
Samir Mbarki- Professor
- Professor at Ibn Tofaïl University
Samir Mbarki
- Professor
- Professor at Ibn Tofaïl University
About
129
Publications
81,172
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
731
Citations
Introduction
Samir Mbarki currently works at the Department of Computer Science, Université Ibn Tofail. Samir does research in Model Driven Engineering, Software Engineering, Artificial Intelligence, and Natural Language processing Their current project is 'ressources allocation in wireless network'.
Current institution
Additional affiliations
September 1999 - January 2017
September 1995 - December 2014
Publications
Publications (129)
Sentiment analysis in Arabic texts faces challenges with mixed scripts, including foreign words, Arabizi, and dialectal variations. This paper presents a methodology for standardizing mixed-script texts, employing translation and transliteration techniques. We have implemented a preliminary step to translate foreign words before delving into Arabiz...
This paper outlines the implementation of a spell checker for the Arabic language, leveraging the capabilities of NooJ and its functionality, specifically noojapply. In this paper, we shall proceed to provide clear definitions and comprehensive descriptions of several categories of spelling errors. Next, we will provide a comprehensive introduction...
Complex Arabic sentences, especially those containing Arabic psychological verbs, follow a common underlying structure characterized by two essential components: the predicate and the subject. In addition, there are two optional elements: the head and the complement. These sentences, rooted in basic noun phrases (NPs), can be expanded within the pr...
Frozen expressions hold significant importance in the field of natural language processing, attracting considerable attention from researchers across various languages in recent years. The Arabic language, in particular, boasts a wealth of frozen expressions inherited from the pre-Islamic and early Islamic periods, with persistent usage to the pres...
This paper presents how we managed to implement a spell checker for Arabic, benefiting from the power of NooJ and using its functionality, noojapply. Firstly, we define and describe the types of spelling errors, and give an overview of the NooJ platform and its command-line tool, noojapply. Then, we present the four main steps of our spell checker...
span>The lexicon-grammar approach is a very important linguistic approach in automatic natural language processing (NLP). It allows for the description of the lexicon of the language through readable and intuitive tables for human manual editing. However, the automatic use of the lexicon-grammar tables in the automatic NLP platforms remains difficu...
In recent years, particularly with the Ethereum blockchain’s advent, smart contracts have gained significant interest as a means of regulating exchanges among multiple parties via code. This surge has prompted the emergence of various smart contract (SC) programming languages, each possessing distinct philosophies, grammatical structures, and compo...
Over the past few years, several desktop and web-based applications, have been designed and developed for use by both doctors, healthcare professionals and patients. Indeed, the healthcare sector can benefit from the solutions offered by modern technologies. Web 3.0 in health will have the same characteristics as other platforms (connected database...
The world of web is constantly evolving. Today, we no longer speak of a website but of a web application. The growing difficulty of designing web applications has given rise to solutions and tools. The framework is one of them. Providing a serious framework for development by offering strict development rules, as well as generic and out-of-the-box...
In the Blockchain context, Smart Contracts are computer programs that run on the Ethereum platform. Benefiting from the properties of Blockchain, SCs development represents a major challenge to developers, as the code is deployed to an immutable system, besides the Ethereum platform is still evolving. This paper highlights how we can exploit model-...
The frameworks are more and more used for the realization of information systems. A framework allows the design to be reused for an entire domain in order to reduce costs and improve the quality of software. The use of models, metamodel and models transformation is the center of the MDA approach. This research project aims to find a way to transfor...
Question-answering systems (QASs) aim to provide a relevant and concise answer to questions asked in natural language by a user. In this article, we describe our method of developing a question-answering system, operating in the legal domain in Morocco, which mostly uses the French and Arabic languages, and sometimes English. Its purpose is to give...
Ontologies constitute an exciting model for representing a domain of interest, since they enable information-sharing and reuse. Existing inference machines can also use them to reason about various contexts. However, ontology construction is a time-consuming and challenging task. The ontology learning field answers this problem by providing automat...
This paper provides continuity with our previous work on the identification and classification of Arabic psychological verbs through lexicon-grammar tables. In this regard, we add transformational forms such as negation, passivization, and nominalization to enrich our lexicon grammar tables. However, these transformations link one sentence to anoth...
Currently, the main objective of all programmers and designers is to render interactive systems usable and effective. So, users can complete their tasks and achieve their goals. To ensure that, programmers and designers require good understanding of system characteristics and functionality. This work focused on an approach to automate the process o...
