Badir Hassan

Badir Hassan
Abdelmalek Essaâdi University | UAE · Department of Computer Science

Prof. HDR PhD Computer Engineering

About

128
Publications
89,690
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
418
Citations
Introduction
Hassan BADIR received Ph.D. degree in Database complex Design from Claude Bernard University Lyon1 in 2004. He studies in the fields of Computer Science, specifically Business Intelligence, Database, optimization, Cloud Computing and Big data. - Head of Data engineering & System TEAM - Head of Computer Science and Data Science Master - Head of High Specialized Master study on Compute Engineering, Security and Décision (MSIIDE) - Co-Investigator of Human Heredity and Health African Bioinformatics Network - Head and founding member of the Moroccan Innovation and New trends of Informatio System Society
Additional affiliations
January 2006 - January 2017
Abdelmalek Essaâdi University
Position
  • Reasearch Data & Systems Intelligence Team

Publications

Publications (128)
Chapter
An aggregate search system in the web of data makes it possible to search for pieces of information that may not exist entirely in a single source. It provides a unified query interface allowing access to several data sources. One of the major concerns while setting up an aggregate search system is adopting an adequate execution planning strategy,...
Chapter
One of the gravest concerns related to cloud computing pertains to data security. As businesses start on digital transformation, there is a clear requirement for privacy and data protection. Organizations today have more data, applications, and websites than they have ever had before. Data security has risen to the top of the priority list for clou...
Article
Data cleaning, also referred to as data cleansing, constitutes a pivotal phase in data processing subsequent to data collection. Its primary objective is to identify and eliminate incomplete data, duplicates, outdated information, anomalies, missing values, and errors. The influence of data quality on the effectiveness of machine learning (ML) mode...
Chapter
Data in real world is generally impure, it may contain outliers, incomplete, duplicated or obsolete values. Unclean data can direct to false conclusions and incorrect decisions. Thus it is crucial to clean the data efficiently. It is extensively known that the data quality affects machine learning (ML) model performances, data scientists spend cons...
Chapter
With the advance of high-throughput technologies, biological data sources are growing at an exponential rate. Data integration systems that combine data from heterogeneous sources help biologists to investigate the outcomes of their experiments. However, the heterogeneity of the different data sources, at the syntactic, schema, and semantic level,...
Chapter
Looking for information in the web of data presents a big challenge since data is distributed over a large number of RDF datasets, moreover, those datasets are remotely accessible via sources called SPARQL Endpoints where each source is being managed independently. A sought information may not be found by querying a single source, it could require...
Chapter
Community detection is omnipresent in all complex network analyses. It consists of dividing networks into a set of nodes that are highly interconnected. These groups of nodes allow a better understanding of the structure of the networks and widely help in complex network analysis. The community detection problem has been dealt with in many research...
Conference Paper
Time is present in every real world data model. Literature on the subject includes several time models, algebras, formal logics, and ontologies. Furthermore, Functional Programming, Type-level Programming and Algebra Driven Design are valuable assets for constructing systems that are consistent, composable, extensible, highly polymorphic, and predi...
Conference Paper
Full-text available
The detection of fake news was treated as a text classification problem. Over a hundred experiments were performed to find an appropriate combination of preprocessing and efficient neural network architecture, underlining some specificities and limitations of the Fake News detection problem over other research tasks. Different automatic learning ap...
Conference Paper
Roll on Roll o (RORO) port terminals involve two signi-cant types of processes, one is related to vehicle import, and the other concerns export. Each consists of a set of activities or services that the vehicles should visit before leaving the terminal. RORO terminals are characterized by being exible and complex systems. Also, they entail human in...
Book
Full-text available
The information systems development has undergone a profound change in recent years given the nature of the constraints and requirements which have been added following the success of the first systems. User needs have radically changed and interoperability of systems and data is more than any time an important requirement. The articulation betwee...
Article
Full-text available
Spatio-temporal events often describe the movements of an object in terms of space, time, and potential other attributes. Significant knowledge can be inferred by analysing them, either individually or atomically in form of trajectories. The trajectories can abstract additional properties and lead to deeper value. Moreover, external contextual info...
