publications trouvées
Chemical composition and specific lipids profile of the cashew apple bagasse
Auteurs: KOUASSI Esaïe Kouadio Appiah, SORO Yaya, VACA-GARCIA Carlos ,YAO Kouassi Benjamin
Date publication: 2018
Journal: Journal inconnu
Cashew bagasse is a non-upgraded agricultural byproduct. In this study, three categories of samples consist of red apple skin (R), yellow apple skin (Y), and a mixture of the pulps (P) …
Evaluation of the Effects of Aqueous Extract of Cnestis ferrruginea on Sexual Behaviour in Male Rats
Auteurs: Yaya Soro, Ahui Bitty Marie Louise, Coulibaly Sirabana, Séverin Koffi, Mian Jean Claude, raoré Flavien
Date publication: 2023-01-11
Journal: SASPR Edu International Pvt. Ltd
Cnestis ferruginea, a plant of the connaraceace family, is well known to the West African population, including that of Côte d'Ivoire, through its common use in traditional medicine. The leaves of Cnestis ferruginea are used in traditional African medicine to treat numerous pathologies, including infertility. The present study aims to evaluate the effects of the aqueous extract of Cnestis ferruginea leaves on sexual parameters in male rats. The sexual parameters (latency of mating, latency of intromission, latency of ejaculation and mean copulation interval) were assessed by the classical meth...
Économie et Gestion Lire l'article
Evaluation of the Effects of Aqueous Extract of Cnestis ferrruginea on Sexual Behaviour in Male Rats
Auteurs: Yaya Soro, Ahui Bitty Marie Louise, Coulibaly Sirabana, Séverin Koffi, Mian Jean Claude, raoré Flavien
Date publication: 2023-01-11
Journal: SASPR Edu International Pvt. Ltd
Cnestis ferruginea, a plant of the connaraceace family, is well known to the West African population, including that of Côte d'Ivoire, through its common use in traditional medicine. The leaves of Cnestis ferruginea are used in traditional African medicine to treat numerous pathologies, including infertility. The present study aims to evaluate the effects of the aqueous extract of Cnestis ferruginea leaves on sexual parameters in male rats. The sexual parameters (latency of mating, latency of intromission, latency of ejaculation and mean copulation interval) were assessed by the classical meth...
Économie et Gestion Lire l'article
Evaluation of the Effects of Aqueous Extract of Cnestis ferrruginea on Sexual Behaviour in Male Rats
Auteurs: Yaya Soro, Ahui Bitty Marie Louise, Coulibaly Sirabana, Séverin Koffi, Mian Jean Claude, raoré Flavien
Date publication: 2023-01-11
Journal: SASPR Edu International Pvt. Ltd
Cnestis ferruginea, a plant of the connaraceace family, is well known to the West African population, including that of Côte d'Ivoire, through its common use in traditional medicine. The leaves of Cnestis ferruginea are used in traditional African medicine to treat numerous pathologies, including infertility. The present study aims to evaluate the effects of the aqueous extract of Cnestis ferruginea leaves on sexual parameters in male rats. The sexual parameters (latency of mating, latency of intromission, latency of ejaculation and mean copulation interval) were assessed by the classical meth...
Économie et Gestion Lire l'article
Evaluation of the Effects of Aqueous Extract of Cnestis ferrruginea on Sexual Behaviour in Male Rats
Auteurs: Yaya Soro, Ahui Bitty Marie Louise, Coulibaly Sirabana, Séverin Koffi, Mian Jean Claude, raoré Flavien
Date publication: 2023-01-11
Journal: SASPR Edu International Pvt. Ltd
Cnestis ferruginea, a plant of the connaraceace family, is well known to the West African population, including that of Côte d'Ivoire, through its common use in traditional medicine. The leaves of Cnestis ferruginea are used in traditional African medicine to treat numerous pathologies, including infertility. The present study aims to evaluate the effects of the aqueous extract of Cnestis ferruginea leaves on sexual parameters in male rats. The sexual parameters (latency of mating, latency of intromission, latency of ejaculation and mean copulation interval) were assessed by the classical meth...
Économie et Gestion Lire l'article
Evaluation of the Effects of Aqueous Extract of Cnestis ferrruginea on Sexual Behaviour in Male Rats
Auteurs: Yaya Soro, Ahui Bitty Marie Louise, Coulibaly Sirabana, Séverin Koffi, Mian Jean Claude, raoré Flavien
Date publication: 2023-01-11
Journal: SASPR Edu International Pvt. Ltd
Cnestis ferruginea, a plant of the connaraceace family, is well known to the West African population, including that of Côte d'Ivoire, through its common use in traditional medicine. The leaves of Cnestis ferruginea are used in traditional African medicine to treat numerous pathologies, including infertility. The present study aims to evaluate the effects of the aqueous extract of Cnestis ferruginea leaves on sexual parameters in male rats. The sexual parameters (latency of mating, latency of intromission, latency of ejaculation and mean copulation interval) were assessed by the classical meth...
Économie et Gestion Lire l'article
Evaluation of the Effects of Aqueous Extract of Cnestis ferrruginea on Sexual Behaviour in Male Rats
Auteurs: Yaya Soro, Ahui Bitty Marie Louise, Coulibaly Sirabana, Séverin Koffi, Mian Jean Claude, raoré Flavien
Date publication: 2023-01-11
Journal: SASPR Edu International Pvt. Ltd
Cnestis ferruginea, a plant of the connaraceace family, is well known to the West African population, including that of Côte d'Ivoire, through its common use in traditional medicine. The leaves of Cnestis ferruginea are used in traditional African medicine to treat numerous pathologies, including infertility. The present study aims to evaluate the effects of the aqueous extract of Cnestis ferruginea leaves on sexual parameters in male rats. The sexual parameters (latency of mating, latency of intromission, latency of ejaculation and mean copulation interval) were assessed by the classical meth...
