers, and high education students of
different disciplines, discuss new issues, and discover the most recent develop-
ments, researches, and trends on information and communication technologies,
emerging technologies, and security to support in learning. Second goal is focusing
on to boost future collaboration and cooperation between researchers and aca-
demicians from Europe Middle East and North Africa universities (EMENA).
The Program Committee of EMENA-ISTL’18 was composed of a multidisci-
plinary group of experts and those who are intimately concerned with information
and communication technologies, artificial intelligence, and security. They have
had the responsibility for evaluating, in a “blind review” process, the papers
received for each of the main themes proposed for the Conference: (A) Information
systems Technologies to support Education; (B) Education in Science, Technology,
Engineering and Mathematics; (C) Emerging Technologies in Education Learning
innovation in digital age; (D) Software Systems, Architectures, Applications and
Tools; (E) Multimedia Systems and Applications; (F) Computer Communications
and Networks; (G) IOT, Smart Cities and People, Wireless, Sensor and Ad-Hoc
Networks; (H) Organizational Models and Information Systems and Technologies;
(I) Human-Computer Interaction; (J) Computers & Security, Ethics and
Data-forensic; (K) Health Informatics, and Medical Informatics Security;
(L) Information and Knowledge Management; (M) Big Data Analytics and
Applications, Intelligent Data Systems, and Machine Learning; (N) Artificial
Intelligence, High Performance Computing; (O) Mobile, Embedded and Ubiquitous

v
vi Preface

Systems; (P) Language and Image Processing, Computer Graphics and vision;
(Q) Interdisciplinary Field of Fuzzy Logic and Data Mining.
EMENA-ISTL’18 received 150 contributions from 44 countries around the
world. The papers accepted for presentation and discussion at the conference are
published by Springer (this book) and by EMENA-ISTL’18 (another e-book) and
will be submitted for indexing by ISI, EI-Compendex, SCOPUS, DBLP, and/or
Scholar Google, among others. Extended versions of selected best papers will be
published in relevant journals, including SCI/SSCI and Scopus indexed journals.
We acknowledge all those who contributed to the staging of EMENA-ISTL’18
(authors, committees, and sponsors); their involvement and support are very much
appreciated.

October 2018 Álvaro Rocha


Mohammed Serrhini
Organization

Conference
General Chair

Mohammed Serrhini University Mohammed First Oujda, Morocco

Conference Co-chairs

Álvaro Rocha University of Coimbra, Portugal


Latif Ladid Université du Luxembourg

Local Chairs

Mohammed Ouazzani Jamil Private University of Fez, Morocco


(Dean)
El-Mostafa Daoudi University Mohamed First Oujda, Morocco
Ahmed Laaroussi Private University of Fez, Morocco
(Head of ESMAB)
Abdelaziz Ait Moussa University Mohamed First Oujda, Morocco
Abdelillah Monir University Mohamed First Oujda, Morocco
Tarik Hajji Private University of Fez, Morocco
Ahmed Tahiri University Mohamed First Oujda, Morocco
El Miloud Jaara University Mohamed First Oujda, Morocco
Zakaria Itahriouan Private University of Fez, Morocco
Noura Ouerdi University Mohamed First Oujda, Morocco

Advisory Committee

Mohammed aziz lahlou President of the Private University of Fez

vii
viii Organization

Saâd Daoudi Director of the Private University of Fez


Antonio J. Jara University of Applied Sciences Western
Switzerland
Mohamed Salim Bouhlel University of Sfax Tunisia

Program Committee

Olaf Maennel Tallinn University of Technology, Estonia


Gustavo Alves School of Engineering, Polytechnic of Porto,
Portugal
Mohsine Eleuldj Mohammadia School of Engineering, Morocco
Houda Hakim Guermaz Manouba University, Tunisia
Ounsa Roudies Mohammadia School of Engineering, Morocco
Álvaro Rocha University of Coimbra, Portugal
Ernest Cachia (Dean) Faculty of ICT University of Malta, Malta
Roza Dumbraveanu Roza Dumbraveanu, University,Chisinau,
Moldova
Raúl Cordeiro Correia Instituto Politécnico de Setúbal, Portugal
Ronan Champagnat Universite de La Rochelle, France
Rita Francese University of Salerno, Italy
Naceur Ben Hadj Braiek Polytechnic School of Tunis, Tunisia
Fernando Moreira Oporto Global University, Portugal
Maria José ISCAP/Polytechnic Institute of Porto, Portugal
Angélico Gonçalves
Maria José Sousa Universidade Europeia de Lisboa, Portugal
James Uhomoibhi University of Ulster, UK
Jarno Limnéll Aalto University, Finland
Esteban Vázquez Cano Universidad Nacional de Educación a Distancia,
Spain
Juarez Bento Silva Universidade Federal de Santa Catarina, Brasil
Anouar Belahcen Aalto University, Finland
Peter Mikulecky University of Hradec Kralove, Czech
Katherine Maillet Institut Mines-Télécom Paris, France
Rafael Valencia-Garcia Universidad de Murcia, Spain
Luis Anido Rifon Universidade de Vigo, Spain
Mraoui Hamid Faculty of Sciences Oujda, Morocco
Carla Silva University Lusófona de Humanidades e
Tecnologias Lisbone, Portugal
Rolou Lyn Rodriguez Maata Faculty of Computing Sciences - Gulf College
Oman, Oman
Ali Shaqour An-Najah National University, Palestine
Ahmed Tahiri University Mohamed First Oujda, Morocco
Abdullah Al-Hamdani Sultan Qaboos University, Muscat, Oman
Muzafer Saracevic International University of Novi Pazar, Serbia
Organization ix

Manuel Caeiro Rodríguez Universidade de Vigo, Spain


Rafik Zitouni Ecole d’ingénieur généraliste et high-tech à Paris,
France
Utku ZKose Usak University, Turkey
Noura Ouerdi University Mohamed First Oujda, Morocco
Tajullah Sky-Lark Sustainable Knowledge Global Solutions, USA
Otmane Ait Mohamed Concordia University, Canada
Mohammad Hamdan Yarmouk University, Jordan
Wail Mardini Jordan University of Science and Technology,
Jordan
Francesca Pozzi Istituto Tecnologie Didattiche - CNR, Italy
Filipe Cardoso Polytechnic Institute of Setubal, Portugal
Abdel-Badeeh Salem Ain Shams University, Egypt
Mohammad Al-Smadi Jordan University of Science and Technology,
Jordan
Mohamad Badra Zayed University, United Arab Emirates
Amal Zouaq Royal Military College of Canada, Canada
Pedro Guerreiro Universidade do Algarve, Portugal
El Bekkay Mermri University Mohamed First Oujda, Morocco
Martin Llamas-Nistal University of Vigo, Spain
Camille Salinesi CRI, Université de Paris 1 Panthéon-Sorbonne,
France
Jorge Pires Polytechnic Institute of Castelo Branco, Portugal
Ali Jaoua Qatar University, Qatar
Osama Shata Qatar University, Qatar
Abdelkarim Erradi Qatar University, Qatar
Mohammed Gabli University Mohammed Premier, Oujda, Morocco
Osama Halabi Qatar University, Qatar
Rachid Nourine Oran University, Algieria
Abdelhafid Bessaid University of Tlemcen, Algieria
Lehsaini Mohamed University of Tlemcen, Algieria
Carla Silva University Lusófona de Lisbone, Portugal
John Sahalos University of Nicosia, Cyprus
Lebbah Yahia University of Oran 1, Algieria
Kashif Saleem King Saud University, Saudi Arabia
Amjad Gawanmeh Khalifa University, United Arab Emirates
Abdulmalik Al-Salman King Saud University, Saudi Arabia
Olivier Markowitch Université Libre de Bruxelles, Belgium
Ladan Mohammad Rafik Hariri University, Lebanon
Tolga Ensari Istanbul University, Turkey
David Baneres Universitat Oberta de Catalunya, Spain
Yahya Tashtoush Jordan University of Science and Technology,
Jordan
Alberto Cardoso University of Coimbra, Portugal
StephanieTeufel University of Fribourg, Switzerland
x Organization

Associate Dean Majida Tikrit University, Iraq


Ali Abed Alasady
Pierre Manneback Faculté Polytechnique de Mons, Belgium
Mohammed Benjelloun Faculté Polytechnique de Mons, Belgium
Contents

