Youssef FAKHRI

Youssef FAKHRI
Université Ibn Tofail · Faculty of Sciences

PES

About

113
Publications
20,205
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
503
Citations
Citations since 2016
71 Research Items
341 Citations
20162017201820192020202120220204060
20162017201820192020202120220204060
20162017201820192020202120220204060
20162017201820192020202120220204060
Additional affiliations
March 2009 - present
Université Ibn Tofail
Position
  • Professor (Associate)

Publications

Publications (113)
Chapter
In line with the strong growth of the social data volume, a huge number of social contents are created in various forms every day. As a result, it is often difficult for users to find or keep up with current popular keywords. Many researchers are interested to analyze the social data and identify the current popular keywords and topics. Thus, these...
Article
Full-text available
Automatic license plate recognition systems (AL-PRS) have a major significant role in supporting smart city initiatives because of their promising applications in various areas, such as road safety, traffic control, smart parking, toll management, and security. Owing to ALPRS's importance, numerous methods have been developed. However, many of the...
Preprint
Understanding human data has been the focus of philosophers and scientists. Social media platforms encourage people to be creative and share their personal information. By analyzing data, we will be able to identify people's personalities and information that is also important to specific profils. The aim of this paper is to propose an approach tha...
Chapter
For nearly a half-century, influence maximization has been a popular topic in computational social network analysis. However, identifying k nodes “users” among all the nodes in a directed network in such a way that activating them results in the highest predicted number of activated nodes is a problem known as influence maximization. Its actual imp...
Article
Because of the numerous applications domains in which social media networks can be used, the huge volume of data and information uploaded by them is gaining significant interest. Publishing allows consumers to express their thoughts on products and services. Some feedbacks could also influence other users on those things. Therefore, extracting and...
Article
Full-text available
span>A new method for recognizing automatically Arabic handwritten words was presented using convolutional neural network architecture. The proposed method is based on global approaches, which consists of recognizing all the words without segmenting into the characters in order to recognize them separately. Convolutional neural network (CNN) is a p...
Conference Paper
The use of serious games in education field is now attracting and needed more than ever with all the new challenges in our era. This paper focused on achieving a literature survey to identify the research studies showing significant achievements using serious games for educational goals. In this presented work we collected more than four hundred re...
Chapter
Convolutional neural network (CNN) has become popular and helpful model for classification of objects in the video stream, clustering, pattern recognition and prediction in many disciplines. Considering many systems solving the classification problem, the mobility is often required. This paper proposes an implementation of the Tiny-YOLOv3 (You Only...
Chapter
The Internet of Things (IoT) is an invented tool able to transform our operations and facilitate them. This paper presents a study about IoT technology and its ecosystem, this one based on the collaboration of many technologies. IoT has many challenges, the main one is establishing the interconnection between connected object and the message exchan...
Article
Full-text available
The concept of implementing games or gamification in education is becoming a growing area in the last decade and a blistering topic among researchers, professors and educational systems. Gaming in education aims to simplify and improve the learning process using technology. Nevertheless, accessibility and inclusion of gaming elements in the higher...
Chapter
Automatic license plates recognition systems (ALPR) play a vital role in supporting smart cities because of their promising applications in various areas, such as traffic control, smart parking, toll management and security. Owing to ALPR importance, numerous methods have been developed. However, many of the current solutions are still suffering fr...
Chapter
The massive amount of data and information posted by social networks is attracting growing interest because of the several applications fields it can be utilized. In fact, publishing allows users to express opinions about products and to influence other users. Therefore, identifying influencers on online social networks with their products percepti...
Article
The massive amounts of information and data released by social media have aroused more interest due to the multiple application areas they can use. In fact, misinformation and disinformation campaigns are becoming more common around the world. The explosive growth of fake news and its erosion has increased the need of detection and intervention. Th...
Article
Mobile ad hoc network (MANET) is among the networks which do not require any infrastructure to put nodes in communication. Due to its own nature, it is used by several applications. Even though it's a network that is extremely challenging and mostly when TCP is applied. In this paper, we have proposed a new improvement in the TCP algorithm that emp...
Article
Full-text available
Due to rapid growth of multimedia traffic used over the mobile ad-hoc networks (MANETs), to keep up with the progress of this constraints MANETs protocols becoming increasingly concerned with the quality of service. In view of the random mobility nodes in MANET, TCP becomes more unreliability in case of higher energy consumption and packet loss. In...