Économie et Gestion Lire l'article
Kinetics of Potentially Toxic Elements decontamination of soil at Komabangou gold mine using indigenous plants
Auteurs: Soumaila ALASSANE-BOUKARI, Abdourahamane TANKARI-DAN-BADJO, Ibrahim MALAM-MAMANE-SANI, Valer Micle, Yaya Soro, Przemyslaw Charzyynski, Ibrahim ELHADJI-DAOU
Date publication: 2025-03-01
Journal: Elsevier BV
Non classifié Lire l'article
Kinetics of Potentially Toxic Elements decontamination of soil at Komabangou gold mine using indigenous plants
Auteurs: Soumaila ALASSANE-BOUKARI, Abdourahamane TANKARI-DAN-BADJO, Ibrahim MALAM-MAMANE-SANI, Valer Micle, Yaya Soro, Przemyslaw Charzyynski, Ibrahim ELHADJI-DAOU
Date publication: 2025-03-01
Journal: Elsevier BV
Non classifié Lire l'article
Kinetics of Potentially Toxic Elements decontamination of soil at Komabangou gold mine using indigenous plants
Auteurs: Soumaila ALASSANE-BOUKARI, Abdourahamane TANKARI-DAN-BADJO, Ibrahim MALAM-MAMANE-SANI, Valer Micle, Yaya Soro, Przemyslaw Charzyynski, Ibrahim ELHADJI-DAOU
Date publication: 2025-03-01
Journal: Elsevier BV
Non classifié Lire l'article
Kinetics of Potentially Toxic Elements decontamination of soil at Komabangou gold mine using indigenous plants
Auteurs: Soumaila ALASSANE-BOUKARI, Abdourahamane TANKARI-DAN-BADJO, Ibrahim MALAM-MAMANE-SANI, Valer Micle, Yaya Soro, Przemyslaw Charzyynski, Ibrahim ELHADJI-DAOU
Date publication: 2025-03-01
Journal: Elsevier BV
Non classifié Lire l'article
Kinetics of Potentially Toxic Elements decontamination of soil at Komabangou gold mine using indigenous plants
Auteurs: Soumaila ALASSANE-BOUKARI, Abdourahamane TANKARI-DAN-BADJO, Ibrahim MALAM-MAMANE-SANI, Valer Micle, Yaya Soro, Przemyslaw Charzyynski, Ibrahim ELHADJI-DAOU
Date publication: 2025-03-01
Journal: Elsevier BV
Non classifié Lire l'article
Kinetics of Potentially Toxic Elements decontamination of soil at Komabangou gold mine using indigenous plants
Auteurs: Soumaila ALASSANE-BOUKARI, Abdourahamane TANKARI-DAN-BADJO, Ibrahim MALAM-MAMANE-SANI, Valer Micle, Yaya Soro, Przemyslaw Charzyynski, Ibrahim ELHADJI-DAOU
Date publication: 2025-03-01
Journal: Elsevier BV
Non classifié Lire l'article
Kinetics of Potentially Toxic Elements decontamination of soil at Komabangou gold mine using indigenous plants
Auteurs: Soumaila ALASSANE-BOUKARI, Abdourahamane TANKARI-DAN-BADJO, Ibrahim MALAM-MAMANE-SANI, Valer Micle, Yaya Soro, Przemyslaw Charzyynski, Ibrahim ELHADJI-DAOU
Date publication: 2025-03-01
Journal: Elsevier BV
Non classifié Lire l'article
Physicochemical study of kernel oils from ten varieties of Mangifera indica (Anacardiaceae) cultivated in Cote dIvoire
Auteurs: Kassi Amian Brise Benjamin, Yaya Soro, N Emmanuel, S. Siaka
Date publication: 2019-07-30
Journal: Academic Journals
Mango consumers only use pulp and consider the kernel as wastes. This study aims to valorize the kernel of mango (Mangifera indica). In this study, the kernel of ten mango varieties (Ruby, Kent, Retard, Key, Assabony, Smith tête de chat, Smith normal, Palmer, Governeur and Aravia) collected at Yamoussoukro in the center of Cote d'Ivoire were used. The oils of these kernels were extracted by maceration method. Their physicochemical properties were determinate using standard methods. The yields of oils extracted are higher than 10%. The acid value of these oils varies from 2.50±0.25 to 27.06±0.3...
Sciences de la Santé Lire l'article
Physicochemical study of kernel oils from ten varieties of Mangifera indica (Anacardiaceae) cultivated in Cote dIvoire
Auteurs: Kassi Amian Brise Benjamin, Yaya Soro, N Emmanuel, S. Siaka
Date publication: 2019-07-30
Journal: Academic Journals
Mango consumers only use pulp and consider the kernel as wastes. This study aims to valorize the kernel of mango (Mangifera indica). In this study, the kernel of ten mango varieties (Ruby, Kent, Retard, Key, Assabony, Smith tête de chat, Smith normal, Palmer, Governeur and Aravia) collected at Yamoussoukro in the center of Cote d'Ivoire were used. The oils of these kernels were extracted by maceration method. Their physicochemical properties were determinate using standard methods. The yields of oils extracted are higher than 10%. The acid value of these oils varies from 2.50±0.25 to 27.06±0.3...