Categorization of Types of Internautes Based on Their Navigation


Preferences Within Educational Environments . . . . . . . . . . . . . . . . . . . 1
Hector F. Gomez A, Susana A. Arias T, Carlos E. Martinez,
Miguel A. Martínez V, Natalia Bustamante Sanchez,
and Estefania Sanchez-Cevallos
Metaheuristic Approaches for Solving University
Timetabling Problems: A Review and Case Studies
from Middle Eastern Universities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Manar Hosny
Ontology-Based Modeling for a Personalized MOOC
Recommender System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Sara Assami, Najima Daoudi, and Rachida Ajhoun
A New Model of Learner Experience in Online
Learning Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Yassine Safsouf, Khalifa Mansouri, and Franck Poirier
Hybrid Recommendation Approach in Online
Learning Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Mohammed Baidada, Khalifa Mansouri, and Franck Poirier
Performance Scoring at University: Algorithm
of Student Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Adnane Rahhou and Mohammed Talbi
Introducing Mobile Technology for Enhancing Teaching
and Learning at the College of Business Education in Tanzania:
Teachers and Students’ Perspectives . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Godfrey Mwandosya, Calkin Suero Montero, and Esther Rosinner Mbise

xi
xii Contents

Information System of Performance Management and Reporting


at University: Example of Student Scorecard . . . . . . . . . . . . . . . . . . . . . 67
Adnane Rahhou and Mohammed Talbi
Mobile Learning Oriented Towards Learner Stimulation
and Engagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Samir Achahod, Khalifa Mansouri, and Franck Poirier
A Learning Style Identification Approach in Adaptive
E-Learning System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Hanaa El Fazazi, Abderrazzak Samadi, Mohamed Qbadou,
Khalifa Mansouri, and Mouhcine Elgarej
Towards Smart Innovation for Information Systems
and Technology Students: Modelling Motivation, Metacognition
and Affective Aspects of Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
James Ngugi and Leila Goosen
Key Elements of Educational Augmented and Virtual
Reality Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Houda Elkoubaiti and Radouane Mrabet
Teaching and Learning How to Program Without Writing Code . . . . . 106
Michel Adam, Moncef Daoud, and Patrice Frison
Towards a Dynamics of Techno-Pedagogical Innovation Within the
University: Case Study Hassan II University of Casablanca . . . . . . . . . 118
Nadia Chafiq, Mohamed Housni, and Mohamed Moussetad
Towards the Design of an Innovative and Social Hybrid Learning
Based on the SMAC Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Nadia Chafiq and Mohamed Housni
Information Systems and Technologies Opening New Worlds
for Learning to Children with Autism Spectrum Disorders . . . . . . . . . . 134
Leila Goosen
Technologies to Inspire Education in Science, Engineering
and Technology Through Community Engagement
in South Africa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Patricia Gouws and Leila Goosen
Promoting Pro-environmental Practices About Trees in Children
Using Infrared Thermography Technology . . . . . . . . . . . . . . . . . . . . . . 154
Maria Eduarda Ferreira, João Crisóstomo, and Rui Pitarma
Emerging Technologies and Learning Innovation
in the New Learning Ecosystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Helene Fournier, Heather Molyneaux, and Rita Kop
Contents xiii

Exploring the Acceptance of Mobile Technology Application


for Enhancing Teaching and Learning at the College of Business
Education in Tanzania . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Godfrey Mwandosya, Calkin Suero Montero, and Esther-Rosinner Mbise
Analysis of Atmospheric Monitoring Data Through
Micro-meteorological Stations, as a Crowdsourcing
Tool for Technology Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Maritza Aguirre-Munizaga, Katty Lagos-Ortiz, Vanessa Vergara-Lozano,
Karina Real-Avilés, Mitchell Vásquez-Bermudez, Andrea Sinche-Guzmán,
and José Hernández-Rosas
Infra SEN: Intelligent Information System for Real Time Monitoring
of Distributed Infrastructures and Equipments in Rural Areas . . . . . . . 188
Bala Moussa Biaye, Khalifa Gaye, Cherif Ahmed Tidiane Aidara,
Amadou Coulibaly, and Serigne Diagne
Product-BPAS, A Software Tool for Designing Innovative
and Modular Products for Agriculture and Crafts . . . . . . . . . . . . . . . . . 194
Chérif Ahmed Tidiane Aidara, Bala Moussa Biaye, Serigne Diagne,
Khalifa Gaye, and Amadou Coulibaly
An Efficient Next Hop Selection Scheme for Enhancing Routing
Performance in VANETs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Driss Abada, Abdellah Massaq, and Abdellah Boulouz
Comparative Performance Study of QoS Downlink Scheduling
Algorithms in LTE System for M2M Communications . . . . . . . . . . . . . 216
Mariyam Ouaissa, Abdallah Rhattoy, and Mohamed Lahmer
Uberisation Business Model Based on Blockchain for Implementation
Decentralized Application for Lease/Rent Lodging . . . . . . . . . . . . . . . . . 225
Saleh Hadi, Alexandrov Dmitry, and Dzhonov Azamat
New Failure Detection Approach for Real Time for Hydraulic
Networks Using the Non-acoustic Method . . . . . . . . . . . . . . . . . . . . . . . 233
Bala Moussa Biaye, Cherif Ahmed Tidiane Aidara, Amadou Coulibaly,
Khalifa Gaye, Serigne Diagne, and Edouard Ngor Sarr
Fault-Tolerant Communication for IoT Networks . . . . . . . . . . . . . . . . . 245
Abdelghani Boudaa and Hocine Belouadah
Emergency Navigation Approach Using Wireless Sensor
Networks and Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
Najla Alnabhan, Nadia Al-Aboody, and Hamed Al-Rawishidy
Security Scheme for IoT Environments in Smart Grids . . . . . . . . . . . . . 269
Sebastián Cruz-Duarte, Marco Sastoque-Mahecha, Elvis Gaona-García,
and Paulo Gaona-García
xiv Contents

Dynamic Airspace Sectorization Problem Using Hybrid


Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
Mohammed Gabli, El Miloud Jaara, and El Bekkaye Mermri
A Semantic Framework to Improve
Model-to-Model Transformations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
Mohamed Elkamel Hamdane, Karima Berramla, Allaoua Chaoui,
and Abou El Hasan Benyamina
An Embedded Prototype System for People with Disabilities
Using Google’s Speech . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
Maritza Aguirre-Munizaga, Vanessa Vergara-Lozano, Carlota Delgado,
Joel Ramirez-Yela, and Néstor Vera Lucio
Measuring Semantic Coverage Rates Provided by Cached Regions
in Mediation Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
Ouafa Ajarroud, Ahmed Zellou, and Ali Idri
Using Probabilistic Direct Multi-class Support Vector Machines
to Improve Mental States Based-Brain Computer Interface . . . . . . . . . . 321
Mounia Hendel and Fatiha Hendel
Tracking Attacks Data Through Log Files Using MapReduce . . . . . . . . 331
Yassine Azizi, Mostafa Azizi, and Mohamed Elboukhari
Toward a New Integrated Approach of Information Security
Based on Governance, Risk and Compliance . . . . . . . . . . . . . . . . . . . . . 337
Mounia Zaydi and Bouchaib Nassereddine
A Novel Steganography Algorithm Based on Alpha Blending
Technique Using Discrete Wavelet Transform (ABT-DWT) . . . . . . . . . . 342
Ayidh Alharbi and Tahar M. Kechadi
A Comparison of American and Moroccan Governmental
Security Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
Rabii Anass, Assoul Saliha, Ouazzani Touhami Khadija,
and Roudiès Ounsa
Polyvalent Fingerprint Biometric System for Authentication . . . . . . . . . 361
Mohamed El Beqqal, Mostafa Azizi, and Jean Louis Lanet
Bitcoin Difficulty, A Security Feature . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Abdenaby Lamiri, Kamal Gueraoui, and Gamal Zeggwagh
Result Oriented Time Correlation Between Security and Risk
Assessments, and Individual Environment Compliance Framework . . . . 373
Dimo Dimov and Yuliyan Tsonev
Contents xv