Software-defined networking is changing the way we design and manage networks. This prominent paradigm based on the separation of control and management plane is highly heterogeneous with different devices from various technologies and leads to an incredible growing of materials. As SDN expands in size of devices and complexity, it faces greater ad...
This chapter proposes a new methodology for the automatic generation of domain ontologies to support big data analytics. This method ensures the recommendations of the MDA approach by transforming UML class diagrams to domain ontologies in PSM level through ODM, which is an OMG standard for ontology modeling. In this work, the authors have focused...
In the Arabic language, all the structures of simple verbal sentences have the same main components: the predicate (al-mosnad, Open image in new window ), the subject (al-mosnad ‘ilayh, Open image in new window ) that are mandatory in the Arabic sentence, and the complement (al-fodla, Open image in new window ) to reach the meaning of the sentence....
Frozen or idiomatic expressions play a very important role in natural language processing, they are very important in focusing the meaning and expressing it clearly and precisely, away from the ambiguity’s problem. They also enrich the language with enormous possibilities to express different meanings. Thus, the interest of linguistics in the study...
The mass of information in the legal field, which is constantly increasing, has generated a capital need to organize and structure the content of the available documents, and thus transform them into an intelligent guide, capable of providing complete and immediate answers to queries in natural language. Therefore, the Question Answering System (QA...
Many systems in the real-world are multi-state systems composed of multi-state components (nodes and arcs) in which the reliability of the system can be calculated in terms of the lower bound points of level d, called d-Minimal Paths (d-MPs). Such systems (oil/gas production, power transmission and distribution networks, etc.) may be considered as...
Reliability evaluation is an important research field for a complex network. The most popular methods for such evaluation often use Minimal Cuts (MC) or Minimal paths (MP). Nonetheless, few algorithms address the issue of the enumeration of all minimal cut sets from the source node s to the terminal node t when only the nodes of the network are sub...
PHP language has become the most used language for developing web applications. The representation of source code in form of models conform to a metamodel is the center of the MDA approach. This research project aims to find a way to get, using the Xtext framework and Model-driven Engineering Techniques, a PHP language metamodel and parser.
We all know that the development of e-Health management applications goes through several steps, as hence, several stakeholders are involved in the development of these applications. Therefore, it is recommended to define a common vocabulary to facilitate the understanding of the proposed business processes and requirements between these stakeholde...
Smart cities have millions of sensors and innovative technologies in order to improve the quality of their citizens and to increase the competitiveness of urban infrastructure. Nowadays these citizens like to communicate using social media such as Facebook and Twitter, thus building a smart city is not free from these platforms that have changed ci...
With the rise of new web technologies such as web 2.0, Jquery, Bootstrap. Modernizing legacy web systems to benefit from the advantages of the new technologies is more and more relevant. The migration of a system from an environment to another is a time and effort consuming process, it involves a complete rewrite of the application adapted to the t...
The identification of psychological verbs is very important in corpora analyses in order to give the polarity of a given text and define the emotional component. The classification of those verbs represents a challenge for linguists since they classify them according to their needs and their understanding. The aim of this paper is the identificatio...
The syntactic and semantic analyses constitute an important part of the automatic natural language processing field. Indeed, the complexity and the richness of the language make these tasks more difficult since they require the description of all the grammatical, syntactic and semantic features of the language lexicon. It is in this context that th...
In this paper, we present how to use NooJ in order to recognize all transformations occurring on words following Arabic phonological changes. Our goal is to give the concerned phonological rule, its category, the cause and finally the origin of the word before any transformation. We describe the phonological changes by presenting the three main cat...
The article presents a learning web application, which contributes to enhancing the educational process of the Arabic language, especially in Moroccan Mid-High (schools). We use NooJ linguistic platform [1] to analyze the given syllabus. NooJ’s linguistic engine with its Text Annotation Structure (TAS) returns an annotation file after doing the lin...
The use of Business Process Model and Notation (BPMN) has been widely adopted by several research studies as one of the standard metamodels dedicated to the representation and design of business processes at the CIM level of MDA-oriented approaches. However, all of these researches don’t include semantic data that accompanies business processes in...
The use of web development frameworks has grown significantly, specially the Model-View-Controller (MVC) based frameworks. The ability to immigrate web applications between different frameworks available becomes more and more relevant. The automation of the migration through transformations avoid the necessity to rewrite the code entirely. Architec...
Quite recently, considerable attention has been paid to the design, implementation, and evaluation of graphical user interfaces due to the apparition of the new strategic trend of computing everywhere. Accordingly, it is necessary to adopt an abstract representation of systems front-end in order to ensure this trend. IFML (Interaction Flow Modeling...
