said desouki - Academia.edu (original) (raw)
Papers by said desouki
Journal of Big Data, 2019
Recently, we have seen lots of real-life examples of attacks' huge impacts in different domains s... more Recently, we have seen lots of real-life examples of attacks' huge impacts in different domains such as politics and economics. Hacking has become more critical and more dangerous than ever before. The number of hacking attacks is growing exponentially every few months. That means signature-based IDS is not useful anymore as we cannot update it with new signatures every few minutes. Also with developing technologies attacks become more sophisticated, APT attacks are more common than ever before.
Journal of Big Data
Natural language processing has witnessed remarkable progress with the advent of deep learning te... more Natural language processing has witnessed remarkable progress with the advent of deep learning techniques. Text summarization, along other tasks like text translation and sentiment analysis, used deep neural network models to enhance results. The new methods of text summarization are subject to a sequence-to-sequence framework of encoder–decoder model, which is composed of neural networks trained jointly on both input and output. Deep neural networks take advantage of big datasets to improve their results. These networks are supported by the attention mechanism, which can deal with long texts more efficiently by identifying focus points in the text. They are also supported by the copy mechanism that allows the model to copy words from the source to the summary directly. In this research, we are re-implementing the basic summarization model that applies the sequence-to-sequence framework on the Arabic language, which has not witnessed the employment of this model in the text summariz...
Journal of Big Data
Anomaly-based Intrusion Detection System (IDS) has been a hot research topic because of its abili... more Anomaly-based Intrusion Detection System (IDS) has been a hot research topic because of its ability to detect new threats rather than only memorized signatures threats of signature-based IDS. Especially after the availability of advanced technologies that increase the number of hacking tools and increase the risk impact of an attack. The problem of any anomaly-based model is its high false-positive rate. The high false-positive rate is the reason why anomaly IDS is not commonly applied in practice. Because anomaly-based models classify an unseen pattern as a threat where it may be normal but not included in the training dataset. This type of problem is called overfitting where the model is not able to generalize. Optimizing Anomaly-based models by having a big training dataset that includes all possible normal cases may be an optimal solution but could not be applied in practice. Although we can increase the number of training samples to include much more normal cases, still we need...
Journal of Big Data
With the growing use of information technology in all life domains, hacking has become more negat... more With the growing use of information technology in all life domains, hacking has become more negatively effective than ever before. Also with developing technologies, attacks numbers are growing exponentially every few months and become more sophisticated so that traditional IDS becomes inefficient detecting them. This paper proposes a solution to detect not only new threats with higher detection rate and lower false positive than already used IDS, but also it could detect collective and contextual security attacks. We achieve those results by using Networking Chatbot, a deep recurrent neural network: Long Short Term Memory (LSTM) on top of Apache Spark Framework that has an input of flow traffic and traffic aggregation and the output is a language of two words, normal or abnormal. We propose merging the concepts of language processing, contextual analysis, distributed deep learning, big data, anomaly detection of flow analysis. We propose a model that describes the network abstract ...
Progress in Agricultural Engineering Sciences, 2013
نهدف في هذا البحث إلى تطبيق تقنية عنقدة الوثائق المتعددة المستويات Multi-Level Document Clusterin... more نهدف في هذا البحث إلى تطبيق تقنية عنقدة الوثائق المتعددة المستويات Multi-Level Document Clustering، إحدى التقنيات الهامة في التنقيب في النصوص Text Mining، على نص القرآن الكريم. قمنا باستخراج الكلمات المفتاحية من الآيات القرآنية وحساب التشابهات فيما بينها اعتماداً على هذه الكلمات، وتصنيفها ضمن مجموعات بحسب كلماتها المفتاحية وتشابهاتها، ثم قمنا بحساب التشابهات بين المجموعات وإنشاء مستويات أعلى إلى أن حصلنا على شجرة تصنيف هرمية تعبِّر عن توزع الآيات القرآنية وتجميعها بحسب كلماتها.