Classification of Ransomware Based on Artificial Neural Networks . . . . 384


Noura Ouerdi, Tarik Hajji, Aurelien Palisse, Jean-Louis Lanet,
and Abdelmalek Azizi
On the Efficiency of Scalar Multiplication on the Elliptic Curves . . . . . . 393
Siham Ezzouak and Abdelmalek Azizi
Patients Learning Process Supporting Change in Identities
and Life Styles - A Heart Failure Self-care Scenario . . . . . . . . . . . . . . . 400
Linda Askenäs and Jan Aidemark
Privacy Preserving Requirements for Sharing Health
Data in Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412
Insaf Boumezbeur and Karim Zarour
Using IoT and Social Networks for Enhanced Healthy
Practices in Buildings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
Gonçalo Marques and Rui Pitarma
IOT System for Self-diagnosis of Heart Diseases Using Mathematical
Evaluation of Cardiac Dynamics Based on Probability Theory . . . . . . . 433
Juan Piedrahita-Gonzalez, Juan Cubillos-Calvachi,
Carlos Gutiérrez-Ardila, Carlos Montenegro-Marin,
and Paulo Gaona-García
Modeling the OWASP Most Critical WEB Attacks . . . . . . . . . . . . . . . . 442
Yassine Ayachi, El Hassane Ettifouri, Jamal Berrich,
and Bouchentouf Toumi
Measurement of Co-deployment of IT Quality Standard:
Application to ISO9001, CMMI and ITIL . . . . . . . . . . . . . . . . . . . . . . . 451
Hind Dahar and Ounsa Roudies
Rating Microfinance Products Consumers Using Artificial
Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460
Tarik Hajji and Ouazzani Mohammed Jamil
Applying Agile Procedure Model to Improve ERP Systems
Implementation Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
Majda El Mariouli and Jalal Laassiri
Clustering Strategy for Scientific Workflow Applications
in IaaS Cloud Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
Sid Ahmed Makhlouf and Belabbas Yagoubi
Open Government Data: Problem Assessment
of Machine Processability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
Hanae Elmekki, Dalila Chiadmi, and Hind Lamharhar
xvi Contents

Toward an Evaluation Model for Open Government Data Portals . . . . 502


Kawtar Younsi Dahbi, Hind Lamharhar, and Dalila Chiadmi
NoSQL Scalability Performance Evaluation over Cassandra . . . . . . . . . 512
Maryam Abbasi, Filipe Sá, Daniel Albuquerque, Cristina Wanzeller,
Filipe Caldeira, Paulo Tomé, Pedro Furtado, and Pedro Martins
A Novel Filter Approach for Band Selection and Classification
of Hyperspectral Remotely Sensed Images Using Normalized
Mutual Information and Support Vector Machines . . . . . . . . . . . . . . . . 521
Hasna Nhaila, Asma Elmaizi, Elkebir Sarhrouni, and Ahmed Hammouch
Differences Between Clusterings as Distances
in the Covering Graph of Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
Giovanni Rossi
A New Supervised Learning Based Ontology Matching
Approach Using Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542
Meriem Ali Khoudja, Messaouda Fareh, and Hafida Bouarfa
VACIT: Tool for Consumption, Analysis and Machine Learning
for LOD Resources on CKAN Instances . . . . . . . . . . . . . . . . . . . . . . . . 552
Álvaro Varón-Capera, Paulo Alonso Gaona-García,
Jhon Francined Herrera-Cubides, and Carlos Montenegro-Marín
Selecting Best Machine Learning Techniques for Breast Cancer
Prediction and Diagnosis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565
Youness Khourdifi and Mohamed Bahaj
Identification of Human Behavior Patterns Based
on the GSP Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
Hector F. Gomez A, Edwin Fabricio Lozada T., Luis Antonio Llerena,
Jorge Alonso Benitez Hurtado, Richard Eduardo Ruiz Ordoñez,
Freddy Giancarlo Salazar Carrillo, Joselito Naranjo-Santamaria,
and Teodoro Alvarado Barros
Matchstick Games: On Removing a Matchstick Without
Disturbing the Others . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580
Godfried T. Toussaint
Multi-cloud Resources Optimization for Users
Applications Execution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588
Anas Mokhtari, Mostafa Azizi, and Mohammed Gabli
An Algorithm of Conversion Between Relational Data
and Graph Schema . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
Zakariyaa Ait El Mouden, Abdeslam Jakimi, and Moha Hajar
Contents xvii

Self-calibration of the Fundus Camera Using the Genetic Algorithm . . . 603


Mostafa Taibi, Rabha Allaoui, and Raja Touahni
Utilizing Faults and Time to Finish Estimating the Number
of Software Test Workers Using Artificial Neural Networks
and Genetic Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613
Alaa Sheta, Sultan Aljahdali, and Malik Braik
A Comparative Analysis of Control Strategies
for Stabilizing a Quadrotor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 625
Moussa Labbadi, Mohamed Cherkaoui, Yassine El Houm,
and M’hammed Guisser
A New Approach Based on Bat Algorithm for Inducing
Optimal Decision Trees Classifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631
Ikram Bida and Saliha Aouat
A New Parallel Method for Medical Image Segmentation Using
Watershed Algorithm and an Improved Gradient Vector Flow . . . . . . . 641
Hayat Meddeber and Belabbas Yagoubi
Object Detecting on Light Field Imaging:
An Edge Detection Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 652
Yessaadi Sabrina and Mohamed Tayeb Laskri
Arab Handwriting Character Recognition by Curvature . . . . . . . . . . . . 662
Aissa Kerkour Elmiad
Language Identification for User Generated Content
in Social Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 672
Randa Zarnoufi, Hamid Jaafar, and Mounia Abik
Vision-Based Distance Estimation Method Using Single Camera:
Application to the Assistance of Visually Impaired People . . . . . . . . . . . 679
Wafa Saad Al-shehri, Salma Kammoun Jarraya, and Manar Salama Ali
1D Signals Descriptors for 3D Shape Recognition . . . . . . . . . . . . . . . . . 687
Kaoutar Baibai, Mohamed Emharraf, Wafae Mrabti,
Youssef Ech-choudani, Khalid Hachami, and Benaissa Bellach
Dynamic Textures Segmentation and Tracking Using Optical
Flow and Active Contours . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694
Ikram Bida and Saliha Aouat
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705
Categorization of Types of Internautes Based
on Their Navigation Preferences Within
Educational Environments

Hector F. Gomez A1(&), Susana A. Arias T1, Carlos E. Martinez2,


Miguel A. Martínez V2, Natalia Bustamante Sanchez3,
and Estefania Sanchez-Cevallos3
1
Facultad de Ciencias Humanas y de la Educacion,
Universidad Técnica de Ambato, Ambato, Ecuador
hf.gomez@uta.edu.ec
2
Universidad Regional Autonoma de los Andes-UNIANDES,
Km. 5 1/2 via a Baños, Ambato, Ecuador
{ua.carlosmartinez,ua.miguelmartinez}@uniandes.edu.ec
3
Sec. Deptal. Hoteleria y Turismo,
Universidad Tecnica Particular de Loja, Loja, Ecuador
{ncbustamante,resanchez}@utpl.edu.ec

Abstract. In this article, the state of the art of data mining applied to obtaining
frequent navigation behaviors in an educational environment is described. The
procedure used by the data mining algorithms chosen to classify Internet users
based on their browsing preferences which is explained. An explanation of the
records that are used for the training of the algorithms is made, and finally a
comparison of the efficiency of the categorization is made.

Keywords: Sequential patterns  Behavior  Data mining  Internet models


States  Frequent sequences  Itemsets  Patterns  Human behavior

1 Introduction

Some of the main applications of data mining techniques in educational environments


are the personalization systems [1, 2] the recommender systems [3], the modification
systems [4], the irregularity detection systems [5], among others, since they offer
capacities for the discovery of common behaviors [6] (navigation patterns) of regular
and irregular navigation, the adaptive construction of teaching plans, the discovery of
relationships between activities, the incremental diagnosis of the performance of the
students, etc. According to Romero [7] et al. Cristóbal, data mining applies to edu-
cation from two perspectives:
The first, oriented towards the authors, whose aims are to obtain data that serve to
feed the teaching, establish methods to know how students learn using the Internet,
determine the student browsing patterns, determine techniques for restructuring the
contents of the website, classify students into groups, etc.

© Springer Nature Switzerland AG 2019


Á. Rocha and M. Serrhini (Eds.): EMENA-ISTL 2018, SIST 111, pp. 1–9, 2019.
https://doi.org/10.1007/978-3-030-03577-8_1
2 H. F. Gomez A et al.

The second, oriented towards students, whose purpose is to make recommendations


to Internet users during their interaction with virtual learning systems.
In this research, the result of applying data mining algorithms in the categorization
of Internet users is evaluated, depending on their browsing preferences. These results
can be used in the personalized design of a learning environment, giving the user tools
or information related to their individual interests [8–10].