Presentation
Full-text available
This edition of Online IOSIS Meeting-days is to be held on the 4th of July in order to communicate the work progress of our PhD candidates, to the industrial community or scientific community or academic community through a panel of talks and conferences around recent advances in big data, Internet of things, distributed computing, large scale netw...
Article
Organizational perspectives of process mining consist of organizing and classifying the organization in terms of missions, roles as well as the interactions between the performers. Social mining is a branch of process mining that centralizes on construction social graphs based on the information held in the process. However, standard clustering app...
Article
With the constant rise of data volumes in many disciplines, various new Big data management systems have emerged to provide scalable tools for efficient data integration, processing, and analysis. In this article, we provide an overview of biomedical data integration systems focusing on ontology‐based semantic systems and Big data technologies base...
Chapter
Full-text available
Since the advent of social networks, Iot and Smartphones, spatial data are taken by storm by the Big Data phenomenon. Their management and analysis is a real challenge for traditional geographic information systems. Indeed, these solutions don’t respond effectively to big data constraints as they still rely on relational databases to manage and pro...
Conference Paper
Full-text available
The operational processes in logistics terminals determine their performance to a great extent. Process design is a complex procedure as it affects directly terminals operation. Therefore, building process model based on fact based insights is key. Hence, that is where process mining bridges the gap. In this paper, we exploit process mining techniq...
Book
Full-text available
The information systems development has undergone a profound change in recent years given the nature of the constraints and requirements which have been added following the success of the first systems. User needs have radically changed and interoperability of systems and data is more than any time an important requirement. The articulation between...
Article
Full-text available
Nowadays, distributed systems have become requisite to process and analyse the large amount of generated data. In particular, spatio-temporal data has known an exponential growth in the last years. This could be explained by the proliferation of indoor and outdoor tracking devices and the value of the knowledge that can be extracted from their anal...
Article
Full-text available
Supply chain management and complex logistics compel constant monitoring and handling of even more growing shipment chains. Therefore, it prompts the necessity to track and trace goods, for ensuring the control and management of the different logistics operations. In port terminals, tracking and tracing cargo is primitive for smooth and flexible se...
Chapter
Reactive Systems, especially in the Big Data Era, are undergoing a revolution. The increasing interest is due to their responsiveness, elasticity, resiliency and message-driven trait. In particular, a reactive message-driven system has one core feature asynchronous communication assuring a non-blocking behavior. A particular case of such systems is...
Chapter
With the increasing number of companies encompassing Big data, it is evident that the utmost challenge is to associate enormous quantity of event data to operational business processes that are extremely dynamic. To unbind the value of event data, events need to be firmly affiliated to the monitoring and control of operational processes. Neverthele...
Conference Paper
With the increasing number of companies encompassing Big data, it is evident that the utmost challenge is to associate enormous quantity of event data to operational business processes that are extremely dynamic. To unbind the value of event data, events need to be firmly affiliated to the monitoring and control of operational processes. Neverthele...
Conference Paper
Reactive Systems, especially in the Big Data Era, are undergoing a revolution. The increasing interest is due to their responsiveness, elasticity, resiliency and message-driven trait. In particular, a reactive message-driven system has one core feature asynchronous communication assuring a non-blocking behavior. A particular case of such systems is...
Article
Full-text available
The proliferation of indoor and outdoor tracking devices has led to a vast amount of spatial data. Each object can be described by several trajectories that, once analysed, can yield to significant knowledge. In particular, pattern analysis by clustering generic trajectories can give insight into objects sharing the same patterns. Still, sequential...
Book
Full-text available
Le développement des systèmes d'information a connu ces dernières années une mutation profonde vu la nature des contraintes et des exigences qui se sont rajoutées suite au succès des premiers systèmes. Les besoins des utilisateurs ont radicalement changé et l'interopérabilité des systèmes et des données est plus que n'importe quel moment une exigen...