Chapter
Handwritten Arabic recognition systems face several challenges, including the unlimited variation in human handwriting. In this paper, we present an adaptive method for automatic recognition of Arabic handwritten text by integrating linguistic knowledge as n-gram model. The proposed system is divided into two parts: the first part is an automatic t...
Chapter
Specific network protocols created to facilitate the operation of data’s transporting In Internet of Things ecosystem. Those protocols characterized by reliable transfer and the energy consumption. In order to apply the interconnection between the connected objects and to allow the sending and/or exchanging data, IoT uses different transmission pro...
Article
Full-text available
Students develop a big commitment personally and invest financially to pursue their education and get the degree that opens many gateways for them, but what if the degrees don’t match the skills required by most employers? As time has changed, employability is based on knowledge and several abilities such as soft skills, communication, leadership,...
Chapter
Full-text available
The ease deployment of Wireless sensor networks (WSNs) in the harsh and hard environment possesses a paved because the way it is. They are formed by sensor nodes which are responsible for examining environmental and corporal conditions to perform data processing. In this chapter, the manner of deployment will be presented, and how they communicate...
Article
Full-text available
The design of robust routing protocol schemes for MANETs is quite complex, due to the characteristics and structural constraints of this network. A numerous variety of protocol schemes have been proposed in literature. Most of them are based on traditional method of routing, which doesn’t guarantee basic levels of Qos, when the network becomes larg...
Chapter
Support vector machines (SVMs) have proven to yield high accuracy and have been used widespread in recent years. However, the standard versions of the SVM algorithm are very time-consuming and computationally intensive, which places a challenge on engineers to explore other hardware architectures than CPU, capable of performing real-time training a...
Article
Full-text available
At present, serious games are experiencing a growing popularity, with areas of application that extend not only to education, but also to other sectors such as the military, health and business sectors, among others. Since video games facilitate the learning of complex processes, their associated benefits have been reoriented principally to the edu...
Chapter
Automatic license plates identification (ALPI) is an important element of intelligent transportation systems. Most of ALPI systems are usually tackled in three stages: license plate detection/localization, character segmentation and character recognition. Character segmentation (CS) plays an important role in ALPI systems: the performance of the se...
Chapter
This study aims to develop a Web service for reusing water data generated from institutional Web sites in Morocco. The results show the need for a national standard of water data exchange to improve the collaboration between stakeholders, citizens and central administration. This approach uses a prototype based on OGC Web services, Python modules,...
Article
Full-text available
Serious games have become a much-discussed trend topic in recent years, as the concept promises higher productivity while increasing user satisfaction. In this paper we present JeuTICE an Arabic serious game project model for mathematics learning. this digital resource was approved by VAREN project and hosted at the portal TICE of Moroccan Educatio...
Article
Full-text available
At present, serious games are experiencing a growing popularity and popularity, with areas of application that extend not only to education, but also to other sec-tors such as the military, health and business sectors, among others. Since video games facilitate the learning of complex processes, their associated benefits have been reoriented princi...
Conference Paper
The use of information technologies has significantly changed the last years, essentiality with use of cloud computing in different sectors. The management of natural resources has always been preoccupation of several researchers and academic works, given the importance of these resources and the risks that impact them, as well as the importance of...
Conference Paper
Online Smartphone-based Human Activity Recognition (SHAR) systems are increasingly used in different kinds of applications such as in smart homes and health monitoring. In order to allow users to train their own personalized models quickly and without privacy concerns, a SHAR model has to be lightweight due to the limited resources of mobile device...
Article
Full-text available
This article describes an algorithm of classification by similarity of nodes in a MANET (Clustering). To optimize a network performance without influencing others, we must act only on the cluster structure. Any additional calculation clutters more the system. To overcome this limitation, a strong classification method is needed. The purpose of clas...
Chapter
This article represents a study of Internet of Things (IoT) technology. Its ecosystem based on the use of specific network protocols that facilitate the operation of transporting. Reliable transfer and the energy consumption characterize these protocols. Several platforms developed are designed for IoT, whose main purpose is to monitor the differen...
Chapter
The documents of Arabic handwritten contain text lines and words. Words are often a succession of sub-words (characters, connected components) separated by spaces, in Arabic handwritten its spaces are divided into two types: the first type represents the spaces that separate two connected components of the same word (within-word), the second type a...