2 Description of the Problem

Internet users access web pages sequentially, with the possibility of re-entering those
that are of interest.
When observing a set of Internet users, university students, grouped by affinity,
who access freely to web pages, it is possible to verify that at a certain moment they
will access the same pages, depending on the area of interest [11].
The first step of this research is to discover the surfing patterns of Internet users,
grouped by affinity.
The next step is to compare the browsing preferences of new Internet users with the
browsing patterns obtained in the previous step. If the result of the comparison is true,
then the new surfer is grouped in the corresponding category. Otherwise, a new nav-
igation behavior is detected, whose treatment is explained through the GSP_M algo-
rithm, which is detailed below.
In the following paragraphs, the definitions for state, itemset and sequences are
presented. Later, the algorithms that were applied will be explained, in order to obtain
common navigation patterns.
Finally, complete content and organizational editing before formatting. Please take
note of the following items when proofreading spelling and grammar [12, 13]:

2.1 GSP_M Algorithm


The GSP_M algorithm (GSP_Memory) [14] is based on the GSP algorithm, differing
from this in that it includes a software structure that allows: (a) taking into account
repeated itemsets, (b) memorizing sequences that could not become a pattern, for based
on them update the database of patterns and, (c) obtain the weight of the states, since
according to the records of access to educational environments by Internet users, the
number of times a user accesses the same page becomes a repetitive state, which helps
distinguish between one type of Internet user and another. The components of the
software structure included in GSP_M are described below:
Modification of the input sequences to allow repeated itemsets: Given BD as the
sequence database, and, itemsets I1 = {e1, e2, e3}, I2 = {e4, e5, e6} where In Є I, it is
possible to construct a sequence s where s = <I1, I1, I2>.
In this context, s = <I1, I2> for GSP, since repeating itemsets is not allowed [12,
13]. For GSP_M, which does allow the repetition of itemsets, s is divided into sub-
sequences s1 = <I1> and s2 = <I1, I2>.
As the first step of GSP is to select the 1-sequences, the modification of GSP_M is
valid, since the sub-sequences and their groupings would be taken into account.
Categorization of Types of Internautes Based on Their Navigation Preferences 3

For example, if a group of mathematicians are asked to access educational envi-


ronments on the Internet, they probably access pages of information relevant to
mathematics, but give more or less meaning to visit specialized pages, reports, exer-
cises, tasks, etc.
If the group of mathematicians is given one hour to access the pages of their choice
in educational environments, they will generate access sequences such as the following.

Table 1. Example of access to the Internet by a surfer by profession


M1 M2 M3
Información General Ejercicios Ejercicios
Información General Reportes Páginas especializadas
Ejercicios Reportes Páginas especializadas

Table 1 shows the accesses of the mathematical internauts. The mathematician M1


produced the sequence M1 = <General Information General Information Exercises>.
This sequence, according to the GSP_M algorithm, contains two sub-sequences
M11 = <General Information> and M12 = <General Information Exercises>. The
mathematicians M2 and M3, will also generate sub-sequences depending on the rep-
etition of their states.
Module to memorize the sequences that could not become a pattern: Based on the
records of access to educational environments by Internet users, a DB Database of
sequences was built, and, GSP was applied as proposed by Srikant [12], discarding
those sequences that could not become patterns by not exceeding the minimum support
threshold (threshold). To classify a new surfer it is necessary to determine that a new
sequence generated by a new user who is accessing the educational environment, is
included in the sequence set of the BDP pattern database obtained by GSP. The
negative discrimination of GSP to that did not exceed the threshold, becomes a
problem, since these Snuevas can be a new pattern of behavior.
To correct this situation, when applying the GSP_M algorithm, with the sequences
discarded by GSP, a new database called SNEU is constructed (sequences that do not
exceed the threshold) according to what is proposed in Algorithms 1 and 2. When
entering a New sequence is verified if it is included in BDP, if the result is
affirmative it is categorized to the surfer. If is not included in BDP, its inclusion in
SNEU is verified. If the result of this verification is affirmative, the frequency of is
increased by 1. If the new frequency assigned to exceeds the threshold, then a new
pattern has been generated (see Algorithm 2), so that is eliminated from SNEU and
included in BDP. If the result of the previous verification is negative, is included in
SNEU with frequency 1.
4 H. F. Gomez A et al.

As an example of the operation of Algorithm 1, an experiment was proposed in


which sequences whose characteristics are described in Table 2 were generated:

Table 2. Example input data for GSP


ID S
10 <a,(abc),(ac)>
20 <(ad),c>
30 <(ef),(ab)>

Executing GSP with a minimum support of 0.5, 5 sequences were registered in the
BDP database: <a>, <b>, <c>, <a, c> and <(ab)>. While in the SNEU database were
recorded as discarded sequences: <a, b, c>, <bc>, <(ad)>, <d, c>, <(ad), c>, <(ef)>,
<(ef), (ab)>.
The sequences contained in SNEU will be taken into account, to verify if a
sequence is being included in SNEU, exceeds the minimum support threshold and thus
becomes a new behavior pattern. This process is done by applying Algorithm 2.
Categorization of Types of Internautes Based on Their Navigation Preferences 5

Algorithm 2, uses the memory capacity of GSP_M, and, the inclusion character-
istics of one sequence in another to obtain the new patterns. As examples of the
application of this algorithm, two experiments were proposed. In both experiments the
sequences S1 and S2 described in the second row of Tables 3 and 4 were compared.
The results of the comparison are included in the same tables.

Table 3. Comparison of two sequences: Sequence 1 is included in sequence 2.


Sequence 1 Sequence 2
S1 <(3)(4 5)(8)> S2 <(7)(3 8)(9)(4 5 6)(8)>
a1 = Itemset(3) b1 = Itemset(7)
a2 = Itemset(4 5) b2 = Itemset(3 8)
a3 = Itemset(8) b3 = Itemset(9)
b4 = Itemset(4 5 6)
b5 = Itemset(8)
a1 está en b21 b11 = {(7)} b12 = {}
b21 = {(3)} b22 = {(8)}
a2 = (4 5) por lo que a21 = {(4)} b41 = {(4)}
a22 = {(5)} b42 = {(5)}
a21 está en b41 = {(4)} b43 = {(6)}
a22 está en b42 = {(5)}
a31 está en b51 b51 = {(8)}

As a main result of the experiment described in Table 3, the algorithm divided the
itemset b2 of the sequence 2, into two sub-sequences in such a way that it could be
identified that the itemset a1 of the sequence 1, corresponded with the itemset b21 in
the sequence 2.
6 H. F. Gomez A et al.

Table 4. Application of the sequence inclusion algorithm: The sequence 1 is not included in the
sequence 2.
Sequence 1 Sequence 2
S1 = <(3 5)> S2 = <(3)(5)>
a1 = (3 5) en donde a11 = (3) b11 = {(3)} b12 = {}
a12 = (5) b21 = {(5)} b22 = {}
a11 está en b11
a12 no está en b12

In the second experiment, although sequence 1 was divided into sub-sequences, it


was not possible to determine position-value correspondence in sequence 2, as shown
in Table 4.
Module to memorize the Weight of each State: As a first step, the weight of each
state E in BDP is determined, for which, sequence by sequence, the states are extracted
and it places the repetition number of each state in a list. As a second step, we obtain
the average P of the repetitions of the states located in the list, for which we obtain the
geometric mean of the set of repetitions of each state. The geometric mean prevents the
exaggerated repetition of a state in a sequence s from affecting the final average. Then,
to generate alerts, we compare the number of repetitions of each state in the new
sequence with the average P obtained.
As an example of the execution of this module, let s1 be the sequence containing
the states E1 = {search pages, search pages, search pages, specialized pages, reports}.
Let s2 be the sequence containing the states E2 = {search pages, search pages,
reports}. The average for the state search pages is 2.23, for the state specialized pages is
1 and for the state reports the average is 2.

3 Experimentation

A test group of 150 volunteer Internet users was formed. The Internet users were
grouped by affinity and they were allowed to surf for 10 h in educational web envi-
ronments, at a rate of 2 h a day for five days.
The interest affinity groups selected were Business Administration, Mathematics
and Information Technology [15]. Each group had access to educational web envi-
ronments, in which 1180 navigation resources were offered. Examples of these
resources are: search pages, specialized magazines, pages of solved exercises, etc. Each
resource was given a diffuse value, related to the number of times the Internet user
accessed it. In Fig. 1, you can see the resources and fuzzy values assigned.
The training data set was generated by 150 Internet users, categorized into three
groups of each 50 members (Table 5).
With the data generated by each of the groups, the GSP algorithm was trained to
obtain the behavior patterns of each of the categories of Internet users. Once the
algorithm was trained, as a test, the data generated by the 150 Internet users was
analyzed again, obtaining the results shown in Table 6. The procedure was repeated for
GSP_M.
Categorization of Types of Internautes Based on Their Navigation Preferences 7

página {poco, medio, muy}


menú {poco, medio, muy}
introduccion {poco, medio, muy}
economia {poco, medio, muy}
microeconomia {poco, medio, muy}
revisión {poco, medio, muy}
economía {poco, medio, muy}
felix {poco, medio, muy}
lobo {poco, medio, muy}
aleu {poco, medio, muy}
elección {poco, medio, muy}
diplomatura {poco, medio, muy}
estadística {poco, medio, muy}
gestión {poco, medio, muy}
administración {poco, medio, muy}
pública {poco, medio, muy}
laborales {poco, medio, muy}
plan {poco, medio, muy}
ingeniería {poco, medio, muy}
telecomunicación {poco, medio, muy}
dirección {poco, medio, muy}
técnicas {poco, medio, muy}
estadísticas {poco, medio, muy}
humanidades {poco, medio, muy}
licenciatura {poco, medio, muy}
derecho {poco, medio, muy}
discutir {poco, medio, muy}
……..