Conference Paper
Full-text available
Seaborne trade is of prime importance in the world trade. It is tied into nearly all international supply chains. However, port logistics encounter planning problems at strategic, tactical, and operational levels. And this is largely attributable to the fact that it has not fully garnered the potential benefits to be acquired from big data analytic...
Conference Paper
Full-text available
In our time, there is a proliferation of outdoor and indoor location tracking devices. The knowledge inferred from the events generated by these location-aware devices is leveraged in many fields, e.g., business, finance, and politics. Each outcoming event is described via spatio-temporal attributes and other attributes related to the device nature...
Conference Paper
Full-text available
Big Data, with their potential to provide a valuable insight into the improved decision-making process, has recently garnered considerable benefit from both practitioners and academics. Given the heterogeneity, the scalability, the velocity, the veracity, and the value of data, Big Data has emerged where we face the major challenges of acquisition,...
Conference Paper
Full-text available
The web of data contains a great number of data sources providing an important variety of data, these data sources are distributed and managed independently. This distribution of data sources complicates the task of looking for information. In fact, the search for certain information requires a collection of data from various sources and this searc...
Conference Paper
Full-text available
In the big data era, large amounts of data are generated in response to the fast-growing and increasing number of users connected. With this amount of data, comes the need for storage and exploration solutions. Using a da-tawarehouse hosted in a cloud environment is an effective solution to face these rising demands. However, the challenge is how t...
Chapter
Full-text available
Proteomic patterns can help the diagnosis of the underlying pathological state of an organ such as the ovary, the lung, and the breast, to name few. An accurate classification of mass spectrometry is a crucial point to establish a reliable diagnosis and decision process regarding a type of cancer. A statistical methodology for classifying mass spec...
Chapter
Full-text available
Social networks are being leveraged by cyber-criminals to cover a wider range of victims. In Twitter, spammers create several bots and behave in different patterns according to their desired aims. Particularly, spammers can spread malicious links leading to malware or phishing sites. Achievable by engaging in social bonds or responding to trending...
Conference Paper
Full-text available
Due to its convenience in the maritime industry, Roll on/Roll off (RORO) ships are very important for offering smooth and flexible services required by the modern world of trade. RORO shipping engenders an enormous mass of data generated from a set of processes, deriving from diverse sources and arranged in different structures. The management and...
Conference Paper
Full-text available
Avec le nombre croissant d'utilisateurs connectés, les technologies numériques produisent de nombreux flux de données qui continuent d'augmen-ter à l'échelle mondiale. Par conséquent, de grandes quantités de données doivent être stockées et traitées à l'aide de services cloud qui tendent à soulever la question de protection des données et de la vie...
Conference Paper
Full-text available
Nous assistons ces dernières années à une évolution explosive des données spatiales issues des activités : appels, sms et navigation internet des abonnés Télécoms. Ce type de données arrivent sous divers formats et à une fré-quence de plus en plus élevée, à tel point que les exploiter relève du défi. En pratique, les opérateurs font face à un manqu...
Conference Paper
Full-text available
The web of data is a large collection of various data from different domains, these data are distributed on several sources which are heterogeneous and managed independently. Hence, a user may need to query multiple data sources to aggregate pieces of information. In this context, our work aims to set up a system that integrate fragments of informa...
Book
Full-text available
Les systèmes d'information décisionnels s'appuient sur les entrepôts de données (data warehouses) et l'analyse en ligne (on-line analytical processing 􏰆 OLAP), qui sont deux piliers de l'informatique décisionnelle (business intelligence 􏰆 BI), aujourd'hui confron- tés à de nouveaux dé􏰀s scienti􏰀ques et technologiques. En e􏰃et, avec l'avènement des...
Preprint
Cloud computing has grown strongly in recent years and has become very popular in today's IT landscape. Cloud service providers promise "infi-nite scalability and unlimited resources" combined with on-demand access everywhere. This allows cloud users to quickly forget that there is always a computing infrastructure behind a cloud. Due to virtualiza...
Article
Full-text available
NoSQL databases have recently been introduced as alternatives to traditional relational database management systems because of their capabilities in terms of storing data and query retrieval. Biological datasets can be modelled using various models, for example, graphs (protein-protein interaction) or documents (protein sequence information). Appli...