2006 2nd International Conference on Information & Communication Technologies, 2006
ABSTRACT Building the reporting portion of an information system is usually one of the most time ... more ABSTRACT Building the reporting portion of an information system is usually one of the most time consuming, tedious and endless tasks. We discuss here our experiences in building a complex reporting system. We present an approach for a dynamic report based on a careful design of the database, generic reports, and an easy flexible reporting front-end, to satisfy a large set of (we don't pretend to satisfy all) an information system reporting requirements.
Lecture Notes in Computer Science, 1997
... TIMC-IMAG Facult@ de M@decine de Grenoble 38706 La Tronche cedex - France e-mail: Said.Desouk... more ... TIMC-IMAG Facult@ de M@decine de Grenoble 38706 La Tronche cedex - France e-mail: Said.Desouki@imag.fr,(Ana,Michel).Simonet ... 3. P. Dechamboux and C. Roncancio: Peplom: an Object Oriented Database Pro-gramming Language Extended with Deductive Capabilities ...
Proceedings of 7th International Conference and Workshop on Database and Expert Systems Applications: DEXA 96, 1996
Active and deductive rules in databases and procedural attachment in knowledge bases are used as ... more Active and deductive rules in databases and procedural attachment in knowledge bases are used as mechanisms of computation of derived attributes. These research domains have become very closely related. The support of derivations in current active databases suffers from many semantic and technical problems. Active rules in their ECA (Event Condition Action) form are event oriented whereas derivations are naturally
Arabic Language Processing is gaining increasing importance all around the world. This language i... more Arabic Language Processing is gaining increasing importance all around the world. This language is spoken by nearly 300 millions in the Arab World, and is an interesting language for the 1.3 billion Muslims. Arabic is becoming also a focal point of interest in many universities all around the world. The positive aspect of this interest in Arabic -which was relatively
2011 International Conference on Innovations in Information Technology, 2011
Journal of Computer Sciences and Applications, 2013
Dictionaries are very essential resources that almost all Natural Language Processing (NLP) appli... more Dictionaries are very essential resources that almost all Natural Language Processing (NLP) applications use. Since language is constantly evolving, new words or new meanings to current words continuously appear. In order to keep a dictionary up-to-date, an enrichment process is needed to incorporate new vocabularies. In the last decade, a new approach of resources construction has emerged based on the collaboration between different users on the Web. In this paper, we present the Interactive Arabic Dictionary (IAD): a monolingual web-based dictionary. Initially based on the "Almuajam Alwasseet" dictionary, IAD provides the different meanings of Arabic words, with specific morphological and syntactical information, in addition to other related information such as example sentences, multimedia illustrations, associated words, semantic domains, expressions, linguistic avails, common mistakes. Authorized users can collaboratively enrich the content of the dictionary through the use of a "controlled process" to add or modify entries, meanings, or any kind of detailed information related to them. This "controlled process" consists of a suggestion-validation procedure in order to maintain the integrity of the dictionary. This enrichment process will expand the dictionary content, allowing its future exploitation in high level NLP applications.
2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008
Abstract Morphological analysis is an important step in the process of Arabic language processing... more Abstract Morphological analysis is an important step in the process of Arabic language processing which became a must in today's IT development. We present here a new approach for Arabic root extraction. Our algorithm outperforms most other morphological ...
damascusuniversity.edu.sy
... The letter The maximum index in prefixes The minimum index in suffixes Baa ' ' 3 La... more ... The letter The maximum index in prefixes The minimum index in suffixes Baa ' ' 3 Lam ' ' 5 Seen ' ' 4 Faa ' ' 2 Haa ' ' 3 Kaf ' ' 3 * Noon ' ' * * Meem ' ' * * In addition, the maximum length for any prefix or suffix is (len-2) where len is the length of the word. ...
Database and Expert Systems …, 1997
... TIMC-IMAG Facult@ de M@decine de Grenoble 38706 La Tronche cedex - France e-mail: Said.Desouk... more ... TIMC-IMAG Facult@ de M@decine de Grenoble 38706 La Tronche cedex - France e-mail: Said.Desouki@imag.fr,(Ana,Michel).Simonet ... 3. P. Dechamboux and C. Roncancio: Peplom: an Object Oriented Database Pro-gramming Language Extended with Deductive Capabilities ...