Sciences de la Santé Lire l'article
Physicochemical study of kernel oils from ten varieties of Mangifera indica (Anacardiaceae) cultivated in Cote dIvoire
Auteurs: Kassi Amian Brise Benjamin, Yaya Soro, N Emmanuel, S. Siaka
Date publication: 2019-07-30
Journal: Academic Journals
Mango consumers only use pulp and consider the kernel as wastes. This study aims to valorize the kernel of mango (Mangifera indica). In this study, the kernel of ten mango varieties (Ruby, Kent, Retard, Key, Assabony, Smith tête de chat, Smith normal, Palmer, Governeur and Aravia) collected at Yamoussoukro in the center of Cote d'Ivoire were used. The oils of these kernels were extracted by maceration method. Their physicochemical properties were determinate using standard methods. The yields of oils extracted are higher than 10%. The acid value of these oils varies from 2.50±0.25 to 27.06±0.3...
Sciences de la Santé Lire l'article
Physicochemical study of kernel oils from ten varieties of Mangifera indica (Anacardiaceae) cultivated in Cote dIvoire
Auteurs: Kassi Amian Brise Benjamin, Yaya Soro, N Emmanuel, S. Siaka
Date publication: 2019-07-30
Journal: Academic Journals
Mango consumers only use pulp and consider the kernel as wastes. This study aims to valorize the kernel of mango (Mangifera indica). In this study, the kernel of ten mango varieties (Ruby, Kent, Retard, Key, Assabony, Smith tête de chat, Smith normal, Palmer, Governeur and Aravia) collected at Yamoussoukro in the center of Cote d'Ivoire were used. The oils of these kernels were extracted by maceration method. Their physicochemical properties were determinate using standard methods. The yields of oils extracted are higher than 10%. The acid value of these oils varies from 2.50±0.25 to 27.06±0.3...
Sciences de la Santé Lire l'article
Etude comparative des caractéristiques phytochimiques des feuilles de Hyptis suaveolens avant et après extraction de l'huile essentielle.
Auteurs: SORO YAYA
Date publication: 2020
Journal: Journal inconnu
L'extraction des métabolites secondaires des feuilles de Hyptis suaveolens avant et après extraction de son huile essentielle a été réalisée par macération avec un mélange éthanol-…
Étude phytochimique et activité antimicrobienne d'extraits d'écorce de Ceiba pentandra (L.) Gaertn. (Bombacaceae) de Côte d'Ivoire sur Staphylococcus aureus résistant aux antibiotiques …
Auteurs: GK Julien , S. Sorho , S. Yaya , G. Nathalie , D. Mireille , DA Joseph
Date publication: 2015
Journal: Journal inconnu
L'émergence de bactéries multirésistantes aux antibiotiques est l'un des problèmes de santé de ces dernières décennies . Parmi les solutions à ce problème, on trouve les métabolites secondaires des plantes médicinales…
Étude phytochimique et activité antimicrobienne d'extraits d'écorce de Ceiba pentandra (L.) Gaertn. (Bombacaceae) de Côte d'Ivoire sur Staphylococcus aureus résistant aux antibiotiques …
Auteurs: GK Julien , S. Sorho , S. Yaya , G. Nathalie , D. Mireille , DA Joseph
Date publication: 2015
Journal: Journal inconnu
L'émergence de bactéries multirésistantes aux antibiotiques est l'un des problèmes de santé de ces dernières décennies . Parmi les solutions à ce problème, on trouve les métabolites secondaires des plantes médicinales…
Étude phytochimique et activité antimicrobienne d'extraits d'écorce de Ceiba pentandra (L.) Gaertn. (Bombacaceae) de Côte d'Ivoire sur Staphylococcus aureus résistant aux antibiotiques …
Auteurs: GK Julien , S. Sorho , S. Yaya , G. Nathalie , D. Mireille , DA Joseph
Date publication: 2015
Journal: Journal inconnu
L'émergence de bactéries multirésistantes aux antibiotiques est l'un des problèmes de santé de ces dernières décennies . Parmi les solutions à ce problème, on trouve les métabolites secondaires des plantes médicinales…
Étude phytochimique et activité antimicrobienne d'extraits d'écorce de Ceiba pentandra (L.) Gaertn. (Bombacaceae) de Côte d'Ivoire sur Staphylococcus aureus résistant aux antibiotiques …
Auteurs: GK Julien , S. Sorho , S. Yaya , G. Nathalie , D. Mireille , DA Joseph
Date publication: 2015
Journal: Journal inconnu
L'émergence de bactéries multirésistantes aux antibiotiques est l'un des problèmes de santé de ces dernières décennies . Parmi les solutions à ce problème, on trouve les métabolites secondaires des plantes médicinales…
Étude phytochimique et activité antimicrobienne d'extraits d'écorce de Ceiba pentandra (L.) Gaertn. (Bombacaceae) de Côte d'Ivoire sur Staphylococcus aureus résistant aux antibiotiques …
Auteurs: GK Julien , S. Sorho , S. Yaya , G. Nathalie , D. Mireille , DA Joseph
Date publication: 2015
Journal: Journal inconnu
L'émergence de bactéries multirésistantes aux antibiotiques est l'un des problèmes de santé de ces dernières décennies . Parmi les solutions à ce problème, on trouve les métabolites secondaires des plantes médicinales…
Étude phytochimique et activité antimicrobienne d'extraits d'écorce de Ceiba pentandra (L.) Gaertn. (Bombacaceae) de Côte d'Ivoire sur Staphylococcus aureus résistant aux antibiotiques …
Auteurs: GK Julien , S. Sorho , S. Yaya , G. Nathalie , D. Mireille , DA Joseph
Date publication: 2015
Journal: Journal inconnu
