Abdelaaziz Mouloudi

Abdelaaziz Mouloudi
  • Ibn Tofaïl University

About

88
Publications
22,472
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
574
Citations
Current institution
Ibn Tofaïl University

Publications

Publications (88)
Article
Full-text available
This paper outlines the implementation of a spell checker for the Arabic language, leveraging the capabilities of NooJ and its functionality, specifically noojapply. In this paper, we shall proceed to provide clear definitions and comprehensive descriptions of several categories of spelling errors. Next, we will provide a comprehensive introduction...
Article
Full-text available
Complex Arabic sentences, especially those containing Arabic psychological verbs, follow a common underlying structure characterized by two essential components: the predicate and the subject. In addition, there are two optional elements: the head and the complement. These sentences, rooted in basic noun phrases (NPs), can be expanded within the pr...
Article
Retrieving relevant legal cases from digital publications of Moroccan jurisprudence remains a challenge due to the complex nature of the information and the vastness of the database. This research introduces an enhanced Case-Based Retrieval (CBR) system, leveraging ontologies to streamline the retrieval process. The hierarchical structure and logic...
Article
Full-text available
span>The lexicon-grammar approach is a very important linguistic approach in automatic natural language processing (NLP). It allows for the description of the lexicon of the language through readable and intuitive tables for human manual editing. However, the automatic use of the lexicon-grammar tables in the automatic NLP platforms remains difficu...
Conference Paper
Full-text available
This paper presents how we managed to implement a spell checker for Arabic, benefiting from the power of NooJ and using its functionality, noojapply. Firstly, we define and describe the types of spelling errors, and give an overview of the NooJ platform and its command-line tool, noojapply. Then, we present the four main steps of our spell checker...
Conference Paper
Il est évident que l'approche hybride est le meilleur paradigme pour concevoir des schémas multidimensionnels performants. Sa force réside dans sa capacité à combiner les approches descendante et ascendante, exploitant ainsi les avantages des deux approches. Dans cet article, les auteurs tentent d'identifier et d'analyser les différentes méthodes h...
Chapter
Question-answering systems (QASs) aim to provide a relevant and concise answer to questions asked in natural language by a user. In this article, we describe our method of developing a question-answering system, operating in the legal domain in Morocco, which mostly uses the French and Arabic languages, and sometimes English. Its purpose is to give...
Chapter
Full-text available
Ontologies constitute an exciting model for representing a domain of interest, since they enable information-sharing and reuse. Existing inference machines can also use them to reason about various contexts. However, ontology construction is a time-consuming and challenging task. The ontology learning field answers this problem by providing automat...
Chapter
This paper provides continuity with our previous work on the identification and classification of Arabic psychological verbs through lexicon-grammar tables. In this regard, we add transformational forms such as negation, passivization, and nominalization to enrich our lexicon grammar tables. However, these transformations link one sentence to anoth...
Chapter
In the Arabic language, all the structures of simple verbal sentences have the same main components: the predicate (al-mosnad, Open image in new window ), the subject (al-mosnad ‘ilayh, Open image in new window ) that are mandatory in the Arabic sentence, and the complement (al-fodla, Open image in new window ) to reach the meaning of the sentence....
Chapter
Frozen or idiomatic expressions play a very important role in natural language processing, they are very important in focusing the meaning and expressing it clearly and precisely, away from the ambiguity’s problem. They also enrich the language with enormous possibilities to express different meanings. Thus, the interest of linguistics in the study...
Chapter
The mass of information in the legal field, which is constantly increasing, has generated a capital need to organize and structure the content of the available documents, and thus transform them into an intelligent guide, capable of providing complete and immediate answers to queries in natural language. Therefore, the Question Answering System (QA...
Chapter
The identification of psychological verbs is very important in corpora analyses in order to give the polarity of a given text and define the emotional component. The classification of those verbs represents a challenge for linguists since they classify them according to their needs and their understanding. The aim of this paper is the identificatio...