Fig. 1. Resources accessed categorization

Table 5. Conformation of affinity groups for training


Companies 50
Computing 50
Maths 50

Table 6. Results of the analysis of the behavior of Internet users with the trained algorithms.
Companies Computing Maths
GSP 36 41 37
GSP_M 43 48 49
8 H. F. Gomez A et al.

The final experimentation was carried out, including the group of new volunteers,
in each of the affinity groups, as shown in Table 7.

Table 7. New Internet users by affinity groups


Companies 16
Computing 46
Maths 17

The data generated by these new Internet users were processed by GSP and
GSP_M, obtaining the results shown in Table 8:

Table 8. Results of the application of the algorithms on the behavior of new Internet users.
Companies Computing Maths
GSP 11 27 13
GSP_M 15 44 15

Analysis of the effectiveness rates of the GSP and GSP_M algorithms.


The results of the effectiveness rates, related to the application of the GSP and
GSP_M algorithms on data from Internet users who access educational environments,
are shown in Table 9.

Table 9. Effectiveness rates of the GSP_ M and GSP algorithms on Internet user behavior.
I. Algorithm Empr Math Com
GSP 68% 58% 76%
GSP_M 93% 95% 88%

The analysis of the results obtained allows us to conclude that the effectiveness rate
of the GSP_M algorithm exceeds the effectiveness rate of the GSP algorithm. The
explanation why GSP_M is more efficient is related to the fact that it allows the
handling of repeated itemsets in its sequences and to the determination of the weight of
the states. These permissions to access are very important in the domain in which
Internet users access educational environments, as they generally repeat and combine
their states.
Categorization of Types of Internautes Based on Their Navigation Preferences 9

4 Future Research

The next step is to take into account this categorization in order to be used by a
recommender system to individualize the access pages of each user and to provide
individuality in virtual learning environments collaborative and recommender systems
that use data mining for the continuous improvement of e-learning courses are pre-
sented, in order that teachers of similar profile, share their research as a result of
applying mining locally on their own sources.

References
1. Ventura, S.: Minería de Datos en sistemas educativos, Presentación para el Departamento de
Computing y Análisis Numérico de la Universidad de Córdoba
2. Srivastava, J., Mobasher, B., Cooley, R.: Automatic personalization based on web usage
mining. Commun. Assoc. Comput. Machin. 43, 142–151 (2000)
3. Li, J., Zaiane, O.: Combining usage, content and structure data to improve web site
recommendation. In: International Conference on Electronic Commerce and Web Tech-
nologies, Spain (2004)
4. Perkowitz, M., Etzioni, O.: Adaptive web sites: automatically synthesizing web pages. In:
National Conference on Artificial Intelligence, WI (1998)
5. Barnett, V., Lewis, T.: Outliers in Statistical Data. John Wiley & Sons, Chichester (1994)
6. Zaïane, O.: Web usage mining for a better web-based learning environment. In: Conference
on Advanced Technology for Education, pp. 60–64 (2001)
7. Soto, S.V., Martínez, C.H., Morales, C.R.: Estado actual de la aplicación de la minería de
datos a los sistemas de enseñanza basada en web. In: Roberto Ruiz, T. (ed.) III Taller de
Minería de Datos y Aprendizaje (TAMIDA 2005) (2005)
8. Mobasher, B., Srivastava, J., Cooley, R.: Data preparation for mining world wide web
browsing patterns. Knowl. Inf. Syst. 1, 5–32 (1999)
9. Mobasher, B., Srivastava, J., Cooley, R.: Web mining: information and pattern discovery on
the world wide web. In: 9th IEEE International Conference on Tools with Artificial
Intelligence, pp. 558–567 (1997)
10. Xin, M., Han, J., Zaiane, O.R.: Discovering web access patterns and trends by applying
OLAP and data mining technology on web logs. In: Proceedings of Advances in Digital
Libraries ADL 1998, Santa Barbara, CA, USA, pp. 19–29, April 1998
11. Rodríguez, J.: Influencia de Internet sobre la profesión enfermera. Hospital Clínico
Universitario de Santiago de Compostela, Revista de enfermería cardiovascular, 25
Septiembre del 2003
12. Agrawal, R., Srikant R.: Mining sequential patterns: generalizations and performance
improvements. In: Proceedings of the 5th International Conference on Extending Database
Technology, EDBT, vol. 1057, pp. 3–17, February-May—February-September 1996
13. Pujari, A.: Data Mining Techniques, p. 284. Universities Press (India) (2005)
14. Gómez, H.: Interpretación de alto nivel de Sequence de video conducida por ontologías,
Tesis UNED-UTPL
15. E. d. a. a. i. simbólico: “scalab.uc3m.es,” 9 Agosto 2010. http://scalab.uc3m.es/*dborrajo/
cursos/ejercicios-aa.html
Metaheuristic Approaches for Solving
University Timetabling Problems: A Review
and Case Studies from Middle Eastern
Universities

Manar Hosny(&)

College of Computer and Information Sciences, King Saud University,


Riyadh, Saudi Arabia
mifawzi@ksu.edu.sa

Abstract. University timetabling problems are concerned with the assignment


of events and tasks that occur frequently in universities, like exams, courses,
projects, and faculty load. These problems are difficult and consume a lot of time
and effort if done manually. Automating such tasks will save time and cost, and
increase the satisfaction of the stakeholders. Since university timetabling
problems are mostly NP-hard, heuristics and metaheuristics are often used for
solving them. In this survey, we review different university timetabling prob-
lems, such as: Examination Timetabling, Course Timetabling, and Staff Time-
tabling. We also propose a new problem, which is Project Timetabling. In
addition, we discuss some case studies that successfully tackled these problems
using metaheuristic algorithms. However, due to the huge number of papers
published worldwide in this research area, we focus in this survey on papers
published in the Middle Eastern region. The findings of this survey indicate that
there are many challenges that are still open for further investigation. Focusing
on the convenience of the stakeholders and adopting hybrid search methods are
among the promising research directions in this field. Project timetabling which
has been introduced in this survey is also another promising area that is open for
further investigation by the interested researchers.

Keywords: Scheduling  Heuristics  Metaheuristics


University timetabling problems

1 Introduction

Producing and managing different schedules are among the frequent tasks that almost
every educational institution needs to handle periodically, in order to plan their courses,
exams, staff schedules, students’ projects, etc. These problems are referred to in the
literature as timetabling or scheduling problems, which generally require allocating
certain events to specific resources, such as timeslots, rooms, and lecturers. It is indeed
one of the important and difficult administrative issues that arise in academic institu-
tions. Most of these problems are subject to a large number of constraints that make
them even harder to solve. In general, researchers in the field have classified the

© Springer Nature Switzerland AG 2019


Á. Rocha and M. Serrhini (Eds.): EMENA-ISTL 2018, SIST 111, pp. 10–20, 2019.
https://doi.org/10.1007/978-3-030-03577-8_2
Metaheuristic Approaches for Solving University Timetabling Problems 11