L'émergence de bactéries multirésistantes aux antibiotiques est l'un des problèmes de santé de ces dernières décennies . Parmi les solutions à ce problème, on trouve les métabolites secondaires des plantes médicinales…
Détermination des paramètres influençant le rendement d'extraction hydro-alcoolique des métabolites secondaires de Alchornea cordifolia (Euphorbiaceae) et …
Auteurs: Kouwelton Patrick Franck Olivier Koné, Yaya Soro et Sorho Siaka
Date publication: 2017
Journal: Journal inconnu
Une étude des facteurs influençant le rendement d'extraction a été déterminée sur les feuilles de Alchornea cordifolia et sur la plante entière de Tridax procumbens. Le plan de criblage a
Détermination des paramètres influençant le rendement d'extraction hydro-alcoolique des métabolites secondaires de Alchornea cordifolia (Euphorbiaceae) et …
Auteurs: Kouwelton Patrick Franck Olivier Koné, Yaya Soro et Sorho Siaka
Date publication: 2017
Journal: Journal inconnu
Une étude des facteurs influençant le rendement d'extraction a été déterminée sur les feuilles de Alchornea cordifolia et sur la plante entière de Tridax procumbens. Le plan de criblage a
State of major tunas stock in Atlantic East center zone, off Ivory Coast
Auteurs: Soro Yaya ,Ganga JanardhananThulasi , Ouattara N’Golo , N’da Konan
Date publication: 2018
Journal: Journal inconnu
Les technologies utilisées dans le secteur de la pêche sont devenues plus performantes, ne serait-ce que pour répondre aux besoins d'une population en constante augmentation. Cela a des conséquences considérables sur la gestion durable des ressources vivantes…
State of major tunas stock in Atlantic East center zone, off Ivory Coast
Auteurs: Soro Yaya ,Ganga JanardhananThulasi , Ouattara N’Golo , N’da Konan
Date publication: 2018
Journal: Journal inconnu
Les technologies utilisées dans le secteur de la pêche sont devenues plus performantes, ne serait-ce que pour répondre aux besoins d'une population en constante augmentation. Cela a des conséquences considérables sur la gestion durable des ressources vivantes…
State of major tunas stock in Atlantic East center zone, off Ivory Coast
Auteurs: Soro Yaya ,Ganga JanardhananThulasi , Ouattara N’Golo , N’da Konan
Date publication: 2018
Journal: Journal inconnu
Les technologies utilisées dans le secteur de la pêche sont devenues plus performantes, ne serait-ce que pour répondre aux besoins d'une population en constante augmentation. Cela a des conséquences considérables sur la gestion durable des ressources vivantes…
State of major tunas stock in Atlantic East center zone, off Ivory Coast
Auteurs: Soro Yaya ,Ganga JanardhananThulasi , Ouattara N’Golo , N’da Konan
Date publication: 2018
Journal: Journal inconnu
Les technologies utilisées dans le secteur de la pêche sont devenues plus performantes, ne serait-ce que pour répondre aux besoins d'une population en constante augmentation. Cela a des conséquences considérables sur la gestion durable des ressources vivantes…
Évaluation de l'activité antifongique des extraits totaux de Hugonia platysepala sur les pathogènes responsables de cryptococcoses et de candidoses chez les sujets infectés par le VIH
Auteurs: Ousmane Coulibaly Chiaye Yapo-Crezoit Bonouman Ira André Touré Yaya Soro
Date publication: 2020
Journal: Journal inconnu
Objectif : Évaluer in vitro l'activité antifongique des extraits totaux des feuilles de Hugonia platysepala, plante médicinale du sud-ouest de la Côte d'Ivoire afin de traiter à moindre coût, …
UNE NOUVELLE MÉTHODE DE SEUILAGE BASÉE SUR LA FONCTION EXPONENTIELLE POUR LA DÉTECTION DE POINTS SAILLANTS SPÉCULAIRES
Auteurs: Nouho OUATTARA, Armand Kodjo ATIAMPO, Ghislain Koffi PANDRY, Georges Laussane LOUM
Date publication: 2018
Journal: Journal inconnu
Dans de nombreuses applications, la présence de reflets spéculaires constitue une information perturbatrice. Son élimination dépend fortement de l'efficacité de sa détection. Dans cet article, nous proposons une nouvelle approche…
UNE NOUVELLE MÉTHODE DE SEUILAGE BASÉE SUR LA FONCTION EXPONENTIELLE POUR LA DÉTECTION DE POINTS SAILLANTS SPÉCULAIRES
Auteurs: Nouho OUATTARA, Armand Kodjo ATIAMPO, Ghislain Koffi PANDRY, Georges Laussane LOUM
Date publication: 2018
Journal: Journal inconnu
Dans de nombreuses applications, la présence de reflets spéculaires constitue une information perturbatrice. Son élimination dépend fortement de l'efficacité de sa détection. Dans cet article, nous proposons une nouvelle approche…
UNE NOUVELLE MÉTHODE DE SEUILAGE BASÉE SUR LA FONCTION EXPONENTIELLE POUR LA DÉTECTION DE POINTS SAILLANTS SPÉCULAIRES
Auteurs: Nouho OUATTARA, Armand Kodjo ATIAMPO, Ghislain Koffi PANDRY, Georges Laussane LOUM
Date publication: 2018
Journal: Journal inconnu
Dans de nombreuses applications, la présence de reflets spéculaires constitue une information perturbatrice. Son élimination dépend fortement de l'efficacité de sa détection. Dans cet article, nous proposons une nouvelle approche…
UNE NOUVELLE MÉTHODE DE SEUILAGE BASÉE SUR LA FONCTION EXPONENTIELLE POUR LA DÉTECTION DE POINTS SAILLANTS SPÉCULAIRES
Auteurs: Nouho OUATTARA, Armand Kodjo ATIAMPO, Ghislain Koffi PANDRY, Georges Laussane LOUM
Date publication: 2018
Journal: Journal inconnu