Article
Full-text available
Identifying the influential spreaders in complex networks is crucial to understand who is responsible for the spreading processes and the influence maximization through networks. Targeting these influential spreaders is significant for designing strategies for accelerating the propagation of information that is useful for various applications, such...
Article
Full-text available
The detections of inferences between multidimensional queries tend to be more sensitive than data separately. These combinations must be modeled in order to avoid the inference of unauthorized data. However, no work has dealt with inference management in the case of a user who combines two or more permissions. In this paper, we present our approach...
Article
Studying social influence in networks is crucial to understand how behavior spreads. An interesting number of theories were elaborated to analyze how innovations and trends get adopted. The traditional view assumes that a minority of members in a society possess qualities that make them exceptionally persuasive in spreading ideas to others. These e...
Conference Paper
Full-text available
La gestion des données spatiales dans les télécoms est devenue der-nièrement un vrai challenge pour les décideurs et les utilisateurs. Bien que des solutions commerciales existent pour la gestion de ces données à travers des architectures basées sur les modèles relationnels, il est à remarquer que ces approches existantes ne répondent pas efficacem...
Conference Paper
Full-text available
Data sets in the web of data are accessed via data sources providing information from different domains, these data sources, also called SPARQL endpoints, are heterogeneous and managed independently, which complicates their querying, besides, the response to certain queries needs to aggregate information from several sources. Our work aims to set u...
Conference Paper
Full-text available
Un entrepôt de données (ED) présente un facteur primordial de l'entreprise qui donne une vue clair sur ses activités et une source riche pour les décideurs. Il contient les données sensibles sur l'entreprisse et ses clients, et par consé- quence elles ne doivent pas être accessibles sans contrôle d’accès.(El ouazzani 2018) La solution de l’hébergem...
Book
Full-text available
The importance of Big Data for the scientific community, as well as for professionals, raises new interests and opens up new research tracks. The central focus of Data really attracts different communities around new research issues, and then creates new synergies. These communities are called upon to collaborate and cogitate together to understand...
Conference Paper
Full-text available
The harm caused by cyber-criminals is intractable, and the number of its victims raises in an exponential manner. Social media play a major role in this expansion by spreading the criminals' knowledge. Consequently, the concern of the detection of these cyber-criminals has become primal. Despite the effort, this issue has to the best of our knowled...
Conference Paper
Full-text available
Container Terminals are random and dynamic complex systems , involving vital processes that cause many decision problems related to logistics planning and control issues. Process mining is an advantageous approach to acquire a better knowledge about those processes by analyzing the recorded event data. In this paper, a state of the art and issues o...
Conference Paper
La gestion des données spatiales dans les télécoms est devenue der- nièrement un vrai challenge pour les décideurs et les utilisateurs. Bien que des solutions commerciales existent pour la gestion de ces données à travers des architectures basées sur les modèles relationnels, il est à remarquer que ces approches existantes ne répondent pas efficace...
Poster
Full-text available
Decision-support information systems notably rest on data warehouses and on-line analytical processing (OLAP), two pillars of business intelligence (BI) that are nowadays confronted to new scientific and technological challenges. Traditional data warehouses can indeed handle hundreds of terabytes of data, but hardly manage little-structured or unst...
Article
Full-text available
A data warehouse presents a rich source of information on the activities of the company and the privacy of individuals. So this source can be used as a very powerful mechanism for discovering the crucial information of company. Hence the importance of implementing security measures which guarantee the data confidentiality by establishing an access...
Article
NoSQL databases have recently been introduced as alternatives to traditional relational database management systems because of their capabilities in terms of storing data and query retrieval. Biological datasets can be modelled using various models, for example, graphs (protein-protein interaction) or documents (protein sequence information). Appli...
Thesis
Le Cloud Computing a connu une forte croissance au cours des dernières années et est devenu très populaire dans le paysage informatique actuel. Les fournisseurs des services Cloud promettent « une évolutivité infinie et des ressources illimitées» combinées à l’accès à la demande partout. Cela permet aux utilisateurs du Cloud d’oublier rapidement qu...