constraints into two types: hard constraints and soft constraints [1, 2]. Hard constraints
are those that are mandatory and must be strictly enforced in the solution, in the sense
that their violation produces infeasible schedules. Soft constraints, on the other hand,
are desirable but their violation does not make the schedule infeasible.
The task of generating a timetable manually is a time consuming and tedious
process, which in turn usually fails to satisfy all essential constraints. Therefore,
designing university timetables automatically has great benefits in reducing the
workload of the scheduler and satisfying the preferences of the staff members and the
constraints of the administration.
Over the past decades, university scheduling problems have attracted the attention
of the scientific community and have been subject to extensive research [1], particularly
in computer science and operations research. Many timetabling problems are classified
under the category of combinatorial optimization problems. Solving combinatorial
optimization problems with large instances using exact methods is usually unsatis-
factory in terms of the computational time or effort involved; hence why, using (meta)
heuristics, i.e., approximate solution methods, is a sound alternative [3]. Among the
most famous metaheuristic techniques are: Hill Climbing (HC), Simulated Annealing
(SA), Genetic Algorithms (GAs), Ant Colony Optimization (ACO), Particle Swarm
Optimization (PSO), Tabu Search (TS) and Variable Neighborhood Search (VNS).
Due to the huge amount of research on timetabling problems, we limit this survey
to timetabling problems tackled in educational institutions within the Middle East,
focusing mainly on those applying heuristic or metaheuristic approaches. We aim to
shed light on these important scheduling problems, by providing an overview of dif-
ferent university timetabling problem types and giving examples of successful research
dealing with these problems. We aspire to motivate researchers to develop new solution
methods that can address the underlying challenges and help in the automation of this
tedious process for real life applications. This surveys covers selected articles published
during the period 2011–2018 in the Middle East region. We conclude our survey with a
discussion on some open challenges and promising areas for further research directions
in university timetabling problems.
The rest of this paper is organized as follows: Sect. 2 defines the different university
scheduling problems and models. The problems are classified into the well-known
problems: Examination Timetabling (ET), Course Timetabling (CT), and Staff Time-
tabling (ST). In addition, we propose a new problem which is Project Timetabling (PT).
Section 3 is a brief survey of selected case studies that tackled these problems in
Middle Eastern universities. Section 4 is a discussion and analysis of the most
important findings of the survey. Finally, Sect. 5 concludes with some important
challenges and open research directions that may be followed in further studies by the
interested researchers.
Another random document with
no related content on Scribd:
The Project Gutenberg eBook of The Cambridge natural
history, Vol. 06 (of 10)
This ebook is for the use of anyone anywhere in the United States and most
other parts of the world at no cost and with almost no restrictions whatsoever.
You may copy it, give it away or re-use it under the terms of the Project
Gutenberg License included with this ebook or online at www.gutenberg.org. If
you are not located in the United States, you will have to check the laws of the
country where you are located before using this eBook.

Title: The Cambridge natural history, Vol. 06 (of 10)

Author: David Sharp

Editor: S. F. Harmer
Sir A. E. Shipley

Release date: December 5, 2023 [eBook #72331]

Language: English

Original publication: London: Macmillan and Co, 1899

Credits: Keith Edkins, Peter Becker and the Online Distributed Proofreading
Team at https://www.pgdp.net (This file was produced from images
generously made available by The Internet Archive)

*** START OF THE PROJECT GUTENBERG EBOOK THE CAMBRIDGE


NATURAL HISTORY, VOL. 06 (OF 10) ***
THE

CAMBRIDGE NATURAL HISTORY

EDITED BY

S. F. HARMER, Sc.D., F.R.S., Fellow of King's College, Cambridge;


Superintendent of the University Museum of Zoology

AND

A. E. SHIPLEY, M.A., Fellow of Christ's College, Cambridge; University Lecturer


on the Morphology of Invertebrates

VOLUME VI

INSECTS
PART II. Hymenoptera continued (Tubulifera and Aculeata), Coleoptera, Strepsiptera,
Lepidoptera, Diptera, Aphaniptera, Thysanoptera, Hemiptera, Anoplura.
By David Sharp, M.A. (Cantab.), M.B. (Edinb.), F.R.S.

London
MACMILLAN AND CO., Limited
NEW YORK: THE MACMILLAN COMPANY
1899

All rights reserved

"Men are poor things; I don't know why the world thinks so
much of them."—Mrs. Bee, by L. & M. Wintle.
CONTENTS

PAGE
Scheme of the Classification adopted in this Book vii
CHAPTER I
Hymenoptera Petiolata continued—Series 2. Tubulifera or
Chrysididae.—Series 3. Aculeata—General—Classification—
Division I. Anthophila or Bees 1
CHAPTER II
Hymenoptera Aculeata continued—Division II. Diploptera or
Wasps—Eumenidae, Solitary True Wasps—Vespidae, Social
Wasps—Masaridae 71
CHAPTER III
Hymenoptera Aculeata continued—Division III. Fossores or
Fossorial Solitary Wasps—Family Scoliidae or Subterranean
Fossores—Family Pompilidae or Runners—Family Sphegidae
or Perfect-Stingers 90
CHAPTER IV
Hymenoptera Aculeata continued—Division IV. Formicidae or Ants 131
CHAPTER V
Coleoptera or Beetles—Strepsiptera 184
CHAPTER VI
Lepidoptera, or Butterflies and Moths 304
CHAPTER VII
Diptera, or Flies—Aphaniptera, or Fleas—Thysanoptera, or
Thrips 438
CHAPTER VIII
Hemiptera, or Bugs—Anoplura 532
Notes and Corrigenda to Volume VI. and to Insecta of Volume V. 602
Index 603
SCHEME OF THE CLASSIFICATION ADOPTED IN THIS BOOK
Sub-order,
Sub-Family or
Order. Division, Family. Group.
Tribe.
or Series.
HYMENOPTERA Petiolata. (continued from Vol. V).
(continued from Tubulifera
Chrysididae (p. 1).
Vol. V) (p. 1)
Aculeata Archiapides (p. 21).
(p. 4) Obtusilingues (p. 22).
Anthophila
Andrenides (p. 23).
(p. 10)
Denudatae (p. 29).
Apidae
Scopulipedes (p. 32).
(p. 10)
Dasygastres (p. 35).
Sociales (p. 53).
Diploptera
Eumenidae (p. 72).
Vespidae (p. 78).
Masaridae (p. 88).
Mutillides (p. 94).
Fossores
Thynnides (p. 96).
(p. 90)
Scoliides (p. 97).
Scoliidae
Sapygides (p. 99).
(p. 94)
Rhopalosomides (p. 100).
Pompilidae (p. 101).
Sphegides (p. 107).
Ampulicides (p. 114).
Larrides (p. 116).
Trypoxylonides (p. 118).
Sphegidae Astatides (p. 119).
(p. 107) Bembecides (p. 119).
Nyssonides (p. 123).
Philanthides (p. 124).
Mimesides (p. 127).
Crabronides (p. 128).
Heterogyna Camponotides (p. 144).
(p. 131) Dolichoderides (p. 157).
Formicidae Myrmicini
(p. 131) (p. 159).
Attini (p. 165).
Myrmicides
Pseudomyrmini
(p. 158)
(p. 168).
Cryptocerini
(p. 169).
Ponerides (p. 170).
Ecitonini
Dorylides
(p. 175).
(p. 174)
Dorylini (p. 177).
Amblyoponides (p. 180).

Sub-order,
Sub-Family or
Order. Division, Family.
Tribe.
or Series.
COLEOPTERA Passalidae (p. 192).
(p. 184) Lucanidae (p. 193).
Coprides (p. 195).
Lamellicornia Melolonthides
(p. 190) Scarabaeidae (p. 198).
(p. 194) Rutelides (p. 198).
Dynastides (p. 199).
Cetoniides (p. 199).
Cicindelidae (p. 201).
Carabides (p. 206).
Harpalides (p. 206).
Pseudomorphides
Carabidae (p. 204)
Adephaga or (p. 206).
Caraboidea Mormolycides
(p. 200) (p. 206).
Amphizoidae (p. 207).
Pelobiidae (p. 207).
Haliplidae (p. 209).
Dytiscidae (p. 210).
Polymorpha Paussidae (p. 213).
(p. 213) Gyrinidae (p. 215).
Hydrophilidae (p. 216).
Platypsyllidae (p. 219).
Leptinidae (p. 220).
Silphidae (p. 221).
Scydmaenidae (p. 223).
Gnostidae (p. 223).
Pselaphidae (p. 223).
Staphylinidae (p. 224).
Sphaeriidae (p. 227).
Trichopterygidae (p. 227).
Hydroscaphidae (p. 228).
Corylophidae (p. 228).
Scaphidiidae (p. 229).
Synteliidae (p. 229).
Histeridae (p. 230).
Phalacridae (p. 231).
Nitidulidae (p. 231).
Trogositidae (p. 232).
Colydiidae (p. 233).
Rhysodidae (p. 234).
Cucujidae (p. 234).
Cryptophagidae (p. 235).
Helotidae (p. 235).
Thorictidae (p. 236).
Erotylidae (p. 236).
Mycetophagidae (p. 237).
Coccinellidae (p. 237).
Endomychidae (p. 239).
Mycetaeidae (p. 239).
Latridiidae (p. 240).
Adimeridae (p. 240).
Dermestidae (p. 241).
Byrrhidae (p. 242).
Cyathoceridae (p. 243).
Georyssidae (p. 243).
Heteroceridae (p. 243).
Parnidae (p. 243).
Derodontidae (p. 244).
Cioidae (p. 245).
Sphindidae (p. 245).
Bostrichidae (p. 246).
Ptinides (p. 246).
Ptinidae (p. 246)
Anobiides (p. 246).
Lycides (p. 248).
Drilides (p. 248).
Malacodermidae Lampyrides
(p. 248) (p. 248).
Telephorides
(p. 248).
Melyridae (p. 252).
Cleridae (p. 253).
Lymexylonidae (p. 254).
Dascillidae (p. 255).
Rhipiceridae (p. 256).
Elateridae Throscides (p. 260).
(p. 256) Eucnemides
(p. 260).
Elaterides (p. 260).
Cebrionides
(p. 260).
Perothopides
(p. 260).
Cerophytides
(p. 260).
Buprestidae (p. 261).
Tenebrionidae (p. 263).
Cistelidae (p. 264).
Lagriidae (p. 264).
Othniidae (p. 265).
Aegialitidae (p. 265).
Monommidae (p. 265).
Nilionidae (p. 265).
Heteromera
Melandryidae (p. 265).
(p. 262)
Pythidae (p. 265).
Pyrochroidae (p. 266).
Anthicidae (p. 266).
Oedemeridae (p. 266).
Mordellidae (p. 267).
Cantharidae (p. 269).
Trictenotomidae (p. 275).
Bruchidae (p. 276)
Eupoda (p. 280).
Camptosomes
Chrysomelidae (p. 281).
(p. 278) Cyclica (p. 282).
Phytophaga
Cryptostomes
(p. 276)
(p. 282).
Prionides (p. 287).
Cerambycidae Cerambycides
(p. 285) (p. 287).
Lamiides (p. 287).
Anthribidae (p. 290).
Rhynchophora Curculionidae (p. 290).
(p. 288) Scolytidae (p. 294).
Brenthidae (p. 295).
Aglycyderidae (p. 297).
Protorhinidae (p. 298).
Strepsiptera
Stylopidae (p. 298).
(p. 298)

