Yousef Farhaoui
Moulay Ismail University

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Application of machine learning algorithms for predicting outcomes of accident cases in Moroccan courts Aissa Haidar; Tarik Ahajjam; Imad Zeroual; Yousef Farhaoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 2: May 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i2.pp1103-1108

Abstract

Due to the large number of legal cases, the processing of them by the courts is generally very slow. Among these cases, we find accidents cases, which require a great speed of judgment to compensate the victims of those accidents. To this end, we thought of exploiting the possibilities offered by machine learning in order to simulate the work of judges and contribute to speeding up the time of decision. Further, we applied different machine learning algorithms, such as linear regression, decision trees, and random forests. According to the results achieved, the Random Forest is the most perfect model for with the utmost accuracy about 91.05%
SIP Authentication Protocols Based On Elliptic Curve Cryptography: Survey and comparison Mourade Azrour; Mohammed Ouanan; Yousef Farhaoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 1: October 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v4.i1.pp231-239

Abstract

Session Initiation Protocol (SIP) is the most popular signaling protocol using in order to establish, modify and terminate the session multimedia between different participants. It was selected by the Third Generation Project Partnership (3GPP) as a multimedia application protocol in 3G mobile networks. SIP is the protocol currently used for signaling ToIP calls.  The security of SIP is becoming more and more important. Authentication is the most important security service required by SIP. To ensure a secured communication, many SIP authentication protocols have been proposed. This work provides an overview of the proposed schemes based on elliptic curve cryptography. Those proposed schemes are analyzed in security consideration and the computational cost.
Intrusion Prevention System Inspired Immune Systems Yousef Farhaoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 1: April 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i1.pp168-179

Abstract

In view of new communication and information technologies that appeared with the emergence of networks and Internet, the computer security became a major challenge, and works in this research axis are increasingly numerous. Various tools and mechanisms are developed in order to guarantee a safety level up to the requirements of modern life. Among them, intrusion detection and prevention systems (IDPS) intended to locate activities or abnormal behaviors suspect to be detrimental to the correct operation of the system. The purpose of this work is the design and the realization of an IDPS inspired from natural immune systems. The study of biological systems to get inspired from them for the resolution of computer science problems is an axis of the artificial intelligence field which gave rise to robust and effective methods by their natural function, the immune systems aroused the interest of researchers in the intrusion detection field, taking into account the similarities of NIS (Natural Immune System) and IDPS objectives. Within the framework of this work, we conceived an IDPS inspired from natural immune system and implemented by using a directed approach. A platform was developed and tests were carried out in order to assess our system performances.