Conference Paper
Full-text available
Ce travail propose un système d'évaluation du trafic des carrefours giratoires, à base d'automates cellulaires et de gestion d'événements complexes. L'approche consolide deux modèles de simulation, le premier est de type LWR spécialisé pour les branches d'entrée et de sortie des carrefours, le second est fondé sur le modèle de Nagel et al. (Nagel e...
Conference Paper
Full-text available
The identification of clusters has been the point of interest in many fields; either as a subject of understanding, describing or predicting a phenomenon. However, real world problems surpass the crisp nature of the conventional clustering approaches. This led to the initialization of fuzzy clustering approaches. Another issue is faced in the Big D...
Book
Full-text available
INTIS 2017: La 6ème édition de la conférence Internationale sur l'Innovation et Nouvelles Tendances dans les Systèmes d'Information, poursuit ses engagements pour créer un potentiel d’échange « Connaissance, Ingénierie et Référentiels » pour partager les principaux concepts et les nouvelles théories consolidant les systèmes d’information émergents,...
Conference Paper
Full-text available
NoSQL data stores can serve as alternative to traditional relational database systems, particularly for handling big data biomedical applications. Applications that model their data using two or more simple NoSQL models are known as applications with polyglot persistence. Recently, a new family of multi-model data stores was introduced, integrating...
Conference Paper
Full-text available
Nowadays large amounts of data are generated in response to the fast-growing and increasing number of users connected. With this amount of data, comes the need for storage and exploration solutions. Using a cloud computing environment is an effective solution to face these rising issues. However, the challenge is how to analyze and interpret this d...
Conference Paper
Full-text available
Un Entrepôt de données (ED) regroupe les données sensibles de l'en-treprise et les données secrètes sur la vie privée des individus. Ce qui rend la gestion des accès à cette source une tâche difficile qui doit prendre en compte la détection des inférences possibles. Dans ce sens plusieurs auteurs ont pro-posé des méthodes pour faciliter la gestion...
Conference Paper
Full-text available
Internet of Things (IOT) is a set of devices that collect and share information directly between themselves and the Cloud, enable to collect, record, and analyze new data streams more quickly and accurately. However, integrating these smart objects into the Internet introduces several security issues that should be taken into account to protect the...
Conference Paper
Full-text available
In the big data era, the cloud computing services have been adopted to face the emergence of data that needs to be stored and processed properly. However, these services need to provide safety mechanisms to insure its secure adoption. Thus, several solutions have been proposed including the use of secure architectures by customers. In that context,...
Conference Paper
Full-text available
Cybercrimes commited by hackers and cyber-thefts cost financial institutions several billions of dollars each year. These actors often exploit the privileges of social networks which contain over billions of users to practice their harmful actions such as stealing other users credentials, posting spams, scamming, sharing their hacker tools and comm...
Research
Full-text available
Aims and Scope The importance of Big Data for the scientific community, as well as for professionals, raises new interests and opens up new research tracks. The central focus of Data really attracts different communities around new research issues, and then creates new synergies. These communities are called upon to collaborate and cogitate togethe...
Article
Full-text available
With the emergence of new technologies and the ubiquitous connecti-vity, large amounts of data are being generated everyday with the need to be stored properly and explored rapidly. In this context, the cloud computing services have been adopted to face these rising challenges. But in a cloud environment, data and the application are controlled by...
Conference Paper
Full-text available
With the emergence of new technologies and the ubiquitous connecti-vity, large amounts of data are being generated everyday with the need to be stored properly and explored rapidly. In this context, the cloud computing services have been adopted to face these rising challenges. But in a cloud environment, data and the application are controlled by...
Research
Full-text available
Le développement des systèmes d’information a connu ces dernières années une mutation profonde vu la nature des contraintes et des exigences qui se sont rajoutées suite au succès des premiers systèmes. Les besoins des utilisateurs ont radicalement changé et l’interopérabilité des systèmes et des données est plus que n’importe quel moment une exigen...