Chapter
The syntactic and semantic analyses constitute an important part of the automatic natural language processing field. Indeed, the complexity and the richness of the language make these tasks more difficult since they require the description of all the grammatical, syntactic and semantic features of the language lexicon. It is in this context that th...
Chapter
Full-text available
In this paper, we present how to use NooJ in order to recognize all transformations occurring on words following Arabic phonological changes. Our goal is to give the concerned phonological rule, its category, the cause and finally the origin of the word before any transformation. We describe the phonological changes by presenting the three main cat...
Chapter
The article presents a learning web application, which contributes to enhancing the educational process of the Arabic language, especially in Moroccan Mid-High (schools). We use NooJ linguistic platform [1] to analyze the given syllabus. NooJ’s linguistic engine with its Text Annotation Structure (TAS) returns an annotation file after doing the lin...
Chapter
The new technology had created “Wireless sensor”. This micro device allows measuring a physical quantity from the environment and transforms it autonomously into a digital value that can be processing. The deployment of several wireless sensors communicating by wireless radio, form a Wireless Sensor Network (WSN). This system can collaborate and co...
Article
Full-text available
The Wireless sensor is a micro device that allows measuring a physical quantity from the environment and transforming it autonomous into a digital value that can be processing. The collection, processing and transmission of data are the main factors of the dissipation of the energy for the wireless sensors, since these Battery-powered sensors is li...
Article
Full-text available
In this paper, we propose a method for automatic foreground extraction in video frames by analyzing the spatiotemporal aspect. We divide our contribution to tree steps: Automatic seeds detection, formulating the energy function, and using the random walk algorithm to minimize this function. First, we detect seeds by extracting a sparse of good feat...
Article
Full-text available
The data warehouse design is currently recognized as the most important and complicated phase in any project of decision support system implementation. Its complexity is primarily due to the proliferation of data source types and the lack of a standardized and well-structured method, hence the increasing interest from researchers who have tried to...
Chapter
All Arabic sentences, both verbal and nominal, share the same main structure, which consists of two required components: the predicate and the subject, and two optional components: the head and the complement. Simple sentences are based on most basic noun phrases (simple nouns), and can be expanded in the predicate, the subject, or the complement....
Chapter
Full-text available
In this paper, we are going to implement Arabic phonological rules. We will present the speech organs apparatus with a description of Arabic sounds. Then, we will describe the phonological changes and provide a brief linguistic study of such changes. Finally, we will propose two solutions to implement Arabic phonological rules in NooJ. The first so...
Chapter
This paper presents a linguistic study of number’s morphological feature that affects nouns, verbs, adjectives and gerunds (verbal nouns) by giving a special attention to the Arabic Broken Plurals (BPs). The difficulty lies on specifying the candidate Broken plural Pattern/Patterns (BPP/BPPs) to find the BP Form/Forms (BPF/BPFs) of a given Singular...
Article
Full-text available
Requirements analysis is a key step in the process of the data warehouse design. It is the key element for the success of a data warehouse project since at the end of this phase, the multidimensional elements will be defined and the model designed. This paper presents the set of requirements driven methods for designing data warehouses and reveals...
Article
Full-text available
Nowadays, the data warehouse is recognized as the essential component of decision support systems since it ensures the best response to the decision problems of different functional areas of an organization. However, designing and building a data warehouse remain a very complex task, difficult to accomplish. This complexity is mainly due to the abs...
Article
Full-text available
The rapidly evolving of technology in the area of communication and information, allowed the creation of a new device called wireless sensor. This small device allows measuring physical phenomenon quantity in environment such as light, pressure, temperature and transforming it autonomously into a digital value, In order to send to one or several po...
Chapter
This article presents the inflectional and the derivational model of Arabic verbs based on root and pattern approach, using a linguistic classification that determines and specifies a set of morphological properties. Our work in NOOJ platform is based on:A dictionary that consists of roots, lemmas and patterns.Generating all possible verbs inflecti...