Smart cities utilize different devices not only to solve the increasingly serious urban resource shortage, environmental pollution, traffic congestion, security risks but also to identify concerns of citizens. Building a smart city is not free from using social networks that have changed citizen's daily life and becoming a new source of real-time i...
In this paper, we propose a new method for three-dimensional object indexing based on a new descriptor: Chebyshev Polynomial Descriptor (3D-CPD). For this end, we propose a numeric calculation of the coefficients of Chebyshev polynomial with maximum precision. The aim of this method is the search of similar 3D objects to a request object model and...
In the recent decades, several methods have been developed to extract moving objects in the presence of dynamic background. However, most of them use a global threshold, and ignore the correlation between neighboring pixels. To address these issues, this paper presents a new approach to generate a probability image based on Kernel Density Estimatio...
Graphical user interfaces (GUIs) present a powerful part of software systems that allows a simplified assimilation and manipulation by users throw visual objects such as text, image and button. however, with the increasing complexity of GUIs and the diversity of their interaction mode required by users to access information anywhere and anytime, th...
Most present systems are never finished or completed. They often need to undergo some changes, concerning for instance user’s requirements or data formats, or in order to fix bugs and problems, improve the system efficiency or change the operating environment. This set of procedures is called “software maintenance”, which is an important phase in t...
All Arabic sentences, both verbal and nominal, share the same main structure, which consists of two required components: the predicate and the subject, and two optional components: the head and the complement. Simple sentences are based on most basic noun phrases (simple nouns), and can be expanded in the predicate, the subject, or the complement....
In this paper, we are going to implement Arabic phonological rules. We will present the speech organs apparatus with a description of Arabic sounds. Then, we will describe the phonological changes and provide a brief linguistic study of such changes. Finally, we will propose two solutions to implement Arabic phonological rules in NooJ. The first so...
This paper presents a linguistic study of number’s morphological feature that affects nouns, verbs, adjectives and gerunds (verbal nouns) by giving a special attention to the Arabic Broken Plurals (BPs). The difficulty lies on specifying the candidate Broken plural Pattern/Patterns (BPP/BPPs) to find the BP Form/Forms (BPF/BPFs) of a given Singular...
Today, the large increase in the amount of data produced by different sources and the development of technologies to store and analyze them offer many perspectives for the ontology modeling. The creation of domain ontologies will form the basis for application developers to target business professional contexts, however the future of big data will...
The Semantic Web is a complex ecosystem that integrates a set of software devices necessary to model, disseminate and exploit the knowledge stored in an ontology. The development of its applications is not an easy task, it is costly and time-consuming. It consists of the different design and modeling phases and sub-phases, each with its own modelin...
In this paper, we present a new methodology supporting ontology modeling for the automatic generation of domain ontologies. We propose a transformation from UML class diagrams to ODM models in agreement with the MDA approach. MDA provides opportunities to present ontology artifacts in an intuitive way by defining them in a high level of abstraction...
Modeling approaches based on standards are of paramount importance in the field of front-end design for web and mobile applications. Problems are often encountered during the selection of tools for designingapplications for developers and researchers, particularly applications that are related to time and cost in the market and academia. The Intera...
Model driven approach has been introduced to deal with challenges of business and technology. This approach provides tools and elements that permit defining high abstraction level models and metamodels with their transformation to automate code generation. Besides, emotional tests have been introduced to help managing behaviors and relationships be...
Object tracking is a crucial step in video analysis, as well as detection and recognition. Particle filter, based on color histogram, is considered among multiple approaches that prove their effectiveness in this domain. It is apparent that if an object and its background, or more objects to be tracked, having nearly the same color histogram, the q...
Most of websites are written in PHP language (82,5% in 2017-02-11) and some of them are still written in PHP4 legacy language. With the rise of new web technologies such as web 2.0, Javascript based technologies : Jquery, Bootstrap. the need to modernize PHP web sites increases. The migration process of a system from an execution environment to ano...
This article presents the inflectional and the derivational model of Arabic verbs based on root and pattern approach, using a linguistic classification that determines and specifies a set of morphological properties. Our work in NOOJ platform is based on:A dictionary that consists of roots, lemmas and patterns.Generating all possible verbs inflecti...
In this paper, we present a NooJ parser of simple Arabic verbal sentence. This parser is based on dependency grammar established by the attribution (Open image in new window, al-’isnād) concept in the Arabic language. In the first part of this paper, we present a syntactic and semantic classification of Arabic words allowing Arabic sentence parsing...