Dans de nombreuses applications, la présence de reflets spéculaires constitue une information perturbatrice. Son élimination dépend fortement de l'efficacité de sa détection. Dans cet article, nous proposons une nouvelle approche…
Une nouvelle approche d'inpainting d'image basée sur l'algorithme Criminisi
Auteurs: Nouho Ouattara , Georges Laussane Loum , Ghislain Koffi Pandry , Armand Kodjo Atiampo
Date publication: 2019
Journal: Journal inconnu
Dans les méthodes de retouche par patchs, l'ordre de remplissage des zones à restaurer est primordial. Cet ordre est défini par une fonction de priorité intégrant deux paramètres : …
Une nouvelle approche d'inpainting d'image basée sur l'algorithme Criminisi
Auteurs: Nouho Ouattara , Georges Laussane Loum , Ghislain Koffi Pandry , Armand Kodjo Atiampo
Date publication: 2019
Journal: Journal inconnu
Dans les méthodes de retouche par patchs, l'ordre de remplissage des zones à restaurer est primordial. Cet ordre est défini par une fonction de priorité intégrant deux paramètres : …
Une nouvelle approche d'inpainting d'image basée sur l'algorithme Criminisi
Auteurs: Nouho Ouattara , Georges Laussane Loum , Ghislain Koffi Pandry , Armand Kodjo Atiampo
Date publication: 2019
Journal: Journal inconnu
Dans les méthodes de retouche par patchs, l'ordre de remplissage des zones à restaurer est primordial. Cet ordre est défini par une fonction de priorité intégrant deux paramètres : …
Une nouvelle approche d'inpainting d'image basée sur l'algorithme Criminisi
Auteurs: Nouho Ouattara , Georges Laussane Loum , Ghislain Koffi Pandry , Armand Kodjo Atiampo
Date publication: 2019
Journal: Journal inconnu
Dans les méthodes de retouche par patchs, l'ordre de remplissage des zones à restaurer est primordial. Cet ordre est défini par une fonction de priorité intégrant deux paramètres : …
Détection des fausses nouvelles dans les médias sociaux : approches hybrides d'apprentissage profond
Auteurs: Fatoumata Wongbé Rosalie Tokpa , Beman Hamidja Kamagaté , Vincent Monsan , Souleymane Oumtanaga
Date publication: 2023
Journal: Journal inconnu
Internet permet la création et la publication de contenus générés par l'utilisateur, ainsi que l'interaction entre utilisateurs. Compte tenu de l'accessibilité de ces moyens de communication et de leur…
Détection des fausses nouvelles dans les médias sociaux : approches hybrides d'apprentissage profond
Auteurs: Fatoumata Wongbé Rosalie Tokpa , Beman Hamidja Kamagaté , Vincent Monsan , Souleymane Oumtanaga
Date publication: 2023
Journal: Journal inconnu
Internet permet la création et la publication de contenus générés par l'utilisateur, ainsi que l'interaction entre utilisateurs. Compte tenu de l'accessibilité de ces moyens de communication et de leur…
Détection des fausses nouvelles dans les médias sociaux : approches hybrides d'apprentissage profond
Auteurs: Fatoumata Wongbé Rosalie Tokpa , Beman Hamidja Kamagaté , Vincent Monsan , Souleymane Oumtanaga
Date publication: 2023
Journal: Journal inconnu
Internet permet la création et la publication de contenus générés par l'utilisateur, ainsi que l'interaction entre utilisateurs. Compte tenu de l'accessibilité de ces moyens de communication et de leur…
Détection des fausses nouvelles dans les médias sociaux : approches hybrides d'apprentissage profond
Auteurs: Fatoumata Wongbé Rosalie Tokpa , Beman Hamidja Kamagaté , Vincent Monsan , Souleymane Oumtanaga
Date publication: 2023
Journal: Journal inconnu
Internet permet la création et la publication de contenus générés par l'utilisateur, ainsi que l'interaction entre utilisateurs. Compte tenu de l'accessibilité de ces moyens de communication et de leur…
A Chatbot for Automatic Processing of Learner Concerns in an Online Learning Platform
Auteurs: Mamadou BAKOUAN, Beman Hamidja KAMAGATE, Tiemoman KONE, Souleymane OUMTANAGA , Michel BABRI5
Date publication: 2018
Journal: Journal inconnu
Abstract—In this article, we present a chatbot model that can automatically respond to learners’ concerns on an online training platform. The proposed chatbot model is based on an adaptation of the similarity of Dice to understand the concerns of learners. The first phase of this approach allows selecting the preestablished concerns that the teacher has in a knowledge base which are closest to those posed by the learner. The second phase consists of selecting among these k most appropriate concerns based on a measure of similarity built on the concept of domain keywords. The experiment...
A Chatbot for Automatic Processing of Learner Concerns in an Online Learning Platform
Auteurs: Mamadou BAKOUAN, Beman Hamidja KAMAGATE, Tiemoman KONE, Souleymane OUMTANAGA , Michel BABRI5
Date publication: 2018
Journal: Journal inconnu
Abstract—In this article, we present a chatbot model that can automatically respond to learners’ concerns on an online training platform. The proposed chatbot model is based on an adaptation of the similarity of Dice to understand the concerns of learners. The first phase of this approach allows selecting the preestablished concerns that the teacher has in a knowledge base which are closest to those posed by the learner. The second phase consists of selecting among these k most appropriate concerns based on a measure of similarity built on the concept of domain keywords. The experiment...