Chapter
In this paper, we present a NooJ parser of simple Arabic verbal sentence. This parser is based on dependency grammar established by the attribution (Open image in new window, al-’isnād) concept in the Arabic language. In the first part of this paper, we present a syntactic and semantic classification of Arabic words allowing Arabic sentence parsing...
Chapter
Full-text available
In this paper, we have studied the morphological analyzer of Arabic in NooJ and we have contributed to its improvement in order to propose a new method of treatment of agglutination in Arabic. So, we will process the future tense like an agglutination and not like a conjugated tense using an inflectional graph. And we will cover all cases and possi...
Chapter
Natural Language Processing (NLP) applications such as machine translation, question answering, knowledge extraction, and information retrieval require parsing process as an essential step. In this paper, we present a parser to analyze simple Arabic nominal sentences using the NooJ platform. Hence, we propose a well-classified NooJ dictionary that...
Article
This paper presents a new methodology to master models transformation from CIM to PIM in accord with MDA approach. Our improved approach is founded on creation a good CIM level, through well-chosen rules, for facilitating models transformation to PIM level. However, we establish a rich PIM models via use case diagram, state diagram, class and packa...
Article
Full-text available
A wireless Sensors is one of the many new creations that present a new stage in the evolution of the technologies of the information. This small device allows measuring physical phenomena quantity in Environment such as light, heat, pressure, temperature and transforming it autonomously into a digital value, In order to send to one or several point...
Conference Paper
This paper presents a method two segment moving objects from video sequences by combining spatial and temporal information. The segmentation is performed in two steps : automatic seeds detection, and random walk segmentation. In the first step, seeds are detected by using optical flow in specific pixels so in every d × d grid there is one pixel to...
Conference Paper
Full-text available
Wireless Sensors is one of the many new creations which present a new stage in the evolution of the technologies of the information. This small device allows measuring physical quantity in Environment and transforming it autonomously into a digital value, In order to send to one or several points of collections, which is going to be processed. Howe...
Conference Paper
The face tracking techniques are derived from the "radarists", who are based on theory of the estimation.Motion estimation in image sequences is an important step in many computer vision and image processing applications. Several methods for solving this problem have been proposed, but very few manage to achieve a high level of accuracy without sac...
Article
Full-text available
Datawarehouses can be extremely large and ressource demanding, which is not always affordable in a local environment. Hence, in order to deal with the big amounts of data held in the datawarehouses, Cloud warehousing seems to be the solution. On the other hand, many entreprises use datawarehouses for data analysis and use XML to deal with semi-stru...
Article
Full-text available
Models transformation is the most important key in Model Driven Architecture (MDA). The first transformation in MDA is Computing Independent Model (CIM) to Platform Independent Model (PIM) transformation, the second is PIM to Platform Specific Model (PSM) transformation. This latter transformation deals the two less abstract levels, PIM and PSM, fo...
Conference Paper
The models transformation is the number one key in MDA. There are two transformations kinds In MDA which are CIM to PIM transformation and PIM to PSM transformation. The most researchers based on PIM to PSM transformation, since there are multiple points in common between these two levels. However, Transforming models in CIM level to models in PIM...
Article
A small device called wireless Sensor is one of the many new creations which present a new stage in the evolution of the technologies of the information. Beside Wireless Sensors allows measuring physical quantity in Environment and transforming it autonomously into a digital value, In order to send to one or several points of collections, which is...
Article
Now-a-days, data warehousing system plays an important strategic role in companies and organizations, through their ability to store, manage, and inquire large amount of data. However, very few companies succeed to implement this system because of the complexity of the task and lacking the method of unifying design data. In perspective of solving t...
Conference Paper
Datawarehouses can be extremely large and ressource demanding, which is not always affordable in a local environment. Hence, in order to deal with the big amounts of data held in the datawarehouses, Cloud warehousing seems to be the solution. On the other hand, many entreprises use datawarehouses for data analysis and use XML to deal with semi-stru...