Journal of Big Data, 2019
Recently, we have seen lots of real-life examples of attacks' huge impacts in different domains s... more Recently, we have seen lots of real-life examples of attacks' huge impacts in different domains such as politics and economics. Hacking has become more critical and more dangerous than ever before. The number of hacking attacks is growing exponentially every few months. That means signature-based IDS is not useful anymore as we cannot update it with new signatures every few minutes. Also with developing technologies attacks become more sophisticated, APT attacks are more common than ever before.
Journal of Big Data
Natural language processing has witnessed remarkable progress with the advent of deep learning te... more Natural language processing has witnessed remarkable progress with the advent of deep learning techniques. Text summarization, along other tasks like text translation and sentiment analysis, used deep neural network models to enhance results. The new methods of text summarization are subject to a sequence-to-sequence framework of encoder–decoder model, which is composed of neural networks trained jointly on both input and output. Deep neural networks take advantage of big datasets to improve their results. These networks are supported by the attention mechanism, which can deal with long texts more efficiently by identifying focus points in the text. They are also supported by the copy mechanism that allows the model to copy words from the source to the summary directly. In this research, we are re-implementing the basic summarization model that applies the sequence-to-sequence framework on the Arabic language, which has not witnessed the employment of this model in the text summariz...
Journal of Big Data
Anomaly-based Intrusion Detection System (IDS) has been a hot research topic because of its abili... more Anomaly-based Intrusion Detection System (IDS) has been a hot research topic because of its ability to detect new threats rather than only memorized signatures threats of signature-based IDS. Especially after the availability of advanced technologies that increase the number of hacking tools and increase the risk impact of an attack. The problem of any anomaly-based model is its high false-positive rate. The high false-positive rate is the reason why anomaly IDS is not commonly applied in practice. Because anomaly-based models classify an unseen pattern as a threat where it may be normal but not included in the training dataset. This type of problem is called overfitting where the model is not able to generalize. Optimizing Anomaly-based models by having a big training dataset that includes all possible normal cases may be an optimal solution but could not be applied in practice. Although we can increase the number of training samples to include much more normal cases, still we need...
Journal of Big Data
With the growing use of information technology in all life domains, hacking has become more negat... more With the growing use of information technology in all life domains, hacking has become more negatively effective than ever before. Also with developing technologies, attacks numbers are growing exponentially every few months and become more sophisticated so that traditional IDS becomes inefficient detecting them. This paper proposes a solution to detect not only new threats with higher detection rate and lower false positive than already used IDS, but also it could detect collective and contextual security attacks. We achieve those results by using Networking Chatbot, a deep recurrent neural network: Long Short Term Memory (LSTM) on top of Apache Spark Framework that has an input of flow traffic and traffic aggregation and the output is a language of two words, normal or abnormal. We propose merging the concepts of language processing, contextual analysis, distributed deep learning, big data, anomaly detection of flow analysis. We propose a model that describes the network abstract ...
Progress in Agricultural Engineering Sciences, 2013
نهدف في هذا البحث إلى تطبيق تقنية عنقدة الوثائق المتعددة المستويات Multi-Level Document Clusterin... more نهدف في هذا البحث إلى تطبيق تقنية عنقدة الوثائق المتعددة المستويات Multi-Level Document Clustering، إحدى التقنيات الهامة في التنقيب في النصوص Text Mining، على نص القرآن الكريم. قمنا باستخراج الكلمات المفتاحية من الآيات القرآنية وحساب التشابهات فيما بينها اعتماداً على هذه الكلمات، وتصنيفها ضمن مجموعات بحسب كلماتها المفتاحية وتشابهاتها، ثم قمنا بحساب التشابهات بين المجموعات وإنشاء مستويات أعلى إلى أن حصلنا على شجرة تصنيف هرمية تعبِّر عن توزع الآيات القرآنية وتجميعها بحسب كلماتها.