Order. Sub-order, Family. Sub-Family or


Division, Tribe.
or Series.
LEPIDOPTERA Danaides (p. 344).
(p. 304) Ithomiides (p. 346).
Satyrides (p. 347).
Morphides (p. 348).
Brassolides
Nymphalidae
(p. 349).
(p. 343)
Acraeides (p. 350).
Heliconiides
Rhopalocera
(p. 351).
(p. 341)
Nymphalides
(p. 352).
Erycinides (p. 355).
Erycinidae (p. 354)
Libytheides (p. 355).
Lycaenidae (p. 356).
Pieridae (p. 357).
Papilionidae (p. 359).
Hesperiidae (p. 363)
Heterocera Castniidae (p. 371).
(p. 366) Neocastniidae (p. 372).
Saturniidae (p. 372).
Brahmaeidae (p. 374).
Ceratocampidae (p. 375).
Bombycidae (p. 375).
Eupterotidae (p. 376).
Perophoridae (p. 377).
Sphingidae (p. 380).
Cocytiidae (p. 382).
Notodontidae (p. 383).
Cymatophoridae (p. 386).
Sesiidae (p. 386).
Tinaegeriidae (p. 387).
Syntomidae (p. 388).
Zygaenidae (p. 390).
Himantopteridae (p. 392).
Heterogynidae (p. 392).
Psychidae (p. 392).
Cossidae (p. 395).
Arbelidae (p. 396).
Chrysopolomidae (p. 396).
Hepialidae (p. 396).
Callidulidae (p. 400).
Drepanidae (p. 400).
Limacodidae (p. 401).
Megalopyogidae (p. 404).
Thyrididae (p. 404).
Lasiocampidae (p. 405).
Endromidae (p. 406).
Pterothysanidae (p. 406).
Lymantriidae (p. 406).
Hypsidae (p. 408).
Arctiidae (p. 408).
Agaristidae (p. 410).
Geometridae (p. 411).
Noctuidae (p. 414).
Epicopeiidae (p. 418).
Uraniidae (p. 419).
Epiplemidae (p. 420).
Pyralidae (p. 420).
Pterophoridae (p. 426).
Alucitidae (p. 426).
Tortricidae (p. 427).
Tineidae (p. 428).
Eriocephalidae (p. 433).
Micropterygidae (p. 435).

Sub-order,
Sub-Family or
Order. Division, Family.
Tribe.
or Series.
DIPTERA Cecidomyiidae (p. 458).
(p. 438) Mycetophilidae (p. 462).
Blepharoceridae (p. 464).
Culicidae (p. 466).
Chironomidae (p. 468).
Orphnephilidae (p. 470).
Orthorrhapha Psychodidae (p. 470).
Nemocera Dixidae (p. 471).
(p. 455) Ptychopterinae
Tipulidae (p. 472).
(p. 471) Limnobiinae (p. 473).
Tipulinae (p. 475).
Bibionidae (p. 475).
Simuliidae (p. 477).
Rhyphidae (p. 478).
Orthorrhapha Stratiomyidae (p. 478).
Brachycera Leptidae (p. 479).
(pp. 455, 478) Tabanidae (p. 481).
Acanthomeridae (p. 483).
Therevidae (p. 484).
Scenopinidae (p. 484).
Nemestrinidae (p. 484).
Bombyliidae (p. 485).
Acroceridae (p. 489).
Lonchopteridae (p. 490).
Mydaidae (p. 491).
Asilidae (p. 491).
Apioceridae (p. 492).
Empidae (p. 492).
Dolichopidae (p. 493).
Phoridae (p. 494).
Cyclorrhapha Platypezidae (p. 496).
Asciza Pipunculidae (p. 496).
(pp. 455, 494) Conopidae (p. 497).
Syrphidae (p. 498).
Muscidae Acalyptratae (p. 503).
Anthomyiidae (p. 506).
Cyclorrhapha Tachinidae (p. 507).
Schizophora Dexiidae (p. 510).
(pp. 456, 503) Sarcophagidae (p. 510).
Muscidae (p. 511).
Oestridae (p. 514).
Hippoboscidae (p. 518).
Pupipara Braulidae (p. 520).
(pp. 456, 517) Streblidae (p. 521).
Nycteribiidae (p. 521).

APHANIPTERA(pp. 456, 522) Pulicidae (p. 522).

THYSANOPTERA Terebrantia (p. 531).


(p. 526) Tubulifera (p. 531).

Order. Sub-order. Series. Family


HEMIPTERA Heteroptera Gymnocerata Pentatomidae
(p. 532) (pp. 543, 544) (p. 544) (p. 545).
Coreidae (p. 546).
Berytidae (p. 548).
Lygaeidae (p. 548).
Pyrrhocoridae
(p. 549).
Tingidae (p. 549).
Aradidae (p. 550).
Hebridae (p. 551).
Hydrometridae
(p. 551).
Henicocephalidae
(p. 554).
Phymatidae (p. 554).
Reduviidae (p. 555).
Aëpophilidae (p. 559).
Ceratocombidae
(p. 559).
Cimicidae (p. 559).
Anthocoridae
(p. 560).
Polyctenidae (p. 560).
Capsidae (p. 561).
Saldidae (p. 562).
Galgulidae (p. 562).
Nepidae (p. 563).
Naucoridae (p. 565).
Cryptocerata Belostomidae
(p. 562) (p. 565).
Notonectidae
(p. 567).
Corixidae (p. 567).
Cicadidae (p. 568).
Fulgoridae (p. 574).
Trimera (p. 544) Membracidae (p. 576).
Cercopidae (p. 577).
Homoptera Jassidae (p. 578).
(pp. 543, 568) Psyllidae (p. 578).
Dimera (p. 544) Aphidae (p. 581).
Aleurodidae (p. 591).
Monomera
Coccidae (p. 592).
(p. 544)
Anoplura (p. 599) Pediculidae (p. 599).
CHAPTER I

HYMENOPTERA PETIOLATA CONTINUED

SERIES 2. TUBULIFERA OR CHRYSIDIDAE—SERIES 3. ACULEATA—


GENERAL—CLASSIFICATION—DIVISION I. ANTHOPHILA OR BEES

The First Series—Parasitica—of the Sub-Order Hymenoptera


Petiolata was discussed in the previous volume. We now pass to the
Second Series.

Series 2. Hymenoptera Tubulifera.

Trochanters undivided; the hind-body consisting of from three to


five visible segments; the female with an ovipositor, usually
retracted, transversely segmented, enveloping a fine, pointed
style. The larvae usually live in the cells of other Hymenoptera.