Article
Full-text available
Models transformation is the main key of MDA. The first transformation in MDA is CIM to PIM transformation, the second is PIM to PSM transformation. Most searches deal the transformation from PIM level to PSM level, since there are multiple common points between these two levels. However, the transformation from CIM level to PIM level is rarely add...
Conference Paper
Full-text available
Wireless sensor is one of many emerging creations of the new technology. This small device allows measuring physical quantity in space and transforming it into a digital value which is going to be processed. Deployment of many wireless sensor trains a network of wireless sensors called «sensors nodes ». In spite of feeding wireless sensors by batte...
Conference Paper
Full-text available
Our paper shows a new methodology for controlling the models transformation from CIM to PIM into model driven architecture. In this proposal we founded on an analytical survey. Our methodology is based on creation of the transformable models in CIM level to facilitate the transformation task to the PIM level. We create a good PIM level, according t...
Article
The model transformation is the most interesting part into MDA. Indeed, two transformations exist between three levels of MDA. Most searches cover the transformation from PIM to PSM. However, a little of approaches allow transforming CIM to PIM. This paper represents an approach allows mastering transformation from CIM to PIM into MDA. This approac...
Article
Full-text available
In this article, we present a new symmetric encryption system which is a combination of our ciphering evolutionary system SEC [1] and a new ciphering method called “fragmentation”. This latter allows the alteration of the appearance frequencies of characters from a given text. Our system has at its disposed two keys, the first one is generated by t...
Article
Full-text available
Nowadays, there are researchers who spend time and energy in writing their own articles then, by accident, they find out or discover that the ideas that they have been working on had already been published by somebody else. Other researchers reapply for already published ideas, by changing information or data type. However, they keep the same appro...
Conference Paper
Aujourd’hui, les systèmes d’entreposage de données occupent une place primordiale et stratégique dans les entreprises et les organisations, grâce à leur capacité de stocker, gérer et interroger efficacement les Big Data. Pourtant, très peu d’entreprise réussissent à mettre en place un tel système à cause de l’absence d’une méthode unifiée pour sa c...
Conference Paper
Full-text available
The small device called Wireless sensors can be used for measuring environmental information (physical data) and transforming it into a digital processing value. A sensor node means a network of wireless sensors that is resulting by deployment of many wireless sensors. Wireless sensors waste energy because of processing and data transmission. There...
Article
Full-text available
The main key in MDA is the models transformation. There are two kinds of transformations into MDA: CIM to PIM and PIM to PSM. Most researchers focused on the transformation from PIM to PSM, because there are several points in common between these two levels. But Transforming CIM to PIM is rarely discussed in research subjects because they are two d...
Conference Paper
Full-text available
Face detection and tracking is challenging problem in image processing and computer vision. In the last few years, it has received a great attention because of its many applications based on various methods in different fields such as law enforcement, security and so on. Face detection and tracking are the two processes done by using various approa...
Conference Paper
Full-text available
In WSN the sensors can collect and sense a huge number of data. And they can exceed hundreds of terabytes data every day. Clustering techniques can be applying and organizing of data into groups. However there are several clustering algorithms which can produce an appropriate partition efficiently for sensor data. On the other hand Fuzzy clustering...
Conference Paper
The subject of traceability has always been treated and analyzed in model driven engineering and occupies a significant priority by dint of his role on maintaining links between different products and elements in software development , particularly during transformation from source model to another target model. Nevertheless, models evolve in paral...
Conference Paper
This paper proposes a model transformation method to master transformation of CIM to PIM in accordance with the MDA approach. Our approach is founded on building a good CIM level via well-defined rules, allowing us to win precious models that facilitate the task of the transformation from CIM level to PIM level. Next, we define a set of well- selec...