In this paper, we have studied the morphological analyzer of Arabic in NooJ and we have contributed to its improvement in order to propose a new method of treatment of agglutination in Arabic. So, we will process the future tense like an agglutination and not like a conjugated tense using an inflectional graph. And we will cover all cases and possi...
The legacy of mainframe terminal applications has generally limited the complexity level in desktop applications’ user interfaces. Nevertheless the apparition of the new Internet-related technologies is driving to the migration of traditional desktop applications into the web to benefit from the internet technology services. However, GUI’s moderniz...
This book constitutes the refereed proceedings of the 11th International Conference, NooJ 2017, held in Kenitra and Rabat, Morocco, in May 2017.
The 20 revised full papers presented in this volume were carefully reviewed and selected from 56 submissions. NooJ is a linguistic development environment that provides tools for linguists to construct lin...
Natural Language Processing (NLP) applications such as machine translation, question answering, knowledge extraction, and information retrieval require parsing process as an essential step. In this paper, we present a parser to analyze simple Arabic nominal sentences using the NooJ platform. Hence, we propose a well-classified NooJ dictionary that...
Separating moving objects from the background is considered a challenge in the video analysis field, especially in dynamic scenes. Most of the background subtraction methods require a threshold to extract the foreground from video sequences; Therefore the choice of optimal threshold is a difficult task, which leads to false classification of backgr...
Content Based Image Retrieval has been one of the most popular topics in the computer vision literature. CBIR offers the opportunity to research from a huge multimedia database and with appropriate methods the relevant collections of images that have characteristics similar to the case(s) of interest. In the forensic field, CBIR has many possible u...
Over the last few years, with the increased importance of the internet in many domains, web development industry has seen ground breaking changes. To solve the challenge of business and technology change, models have become increasingly important in constructing application systems. For example, OMG’s Model Driven Architecture (MDA) uses models as...
Stress is one of the most important problems that faces university students, and most of time they become so vulnerable toward it, mainly because of the absence of a strategy for stress management, and an absence of the necessary social support. Besides, many studies has shown that stress and mainly chronic stress can cause many health problems. So...
Object tracking is a main problem in computer vision, many tracking approaches has been proposed and tested. Color histogram based particle filtering is the most common method used for object tracking [1,2]. Particle filtering is used for its robustness in non-linear and non-Gaussian dynamic state estimation problems and performs well when clutter...
La clé principale dans l’approche MDA (Model Driven Architecture) est la transformation des modèles. En effet, il existe deux types élémentaires de transformation : une transformation du CIM (Computing Independent Model) vers le PIM (Platform Independent Model) et une transformation du PIM vers le PSM (Platform Specific Model). Ce livre présente l'...
Software applications have come to simplify the task for users and offer them automated functionalities.
These applications must therefore contain high-performance and efficient user interfaces in order to
translate correctly the user’s needs. Indeed, several elements contribute to the ergonomics of these
interfaces, among them the position and lay...
A Rich Internet Applications (RIAs) combine the simplicity of the hypertext paradigm with the flexibility of desktop interfaces. These applications were proposed as a solution to follow the rapid growth and evolution of the Graphical User Interfaces. However, RIAs are complex applications and their development requires designing and implementation...
p> A Rich Internet Applications (RIAs) combine the simplicity of the hypertext paradigm with the flexibility of desktop interfaces. These appliations were proposed as a solution to follow the rapid growth and evolution of the Graphical User Interfaces. However, RIAs are complex applications and their development requires designing and implementatio...
Content Based Image Retrieval has been one of the most popular topics in the computer vision literature. CBIR offers the opportunity to research from a huge multimedia database and with appropriate methods the relevant collections of images that have characteristics similar to the case(s) of interest. In the forensic field, CBIR has many possible u...
Segmenting moving objects from the background is an important step in intelligent video applications, such as intelligent video surveillance. Many approaches use optimal threshold for the separation of moving object from a background. However they suffer from two limitations: It is not only difficult to compute an optimal threshold, but also ignore...
Reconstructing new software system from legacy one is a complex and essential process. To benefit from the new technologies quality and advantages we proposed a model-based approach relies on developing separate models capturing various aspects such as tasks, presentation and dialog structures and behaviors. To do so, the software artefacts must be...
In this paper, we propose a new approach to derive GUIs from Abstract models by applying the Model Driven Engineering Methodology. Structural and dynamic aspects of GUIs are modeled. Our model driven development process is based on Ontology and IFML. The logical description UIs components is presented by Ontology domain and their interactions are c...