A Chatbot for Automatic Processing of Learner Concerns in an Online Learning Platform
Auteurs: Mamadou BAKOUAN, Beman Hamidja KAMAGATE, Tiemoman KONE, Souleymane OUMTANAGA , Michel BABRI5
Date publication: 2018
Journal: Journal inconnu
Abstract—In this article, we present a chatbot model that can automatically respond to learners’ concerns on an online training platform. The proposed chatbot model is based on an adaptation of the similarity of Dice to understand the concerns of learners. The first phase of this approach allows selecting the preestablished concerns that the teacher has in a knowledge base which are closest to those posed by the learner. The second phase consists of selecting among these k most appropriate concerns based on a measure of similarity built on the concept of domain keywords. The experiment...
A Chatbot for Automatic Processing of Learner Concerns in an Online Learning Platform
Auteurs: Mamadou BAKOUAN, Beman Hamidja KAMAGATE, Tiemoman KONE, Souleymane OUMTANAGA , Michel BABRI5
Date publication: 2018
Journal: Journal inconnu
Abstract—In this article, we present a chatbot model that can automatically respond to learners’ concerns on an online training platform. The proposed chatbot model is based on an adaptation of the similarity of Dice to understand the concerns of learners. The first phase of this approach allows selecting the preestablished concerns that the teacher has in a knowledge base which are closest to those posed by the learner. The second phase consists of selecting among these k most appropriate concerns based on a measure of similarity built on the concept of domain keywords. The experiment...
A Chatbot for Automatic Processing of Learner Concerns in an Online Learning Platform
Auteurs: Mamadou BAKOUAN, Beman Hamidja KAMAGATE, Tiemoman KONE, Souleymane OUMTANAGA , Michel BABRI5
Date publication: 2018
Journal: Journal inconnu
Abstract—In this article, we present a chatbot model that can automatically respond to learners’ concerns on an online training platform. The proposed chatbot model is based on an adaptation of the similarity of Dice to understand the concerns of learners. The first phase of this approach allows selecting the preestablished concerns that the teacher has in a knowledge base which are closest to those posed by the learner. The second phase consists of selecting among these k most appropriate concerns based on a measure of similarity built on the concept of domain keywords. The experiment...
Algorithme de recommandation de cours basé sur la prédiction des performances en e-learning
Auteurs: Koffi, Dagou Dangui Augustin Sylvain Legrand,Ouattara, Nouho, Mambe, Digrais Moise,Oumtanaga, Souleymane ,ADJE, Assohoun
Date publication: 2021
Journal: Journal inconnu
L'efficacité des systèmes de recommandation dépend de la performance des algorithmes qui les composent. La qualité des algorithmes dépend de la qualité des stratégies qui les ont conçus. Ces stratégies varient d'un auteur à l'autre. Concevoir un bon système de recommandation implique donc de mettre en œuvre les bonnes stratégies. C'est dans ce contexte que plusieurs travaux de recherche ont été proposés sur diverses stratégies appliquées aux algorithmes pour répondre aux besoins de recommandation. Les chercheurs tentent sans cesse d'atteindre cet objectif de recherche des qualités des algorith...
Algorithme de recommandation de cours basé sur la prédiction des performances en e-learning
Auteurs: Koffi, Dagou Dangui Augustin Sylvain Legrand,Ouattara, Nouho, Mambe, Digrais Moise,Oumtanaga, Souleymane ,ADJE, Assohoun
Date publication: 2021
Journal: Journal inconnu
L'efficacité des systèmes de recommandation dépend de la performance des algorithmes qui les composent. La qualité des algorithmes dépend de la qualité des stratégies qui les ont conçus. Ces stratégies varient d'un auteur à l'autre. Concevoir un bon système de recommandation implique donc de mettre en œuvre les bonnes stratégies. C'est dans ce contexte que plusieurs travaux de recherche ont été proposés sur diverses stratégies appliquées aux algorithmes pour répondre aux besoins de recommandation. Les chercheurs tentent sans cesse d'atteindre cet objectif de recherche des qualités des algorith...
Algorithme de recommandation de cours basé sur la prédiction des performances en e-learning
Auteurs: Koffi, Dagou Dangui Augustin Sylvain Legrand,Ouattara, Nouho, Mambe, Digrais Moise,Oumtanaga, Souleymane ,ADJE, Assohoun
Date publication: 2021
Journal: Journal inconnu
L'efficacité des systèmes de recommandation dépend de la performance des algorithmes qui les composent. La qualité des algorithmes dépend de la qualité des stratégies qui les ont conçus. Ces stratégies varient d'un auteur à l'autre. Concevoir un bon système de recommandation implique donc de mettre en œuvre les bonnes stratégies. C'est dans ce contexte que plusieurs travaux de recherche ont été proposés sur diverses stratégies appliquées aux algorithmes pour répondre aux besoins de recommandation. Les chercheurs tentent sans cesse d'atteindre cet objectif de recherche des qualités des algorith...
Algorithme de recommandation de cours basé sur la prédiction des performances en e-learning
Auteurs: Koffi, Dagou Dangui Augustin Sylvain Legrand,Ouattara, Nouho, Mambe, Digrais Moise,Oumtanaga, Souleymane ,ADJE, Assohoun
Date publication: 2021
Journal: Journal inconnu
L'efficacité des systèmes de recommandation dépend de la performance des algorithmes qui les composent. La qualité des algorithmes dépend de la qualité des stratégies qui les ont conçus. Ces stratégies varient d'un auteur à l'autre. Concevoir un bon système de recommandation implique donc de mettre en œuvre les bonnes stratégies. C'est dans ce contexte que plusieurs travaux de recherche ont été proposés sur diverses stratégies appliquées aux algorithmes pour répondre aux besoins de recommandation. Les chercheurs tentent sans cesse d'atteindre cet objectif de recherche des qualités des algorith...