2006 2nd International Conference on Information & Communication Technologies, 2006
ABSTRACT Building the reporting portion of an information system is usually one of the most time ... more ABSTRACT Building the reporting portion of an information system is usually one of the most time consuming, tedious and endless tasks. We discuss here our experiences in building a complex reporting system. We present an approach for a dynamic report based on a careful design of the database, generic reports, and an easy flexible reporting front-end, to satisfy a large set of (we don't pretend to satisfy all) an information system reporting requirements.
Lecture Notes in Computer Science, 1997
... TIMC-IMAG Facult@ de M@decine de Grenoble 38706 La Tronche cedex - France e-mail: Said.Desouk... more ... TIMC-IMAG Facult@ de M@decine de Grenoble 38706 La Tronche cedex - France e-mail: Said.Desouki@imag.fr,(Ana,Michel).Simonet ... 3. P. Dechamboux and C. Roncancio: Peplom: an Object Oriented Database Pro-gramming Language Extended with Deductive Capabilities ...
Proceedings of 7th International Conference and Workshop on Database and Expert Systems Applications: DEXA 96, 1996
Active and deductive rules in databases and procedural attachment in knowledge bases are used as ... more Active and deductive rules in databases and procedural attachment in knowledge bases are used as mechanisms of computation of derived attributes. These research domains have become very closely related. The support of derivations in current active databases suffers from many semantic and technical problems. Active rules in their ECA (Event Condition Action) form are event oriented whereas derivations are naturally
Arabic Language Processing is gaining increasing importance all around the world. This language i... more Arabic Language Processing is gaining increasing importance all around the world. This language is spoken by nearly 300 millions in the Arab World, and is an interesting language for the 1.3 billion Muslims. Arabic is becoming also a focal point of interest in many universities all around the world. The positive aspect of this interest in Arabic -which was relatively
2011 International Conference on Innovations in Information Technology, 2011
Journal of Computer Sciences and Applications, 2013
Dictionaries are very essential resources that almost all Natural Language Processing (NLP) appli... more Dictionaries are very essential resources that almost all Natural Language Processing (NLP) applications use. Since language is constantly evolving, new words or new meanings to current words continuously appear. In order to keep a dictionary up-to-date, an enrichment process is needed to incorporate new vocabularies. In the last decade, a new approach of resources construction has emerged based on the collaboration between different users on the Web. In this paper, we present the Interactive Arabic Dictionary (IAD): a monolingual web-based dictionary. Initially based on the "Almuajam Alwasseet" dictionary, IAD provides the different meanings of Arabic words, with specific morphological and syntactical information, in addition to other related information such as example sentences, multimedia illustrations, associated words, semantic domains, expressions, linguistic avails, common mistakes. Authorized users can collaboratively enrich the content of the dictionary through the use of a "controlled process" to add or modify entries, meanings, or any kind of detailed information related to them. This "controlled process" consists of a suggestion-validation procedure in order to maintain the integrity of the dictionary. This enrichment process will expand the dictionary content, allowing its future exploitation in high level NLP applications.
2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008
Abstract Morphological analysis is an important step in the process of Arabic language processing... more Abstract Morphological analysis is an important step in the process of Arabic language processing which became a must in today's IT development. We present here a new approach for Arabic root extraction. Our algorithm outperforms most other morphological ...
damascusuniversity.edu.sy
... The letter The maximum index in prefixes The minimum index in suffixes Baa ' ' 3 La... more ... The letter The maximum index in prefixes The minimum index in suffixes Baa ' ' 3 Lam ' ' 5 Seen ' ' 4 Faa ' ' 2 Haa ' ' 3 Kaf ' ' 3 * Noon ' ' * * Meem ' ' * * In addition, the maximum length for any prefix or suffix is (len-2) where len is the length of the word. ...
Database and Expert Systems …, 1997
... TIMC-IMAG Facult@ de M@decine de Grenoble 38706 La Tronche cedex - France e-mail: Said.Desouk... more ... TIMC-IMAG Facult@ de M@decine de Grenoble 38706 La Tronche cedex - France e-mail: Said.Desouki@imag.fr,(Ana,Michel).Simonet ... 3. P. Dechamboux and C. Roncancio: Peplom: an Object Oriented Database Pro-gramming Language Extended with Deductive Capabilities ...