Rich Internet Applications (RIAs) is a new kind of web applications. These applications provide more effective graphical components and promote the fusion of traditional applications and client-server applications. They also furnish convivial and interactive interfaces similar to desktop applications. However RIAs designing and implementation are t...
GUIs are essential components for today software. However, legacy applications do not benefit from the advantages of user interfaces new technologies that enhance the interaction and the quality of the system. Building a new system from another existing one is more requested and a very complex process. So, we opted for an ADM approach based on the...
UML is the first international modeling language standardized since 1997. It aims at providing a standard way to visualize the design of a system, but it can't model the complex design of user interfaces and interactions. However, according to MDA approach, it is necessary to apply the concept of abstract models to user interfaces too. IFML is the...
Detecting and segmenting moving objects from the background is the enabling step in intelligent video applications, such as intelligent video surveillance and video-based human–computer interaction. The use of optimal threshold in many approaches for separation a moving object from a background is a difficult task, if we use a higher threshold to r...
Web applications have witnessed a significant improvement that exhibit advanced user interface behaviors and functionalities. Along with this evolution, Rich Internet Applications (RIAs) were proposed as a response to these necessities and have combined the richness and interactivity of desktop interfaces into the web distribution model. However, R...
In the digital world in which we are living, the intellectual property protection becomes a concern especially with the proliferation of files transfer over networks. The ability to access data such as text, images, video, and audio has become quicker and easier for people with little to no knowledge of technology. In this paper, a robust watermark...
Nowadays, we note that there is a big change in technologies. To track these changes, the evolution of software development practices is required. MDE provides modernization techniques that can quickly follow these changes. We adopt this approach in order to modernize the legacy Qt timetabling application user interfaces. We conducted an automatic...
Companies are investing a lot of resources and effort for migrating their legacy applications and adapting them with the rapid technological changes. For this reason, the authors are interested in the modernization of desktop applications developed in Java Swing to Web 2.0 applications. Therefore, an ADM approach is applied in order to develop a to...
In recent years, many works using ontologies for generating graphical interfaces have emerged. In other hand, various UI description Models have been proposed, the most detailed and which describes well the graphical interfaces is the new OMG abstract model of user interfaces: Interaction Flow Modeling Language (IFML). In this paper, we propose a n...
Rich Internet Applications (RIA) have been proposed as a response to growing user needs. Indeed, they have combined the richness and interactivity of desktop interfaces into the web distribution model. However, RIAs are complex applications and their development requires designing and implementation which can be time-consuming and the available too...
Previously, developers were executing the code by compiling a program written in a specific language, in order to make it flexible and autonomous. Currently, with the appearance of modeling approach, many researchers are interested in modeling tools industry, as well, to align with the imposed changes and respond to industry requirements related to...
In this paper, we proposed a novel blind digital image copyright protection scheme based on Steerable pyramid transform (SPT) and visual cryptography (VC). Unlike traditional watermarking schemes, the proposed method does not alter the original image by embedding the watermark image. Steerable pyramid transform is performed on the original image, a...
Integrating the modeling process throughout all development phases of any application is promising. On the one hand, this is the basis of Model Driven Architecture approach (MDA) which advocates the massive use of models during different steps of any application’s development. On the other hand, the achievement of the User Interface (UI) of an appl...
Rich Internet Applications (RIAs) combine the simplicity of the hypertext paradigm with the flexibility of
desktop interfaces. However, RIAs are complex applications and their development requires designing and implementation which are time-consuming and the available tools are specialized in manual design. In this paper, we present an approach for...
In this paper, we propose a new method for Objects indexing in three dimensions. We need to define our signature based on a 3D shape descriptor. We have to decompose the 3D-models into Spherical Squares Surfaces. The aims of the method are to minimize, the processing time on the 3D objects database and the searching time of similar objects to a req...
Police sketching techniques are nevertheless a routine part of law enforcement investigation and often used to identify suspects from an eye witness memory. This classic technique of identifying is generally slow and fastidious and may not conduct to arrest the right offender. Therefore an automatic face sketch recognition systems that determine ef...
In this paper, we propose a new approach to detect rotated object at distinct angles using the Viola-Jones detector. Our method is based on two main steps: in the first step, we determine the rotated Haar-like feature by any angle (45°, 26.5°, 63.5° and others), this allowed us to obtain a very large number of Haarlike features for use them during...
Object detection is a topic which takes a great extent in the field of computer vision. Is the first step in many visual processing systems like face recognition, encoding recognition and lip reading. The detection of an object passes through three stages: The first is the extraction of information that characterize the object, the second is the pr...