Chapter
The availability of diverse embedded sensors in modern smartphones has created exciting opportunities for developing context-aware services and applications, such as Human activity recognition (HAR) in healthcare and smart buildings. However, recognizing human activities using smartphones remains a challenging task and requires efficient data minin...
Chapter
A routing protocol, in Mobile ad hoc networks (MANETs) use global information about the network topology and communication links to handle the data exchange between communication nodes. Several architectures and protocols have been defined to optimize transmission data between nodes. OLSR (Optimized Link State Routing) was proposed owing to Multipo...
Conference Paper
The availability of diverse embedded sensors in modern smartphones has created exciting opportunities for developing context-aware services and applications, such as Human activity recognition (HAR) in healthcare and smart buildings. However, recognizing human activities using smartphones remains a challenging task and requires efficient data proce...
Conference Paper
Words are often a succession of sub-words (characters, connected components) separated by spaces, in Arabic handwritten its spaces are divided into two types: the first type represents the spaces that separate two connected components of the same word (within-word). the second type are spaces that separate two connected components from two differen...
Conference Paper
This work represents a study of Internet of Things (IoT) technology. An intelligent solution that aims to facilitate the daily life. Its ecosystem based on the use of specific network protocols that facilitate the operation of transporting. Reliable transfer and the energy consumption characterize these protocols. Several platforms developed design...
Article
Full-text available
Smartphone-based Human Activity Recognition (SHAR) applications better performs if implemented in an online manner on continuous data streams. The selection of learning approaches highly impacts the performance of SHAR applications regarding key cost criteria such as: energy, memory and time efficiency. Stream learning is performed to achieve multi...
Conference Paper
View the large amount of data presented in the web pages, there is a great focus of different organizations and companies, to gather this information to use them in their best interest. This is achieved through Web mining which uses the techniques and algorithms of Data Mining to extract information and knowledge directly from the Web. The Web data...
Conference Paper
Business Intelligence is the result of the data analysis applications and technologies with the intention of providing a global view of the activities to an organization managers so as to facilitate their decision-making. When it comes to a collective decision, the contribution of business intelligence systems becomes crucial. In Morocco, and parti...
Article
Full-text available
The availability of diverse and powerful sensors embedded in modern Smartphones/mobile devices has created exciting opportunities for developing context-aware applications. Although there is good capacity for collecting and classifying human activity data with such devices, data pre-processing and model building techniques that achieve this goal ar...
Chapter
Full-text available
The open nature of wireless medium, low processing power, wireless connectivity, changing topology, limited resources and hostile deployment of nodes makes WSN easy for outsider attackers to interrupt the legitimate traffic. This leads to various types of security threats among them active black hole attack in which all received data packets are dr...
Article
Full-text available
In this paper, we propose an energy-efficient joint video encoding and transmission framework for network lifetime extension, under an end-to-end video quality constraint in the Wireless Video Sensor Networks (WVSN). This framework integrates an energy-efficient and adaptive intra-only video encoding scheme based on the H.264/AVC standard, that out...
Article
Full-text available
Wireless video sensor networks (WVSN) are energy constrained systems where deployed video nodes are capable of capturing the visual scene, performing local processing such as video compression, then routing the results toward the destination. In this paper, we consider the problem of minimizing the energy consumed by the video sensor node to encode...
Conference Paper
The availability of diverse and powerful sensors that are embedded in modern smartphones has created exciting opportunities for developing context-aware services and applications. For example, Human activity recognition (HAR) is an important feature that could be applied to many applications and services, such as those in healthcare and transportat...
Article
Full-text available
This paper proposes a novel and efficient method for traffic sign recognition based on combination of complementary and discriminative feature sets. The extracted features are the histogram of oriented gradients (HOG) feature, Gabor feature and Compound local binary pattern (CLBP) feature. The classification is performed using the extreme learning...
Article
Full-text available
In this work, a novel approach for texture classification is proposed. We present a highly discriminative and simple descriptor to achieve feature learning and classification simultaneously for texture classification. The proposed method introduces the application of digital curvelet transform and explores feature reduction properties of locality s...
Conference Paper
Full-text available
Les Systèmes d'Information Géographique ont une importance capitale pour la collecte, l'analyse, l'organisation, le traitement et le partage des données géospatiales. Les SIG au sein des établissements publics ou privés viennent pour soutenir la prise de décision, vu l'apport stratégique de la cartographie. Pour les scientifiques, les SIG permetten...