The Tubulifera form but a small group in comparison with Parasitica


and Aculeata, the other two Series of the Sub-Order. Though of
parasitic habits, they do not appear to be closely allied to any of the
families of Hymenoptera Parasitica, though M. du Buysson suggests
that they have some affinity with Proctotrypidae; their morphology
and classification have been, however, but little discussed, and have
not been the subject of any profound investigation. At present it is
only necessary to recognise one family, viz. Chrysididae or Ruby-
wasps.[1] These Insects are usually of glowing, metallic colours, with
a very hard, coarsely-sculptured integument. Their antennae are
abruptly elbowed, the joints not being numerous, usually about
thirteen, and frequently so connected that it is not easy to count
them. The abdomen is, in the great majority, of very peculiar
construction, and allows the Insect to curl it completely under the
anterior parts, so as to roll up into a little ball; the dorsal plates are
very strongly arched, and seen from beneath form a free edge, while
the ventral plates are of less hard consistence, and are connected
with the dorsal plates at some distance from the free edge, so that
the abdomen appears concave beneath. In the anomalous genus
Cleptes the abdomen is, however, similar in form to that of the
Aculeate Hymenoptera, and has four or five visible segments,
instead of the three or four that are all that can be seen in the normal
Chrysididae. The larvae of the Ruby-flies have the same number of
segments as other Hymenoptera Petiolata. The difference in this
respect of the perfect Chrysididae from other Petiolata is due to a
greater number of the terminal segments being indrawn so as to
form the tube, or telescope-like structure from which the series
obtains its name. This tube is shown partially extruded in Fig. 1;
when fully thrust out it is seen to be segmented, and three or four
segments may be distinguished. The ovipositor proper is concealed
within this tube; it appears to be of the nature of an imperfect sting;
there being a very sharply pointed style, and a pair of enveloping
sheaths; the style really consists of a trough-like plate and two fine
rods or spiculae. There are no poison glands, except in Cleptes,
which form appears to come very near to the Aculeate series. Some
of the Chrysididae on occasions use the ovipositor as a sting, though
it is only capable of inflicting a very minute and almost innocuous
wound.

Fig. 1.—Chrysis ignita, ♀. England.

Although none of the Ruby-flies attain a large size, they are usually
very conspicuous on account of their gaudy or brilliant colours. They
are amongst the most restless and rapid of Insects; they love the hot
sunshine, and are difficult of capture. Though not anywhere
numerous in species, they are found in most parts of the world. In
Britain we have about twenty species. They usually frequent old
wood or masonry, in which the nests of Aculeate Hymenoptera exist,
or fly rapidly to and fro about the banks of earth where bees nest. Dr.
Chapman has observed the habits of some of our British species.[2]
He noticed Chrysis ignita flying about the cell of Odynerus parietum,
a solitary wasp that provisions its nest with caterpillars; in this cell
the Chrysis deposited an egg, and in less than an hour the wasp had
sealed the cell. Two days afterwards this was opened and was found
to contain a larva of Chrysis a quarter of an inch long, as well as the
Lepidopterous larvae stored up by the wasp, but there was no trace
of egg or young of the wasp. Six days after the egg was laid the
Chrysis had eaten all the food and was full-grown, having moulted
three or four times. Afterwards it formed a cocoon in which to
complete its metamorphosis. It is, however, more usual for the
species of Chrysis to live on the larva of the wasp and not on the
food; indeed, it has recently been positively stated that Chrysis never
eats the food in the wasp's cell, but there is no ground whatever for
rejecting the evidence of so careful an observer as Dr. Chapman.
According to M. du Buysson the larva of Chrysis will not eat the
lepidopterous larvae, but will die in their midst if the Odynerus larva
does not develop; but this observation probably relates only to such
species as habitually live on Odynerus itself. The mother-wasp of
Chrysis bidentata searches for a cell of Odynerus spinipes that has
not been properly closed, and that contains a full-grown larva of that
wasp enclosed in its cocoon. Having succeeded in its search the
Chrysis deposits several eggs—from six to ten; for some reason that
is not apparent all but one of these eggs fail to produce young; in two
or three days this one hatches, the others shrivelling up. The young
Chrysis larva seizes with its mouth a fold of the skin of the helpless
larva of the Odynerus, and sucks it without inflicting any visible
wound. In about eleven days the Chrysis has changed its skin four
times, has consumed all the larva and is full-fed; it spins its own
cocoon inside that of its victim, and remains therein till the following
spring, when it changes to a pupa, and in less than three weeks
thereafter emerges a perfect Chrysis of the most brilliant colour, and
if it be a female indefatigable in activity. It is remarkable that the larva
of Chrysis is so much like that of Odynerus that the two can only be
distinguished externally by the colour, the Odynerus being yellow
and the Chrysis white; but this is only one of the many cases in
which host and parasite are extremely similar to the eye. Chrysis
shanghaiensis has been reared from the cocoons of a Lepidopterous
Insect—Monema flavescens, family Limacodidae—and it has been
presumed that it eats the larva therein contained. All other Chrysids,
so far as known, live at the expense of Hymenoptera (usually, as we
have seen, actually consuming their bodies), and it is not impossible
that C. shanghaiensis really lives on a Hymenopterous parasite in
the cocoon of the Lepidopteron.

Parnopes carnea frequents the nests of Bembex rostrata, a solitary


wasp that has the unusual habit of bringing from time to time a
supply of food to its young larva; for this purpose it has to open the
nest in which its young is enclosed, and the Parnopes takes
advantage of this habit by entering the cell and depositing there an
egg which produces a larva that devours that of the Bembex. The
species of the anomalous genus Cleptes live, it is believed, at the
expense of Tenthredinidae, and in all probability oviposit in their
cocoons which are placed in the earth.

Series 3. Hymenoptera Aculeata.

The females (whether workers or true females) provided with a


sting: trochanters usually undivided (monotrochous). Usually the
antennae of the males with thirteen, of the females with twelve,
joints (exceptions in ants numerous).

These characters only define this series in a very unsatisfactory


manner, as no means of distinguishing the "sting" from the
homologous structures found in Tubulifera, and in the Proctotrypid
division of Hymenoptera Parasitica, have been pointed out. As the
structure of the trochanters is subject to numerous exceptions, the
classification at present existing is an arbitrary one. It would probably
be more satisfactory to separate the Proctotrypidae (or a
considerable part thereof) from the Parasitica, and unite them with
the Tubulifera and Aculeata in a great series, characterised by the
fact that the ovipositor is withdrawn into the body in a direct manner
so as to be entirely internal, whereas in the Parasitica it is not
withdrawn in this manner, but remains truly an external organ,
though in numerous cases concealed by a process of torsion of the
terminal segments. If this were done it might be found possible to
divide the great group thus formed into two divisions characterised
by the fact that the ovipositor in one retains its function, the egg
passing through it (Proctotrypidae and Tubulifera), while in the other
the organ in question serves as a weapon of offence and defence,
and does not act as a true ovipositor, the egg escaping at its base. It
would, however, be premature to adopt so revolutionary a course
until the comparative anatomy of the organs concerned shall have
received a much greater share of attention; a detailed scrutiny of
Prototrypidae being particularly desired.

Fig. 2.—Diagram of upper surface of Priocnemis affinis ♀, Pompilidae.


o, ocelli; B1, pronotum; B2, mesonotum; B3, scutellum of
mesonotum; B4, post-scutellum or middle part of metanotum; B5,
propodeum or median segment (see vol. v. p. 491); B6, combing
hairs, pecten, of front foot: C1, first segment of abdomen, here not
forming a pedicel or stalk: D1, coxa; D2, trochanter; D3, femur; D6,
calcaria or spurs of hind leg: 1 to 15, nervures of wings, viz. 1,
costal; 2, post-costal; 3, median; 4, posterior; 5, stigma; 6,
marginal; 7, upper basal; 8, lower basal; 9, 9, cubital; 10, the three
sub-marginal; 11, first recurrent; 12, second recurrent; 13, anterior
of hind wing; 14, median; 15, posterior: I to XI, the cells, viz. I,
upper basal; II, lower basal; III, marginal; IV, V, VI, first, second
and third sub-marginal; VII, first discoidal; VIII, third discoidal; IX,
second discoidal; X, first apical; XI, second apical.

We have dealt with the external anatomy of Hymenoptera in Vol. V.;


so that here it is only necessary to give a diagram to explain the
terms used in the descriptions of the families and sub-families of
Aculeata, and to discuss briefly their characteristic structures.

Fig. 3—Sting of bee. A, One of the needles separated; a, the barbed


point; b, piston; c, arm. B, Transverse section of the sting: dd, the
two needles; e, bead for guiding the needles; f, director; g,
channel of poison. (After Carlet.)

The Sting of the bee has been described in detail by Kraepelin,


Sollmann, Carlet[3] and others. It is an extremely perfect mechanical
arrangement. The sting itself—independent of the sheaths and
adjuncts—consists of three elongate pieces, one of them a gouge-
like director, the other two pointed and barbed needles; the director
is provided with a bead for each of the needles to run on, these latter
having a corresponding groove; the entrance to the groove is
narrower than its subsequent diameter, so that the needles play up
and down on the director with facility, but cannot be dragged away
from it; each needle is provided with an arm at the base to which are
attached the muscles for its movement. This simple manner of
describing the mechanical arrangement is, however, incomplete,
inasmuch as it includes no account of the means by which the

You might also like