Algorithme de recommandation de cours basé sur la prédiction des performances en e-learning
Auteurs: Koffi, Dagou Dangui Augustin Sylvain Legrand,Ouattara, Nouho, Mambe, Digrais Moise,Oumtanaga, Souleymane ,ADJE, Assohoun
Date publication: 2021
Journal: Journal inconnu
L'efficacité des systèmes de recommandation dépend de la performance des algorithmes qui les composent. La qualité des algorithmes dépend de la qualité des stratégies qui les ont conçus. Ces stratégies varient d'un auteur à l'autre. Concevoir un bon système de recommandation implique donc de mettre en œuvre les bonnes stratégies. C'est dans ce contexte que plusieurs travaux de recherche ont été proposés sur diverses stratégies appliquées aux algorithmes pour répondre aux besoins de recommandation. Les chercheurs tentent sans cesse d'atteindre cet objectif de recherche des qualités des algorith...
Algorithme de recommandation de cours basé sur la prédiction des performances en e-learning
Auteurs: Koffi, Dagou Dangui Augustin Sylvain Legrand,Ouattara, Nouho, Mambe, Digrais Moise,Oumtanaga, Souleymane ,ADJE, Assohoun
Date publication: 2021
Journal: Journal inconnu
L'efficacité des systèmes de recommandation dépend de la performance des algorithmes qui les composent. La qualité des algorithmes dépend de la qualité des stratégies qui les ont conçus. Ces stratégies varient d'un auteur à l'autre. Concevoir un bon système de recommandation implique donc de mettre en œuvre les bonnes stratégies. C'est dans ce contexte que plusieurs travaux de recherche ont été proposés sur diverses stratégies appliquées aux algorithmes pour répondre aux besoins de recommandation. Les chercheurs tentent sans cesse d'atteindre cet objectif de recherche des qualités des algorith...
Algorithme de recommandation de cours basé sur la prédiction des performances en e-learning
Auteurs: Koffi, Dagou Dangui Augustin Sylvain Legrand,Ouattara, Nouho, Mambe, Digrais Moise,Oumtanaga, Souleymane ,ADJE, Assohoun
Date publication: 2021
Journal: Journal inconnu
L'efficacité des systèmes de recommandation dépend de la performance des algorithmes qui les composent. La qualité des algorithmes dépend de la qualité des stratégies qui les ont conçus. Ces stratégies varient d'un auteur à l'autre. Concevoir un bon système de recommandation implique donc de mettre en œuvre les bonnes stratégies. C'est dans ce contexte que plusieurs travaux de recherche ont été proposés sur diverses stratégies appliquées aux algorithmes pour répondre aux besoins de recommandation. Les chercheurs tentent sans cesse d'atteindre cet objectif de recherche des qualités des algorith...
Algorithme de recommandation de cours basé sur la prédiction des performances en e-learning
Auteurs: Koffi, Dagou Dangui Augustin Sylvain Legrand,Ouattara, Nouho, Mambe, Digrais Moise,Oumtanaga, Souleymane ,ADJE, Assohoun
Date publication: 2021
Journal: Journal inconnu
L'efficacité des systèmes de recommandation dépend de la performance des algorithmes qui les composent. La qualité des algorithmes dépend de la qualité des stratégies qui les ont conçus. Ces stratégies varient d'un auteur à l'autre. Concevoir un bon système de recommandation implique donc de mettre en œuvre les bonnes stratégies. C'est dans ce contexte que plusieurs travaux de recherche ont été proposés sur diverses stratégies appliquées aux algorithmes pour répondre aux besoins de recommandation. Les chercheurs tentent sans cesse d'atteindre cet objectif de recherche des qualités des algorith...
Algorithme de recommandation de cours basé sur la prédiction des performances en e-learning
Auteurs: Koffi, Dagou Dangui Augustin Sylvain Legrand,Ouattara, Nouho, Mambe, Digrais Moise,Oumtanaga, Souleymane ,ADJE, Assohoun
Date publication: 2021
Journal: Journal inconnu
L'efficacité des systèmes de recommandation dépend de la performance des algorithmes qui les composent. La qualité des algorithmes dépend de la qualité des stratégies qui les ont conçus. Ces stratégies varient d'un auteur à l'autre. Concevoir un bon système de recommandation implique donc de mettre en œuvre les bonnes stratégies. C'est dans ce contexte que plusieurs travaux de recherche ont été proposés sur diverses stratégies appliquées aux algorithmes pour répondre aux besoins de recommandation. Les chercheurs tentent sans cesse d'atteindre cet objectif de recherche des qualités des algorith...
Algorithme de recommandation de cours basé sur la prédiction des performances en e-learning
Auteurs: Koffi, Dagou Dangui Augustin Sylvain Legrand,Ouattara, Nouho, Mambe, Digrais Moise,Oumtanaga, Souleymane ,ADJE, Assohoun
Date publication: 2021
Journal: Journal inconnu
L'efficacité des systèmes de recommandation dépend de la performance des algorithmes qui les composent. La qualité des algorithmes dépend de la qualité des stratégies qui les ont conçus. Ces stratégies varient d'un auteur à l'autre. Concevoir un bon système de recommandation implique donc de mettre en œuvre les bonnes stratégies. C'est dans ce contexte que plusieurs travaux de recherche ont été proposés sur diverses stratégies appliquées aux algorithmes pour répondre aux besoins de recommandation. Les chercheurs tentent sans cesse d'atteindre cet objectif de recherche des qualités des algorith...