Conference Paper
Full-text available
Morocco undergoes an important evolution with the adoption of the new constitution, that includes in Article 27 the right of access to public information. In this context the role of spatial data infrastructure became important, to improve accessibility, availability and sharing water information between actors concerned with water resources manage...
Conference Paper
Full-text available
L'automatisation informatique des tâches répétitives est devenue une priorité des organismes, dont le but est d'augmenter la productivité des équipes, et répondre aux sollicitations des utilisateurs dans un meilleur délai. Néanmoins, la problématique du traitement et d'analyse des données massives (Big Data) pose de nouveaux défis aux équipes respo...
Article
Full-text available
In this work a new traffic sign recognition method by integrating color information based on Steerable Pyramid Transform (SPT) and Extreme Learning Machine (ELM) is introduced. The main contribution of this paper is to explore the usefulness of SPT at different color spaces in a traffic sign recognition framework. Each color traffic sign image is d...
Article
Full-text available
In this work, a simple and novel approach for breast cancer diagnosis is proposed. We present a highly discriminative and simple descriptor to differentiate between malignant and benign mammogram abnormalities. The proposed method introduces the application of digital curvelet transform and explores feature reduction properties of locality sensitiv...
Article
The performance evaluation and comparison of any proposed medium access control (MAC) protocol with existing MAC protocol is not always an easy step. Seen that, the re-implementation of existing MAC protocols that will be used in comparison takes significant time. As well, there are points that limit the exploitation of the results of an evaluation...
Article
Full-text available
The structure and constraints of mobile Ad Hoc networks (MANETs) influence negatively the quality of service in the network. This negative aspect increases as the network becomes larger and denser. The application of the mobile grouping technique (clustering) in MANETs significantly improves the management of their resources and routing performance...
Data
Full-text available
Les infrastructures de données spatiales(IDS)facilitentl’accès et la disponibilité des données. La mis en place de ces IDS au sein d’un environnement universitaire, contribuerait à surmonterl’obstacle de l’accessibilité et la disponibilité des données pour les universitaires (Etudiants, Doctorants, Docteurs et Professeurs), constaté lors des divers...
Conference Paper
Full-text available
A spatial data infrastructures facilitates data accessibility and availability. These basics functionalities are a very important problematic for all Moroccan academics (Students, PhD students, PhD and Professors), as demonstrated by many survey. In this paper, we present an SDI overview, then how we can implement a SDI in academic environment by u...
Conference Paper
Full-text available
L'équilibre entre le confort thermique des occupants et l'efficacité énergétique est l’objectif principal des stratégies de contrôle de la température dans les systèmes de chauffage, de ventilation et de climatisation (CVC) dans les bâtiments. Au début de la présente synthèse, la crise de l'énergie liée aux bâtiments est définie à l'égard du confor...
Article
Multi-Point Relays selection have the greatest importance in the function of OLSR protocol. A highly efficient selection of MPR allows the best optimization and network scalability. This paper presents a novel mechanism for the OLSR routing protocol. This new mechanism aims at improving an efficient selection of MPR in optimized link state routing....
Article
Full-text available
For Moroccan academics the availability and accessibility to water data is not so easy. Moreover, the 27 article from new version of Moroccan constitution adopted in 2011, establish right for all citizen to access to public information. But, in reality academics found many obstacles to access to water information. In this paper, we present and disc...
Conference Paper
Full-text available
Processing data generated from Wireless Sensor Networks (WSNs) has raised new research challenges over the last few years due to the huge amount of data to be managed continuously and at a very high rate. Extensive data generated by numbers of nodes in WSNs needs to be analyzed and processed in order to extract information that is meaningful to the...
Technical Report
Dans le présent document, une taxonomie des Smart Homes est présentée. Trois catégories principales sont identifiées ; à savoir les maisons « contrôlables », les maisons « programmables » et les maisons « intelligentes ». Ces catégories sont également organisées en un modèle qui prédéfinit l'évolution des maisons selon les améliorations que chacune...
Technical Report
Full-text available
Le concept des maisons intelligentes ou « Smart homes » existe depuis de nombreuses années et a joué un rôle très important dans la conception et la mise en œuvre des maisons du futur. Les premières recherches se sont concentrées sur le contrôle des appareils ménagers, mais les tendances actuelles sont entrain d’aller vers la création de la maison...