Article
Full-text available
Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leak...
Article
Full-text available
Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leak...
Conference Paper
Full-text available
Technological advances of computer science and data analysis are helping to provide continuously huge volumes of biological data, which are available on the web. Such advances involve and require powerful techniques for data integration to extract pertinent knowledge and information for a specific question. Biomedical exploration of these big data...
Book
Full-text available
International Workshop on Innovation and News Trends In Information Systems will bring together researchers and practitioners in cloud computing and data-intensive system design, Big Data, Mobile Data, programming, parallel algorithms, data management, scientific applications, and information-based applications to maximize performance, minimize cos...
Conference Paper
Full-text available
Cloud computing services have been adopted to provide the necessary tools and resources to face the emergence of data that needs to be stored and processed properly. However, these promising services, raise the issue of security and reliability in terms of data confidentiality, control and loss of intellectual property. In this work, we exploit the...
Conference Paper
A Survey of Semantic Integration Approaches in Bioinformatics
Conference Paper
Complex networks have provided significant strides for understanding complex systems. One of the most relevant features of graphs representing real systems is clustering, or community structure. Those networks play an important role in the dissemination of information and influence. The hubs or influential members may be even more critical to produ...
Conference Paper
Respect for privacy and data confidentiality in a company are two fundamentals that must be protected. However, a Data Warehouse can be used as a very powerful mechanism for discovering crucial information, hence the importance of implementing security measures which guarantee the data confidentiality by establishing an access control policy. In th...
Conference Paper
Aggregated search is promising paradigm for retrieving information of a set of federated, autonomous verticals. It is widely used in information retrieval applications such as search engine. Although it is relatively a new paradigm, it has drawn enormous research interests lately. Prominent search engines such as Google, Bing, have adopted the noti...
Conference Paper
Les systèmes complexes sont omniprésents, ils apparaissent dans une grande variété de scénarios, allant de système social à des systèmes biologiques et technologiques. Les réseaux complexes sont un outil puissant pour comprendre les différents mécanismes des systèmes complexes. Le clustering où la détection des communautés est l’une des caractérist...
Book
Full-text available
Les technologies des entrepôts de données et de l’analyse en ligne sont au coeur des systèmes décisionnels modernes. Consciente du rôle des recherches dans cette thématique, la communauté scientifique internationale ne cesse d'accorder une importance de plus en plus grandissante, voire privilégiée, à ce domaine ce qui s'est traduit par l'apparition...
Conference Paper
Complex networks are a powerful tool for understanding the mechanisms of various systems. These networks are complex graphs with high local density and low overall density. We are interested to study the problematic of community detection and more specifically the detection of leaders’ nodes in complex network. Those nodes have high connectivity wi...
Conference Paper
Complex networks are a powerful tool for understanding the mechanisms of various systems. These networks are complex graphs with high local density and low overall density. We are interested to study the problematic of community detection and more specifically the detection of leaders’ nodes in complex network. Those nodes have high connectivity wi...
Conference Paper
In the recent years, social networks emerged rapidly and it's has become more complex. Social networks play an important role in the dissemination of information and the spread of influence. Several research studies are interested to the detection of the structure of complex networks, otherwise, to the community detection and leader detection. The...
Book
Full-text available
This book-proceedings contains a papers that were submitted for INTIS 2014 – 15 in total. Each paper was reviewed by two independent academic reviewers.
Conference Paper
Full-text available
Un entrepôt de données ou Data Warehouse (DW) peut être utilisé comme un mécanisme très puissant pour découvrir les informations cruciales de l’entreprise. Il est donc important d’appliquer des mesures de sécurité qui garantissent la confidentialité des données qu’il contient. Dans ce sens, plusieurs propositions ont été présentées, néanmoins, auc...
Chapter
Full-text available
Article
The most common benchmarks for cloud computing are the Terasort benchmark and the YCSB benchmark. Although these benchmarks are quite useful, they were not designed for data warehouse systems and related OLAP technologies. The most prominent benchmarks for evaluating decision support systems are the various benchmarks issued by the Transaction Proc...

Network

Cited By