Conference Paper
This paper presents a methodology to master transformation of models from CIM to PIM in accord with MDA approach. Our methodology is founded on creation a good CIM level, through well-chosen rules, for facilitating models transformation to PIM level. However, we establish a rich PIM level via state machine, class and package models. Next, we descri...
Conference Paper
Full-text available
localization in the wireless sensors networks is one of main problems in this type of networks. However localization is the task of determining the physical coordinates of a sensor node or a group of sensor nodes. To solve the problem of localization in WSN, many localization algorithms have been proposed. In this paper we focus mainly on the compa...
Conference Paper
This paper presents a method to control transformation from CIM level to PIM level in agreement with MDA approach. Our method is based on establishing a good CIM level via well-selected rules allowing us to obtain rich models that facilitate the task of transformation to PIM level. We specify, thereafter, a concentrated PIM level through different...
Article
Wireless sensor networks are topologically similar to artificial neural networks (ANN). The similarity between these topologies makes WSN a good candidate for implementing the parallel and distributed processing of ANNs. In this paper we are proposing to employ a single layer Morphological Perceptrons (SLMP) artificial neural network method with th...
Conference Paper
Full-text available
This paper suggests a disciplined approach to mastered transformation of CIM level to PIM level in accordance with the MDA approach. Our suggestion is founded on creating good CIM level through wellselected rules, allowing us to achieve rich models that contain relevant information to facilitate the task of the transformation to the PIM level. We s...
Article
Recently there has been much focus on Wireless sensor networks (WSN). However Location information is one of the most important information in WSN. Many location estimation algorithms for WSNs have been used to determine the sensor nodes position. In this paper, two different localization algorithms using Trilateration and Multilateration mathemati...
Article
WSNs are used in wide range of applications. These applications require exact localization of nodes with respect to a global coordinate system in order to provide meaningful information. But it is often too expensive to include a GPS receiver in a sensor network node. That's why many localization algorithms for WSNs have been proposed to solve this...
Conference Paper
Full-text available
Knowledge of node location information is one of the fundamental challenges in Wireless Sensor Network. However Localization algorithms determine the location of nodes. Furthermore, the intrinsic characteristics of wireless networks gives rise to the important question of whether or not existing routing protocols designed for WSN are sufficient to...
Article
This paper proposes a method to automatic transformation of CIM level to PIM level respecting the MDA approach. Our proposal is based on creating a good CIM level through well-defined rules allowing as achieving rich models that contain relevant information to facilitate the task of the transformation to the PIM level. We define, thereafter, an app...
Article
Full-text available
Location information is one of the most important information in wireless sensor networks (WSN). The great WSN applications and techniques necessitate that the sensor nodes positions must be determined. Localization algorithms have used to estimate sensor nodes position. This paper is intended to study and compare different localization algorithms....
Article
Full-text available
Summary In this paper, we present two symmetric evolutionist-based ciphering algorithms (SEC and SEC-EX) where the second is an extension of the first. Our evolutionist approach is modeled as a combinatorial optimization problem. The paper addresses the coding of the chromosomes, the identification of a fitness function, and the choice of the adapt...
Conference Paper
This work is a contribution to cryptography. We have developed a symmetrical blocks ciphering system, that is an improvement of our cryptosystem inspired from genetic algorithm published in AMSE periodical. His complexity is o(n) because all operations used are simple and they are applied randomly in ciphering. Furthermore, in our system the user c...
Article
The ciphering system presented in this paper is an extension of our ciphering system, which is already published [7]. Indeed, being given a plaintext, coded into binary and cut out in blocks of fixed size, we determine the lists of the positions of the various blocks constituting this plaintext and instead of applying the evolutionary ciphering alg...
Conference Paper
In this article, we present a new cryptographic system which is a combination of our ciphering evolutionary algorithm and a new ciphering method called “fusion”. This latter allows the alteration of the appearance frequencies of characters from a given text, and can be used as a preparatory stage for our evolutionary algorithm. So, it constitutes t...

Network

Cited By