A New Uncertainty Measure in Belief Entropy Framework
Auteurs: Mo¨ıse Digrais Mambe , Tchimou N’Takpe , Nogbou Georges Anoh3,4, Souleymane Oumtanaga
Date publication: 2018
Journal: Journal inconnu
Abstract—Belief entropy, which represents the uncertainty measure between several pieces of evidence in the DempsterShafer framework, is attracting increasing interest in research. It has been used in many applications and is mainly based on the theory of evidence. To quantify uncertainty, several measures have been proposed in the literature. These measures, sometimes in extended or hybrid forms, use the Shannon entropy principle to determine uncertainty degree. However, the failure to consider the scale of the frame of discernment framework remains an open issue in quantifying uncert...
A New Uncertainty Measure in Belief Entropy Framework
Auteurs: Mo¨ıse Digrais Mambe , Tchimou N’Takpe , Nogbou Georges Anoh3,4, Souleymane Oumtanaga
Date publication: 2018
Journal: Journal inconnu
Abstract—Belief entropy, which represents the uncertainty measure between several pieces of evidence in the DempsterShafer framework, is attracting increasing interest in research. It has been used in many applications and is mainly based on the theory of evidence. To quantify uncertainty, several measures have been proposed in the literature. These measures, sometimes in extended or hybrid forms, use the Shannon entropy principle to determine uncertainty degree. However, the failure to consider the scale of the frame of discernment framework remains an open issue in quantifying uncert...
A New Uncertainty Measure in Belief Entropy Framework
Auteurs: Mo¨ıse Digrais Mambe , Tchimou N’Takpe , Nogbou Georges Anoh3,4, Souleymane Oumtanaga
Date publication: 2018
Journal: Journal inconnu
Abstract—Belief entropy, which represents the uncertainty measure between several pieces of evidence in the DempsterShafer framework, is attracting increasing interest in research. It has been used in many applications and is mainly based on the theory of evidence. To quantify uncertainty, several measures have been proposed in the literature. These measures, sometimes in extended or hybrid forms, use the Shannon entropy principle to determine uncertainty degree. However, the failure to consider the scale of the frame of discernment framework remains an open issue in quantifying uncert...
A New Uncertainty Measure in Belief Entropy Framework
Auteurs: Mo¨ıse Digrais Mambe , Tchimou N’Takpe , Nogbou Georges Anoh3,4, Souleymane Oumtanaga
Date publication: 2018
Journal: Journal inconnu
Abstract—Belief entropy, which represents the uncertainty measure between several pieces of evidence in the DempsterShafer framework, is attracting increasing interest in research. It has been used in many applications and is mainly based on the theory of evidence. To quantify uncertainty, several measures have been proposed in the literature. These measures, sometimes in extended or hybrid forms, use the Shannon entropy principle to determine uncertainty degree. However, the failure to consider the scale of the frame of discernment framework remains an open issue in quantifying uncert...
A New Uncertainty Measure in Belief Entropy Framework
Auteurs: Mo¨ıse Digrais Mambe , Tchimou N’Takpe , Nogbou Georges Anoh3,4, Souleymane Oumtanaga
Date publication: 2018
Journal: Journal inconnu
Abstract—Belief entropy, which represents the uncertainty measure between several pieces of evidence in the DempsterShafer framework, is attracting increasing interest in research. It has been used in many applications and is mainly based on the theory of evidence. To quantify uncertainty, several measures have been proposed in the literature. These measures, sometimes in extended or hybrid forms, use the Shannon entropy principle to determine uncertainty degree. However, the failure to consider the scale of the frame of discernment framework remains an open issue in quantifying uncert...
Tree Reconfiguration without Lightpath Interruption in Wavelength Division Multiplexing Optical Networks with Limited Resources
Auteurs: Bernard Cousin (1, 2) , Joel Christian Adépo (3) , Michel Babri (3) , Souleymane Oumtanaga (3)
Date publication: 2014
Journal: Journal inconnu
Today, operators use reconfiguration to improve the performance of connection oriented networks. In our previous work, we studied tree reconfiguration without data flow interruption in wavelength division multiplexing optical networks. In our previous approach, the available resources of the network (wavelengths) are not considered as limited. In this work, we study tree reconfiguration in a network which has a limited number of wavelengths per link. This paper proposes an algorithm called TRwRC (Tree reconfiguration with resources constraint). TRwRC reconfigures a tree without data flow inter...
Tree Reconfiguration without Lightpath Interruption in Wavelength Division Multiplexing Optical Networks with Limited Resources
Auteurs: Bernard Cousin (1, 2) , Joel Christian Adépo (3) , Michel Babri (3) , Souleymane Oumtanaga (3)
Date publication: 2014
Journal: Journal inconnu
Today, operators use reconfiguration to improve the performance of connection oriented networks. In our previous work, we studied tree reconfiguration without data flow interruption in wavelength division multiplexing optical networks. In our previous approach, the available resources of the network (wavelengths) are not considered as limited. In this work, we study tree reconfiguration in a network which has a limited number of wavelengths per link. This paper proposes an algorithm called TRwRC (Tree reconfiguration with resources constraint). TRwRC reconfigures a tree without data flow inter...
Tree Reconfiguration without Lightpath Interruption in Wavelength Division Multiplexing Optical Networks with Limited Resources
Auteurs: Bernard Cousin (1, 2) , Joel Christian Adépo (3) , Michel Babri (3) , Souleymane Oumtanaga (3)
Date publication: 2014
Journal: Journal inconnu
Today, operators use reconfiguration to improve the performance of connection oriented networks. In our previous work, we studied tree reconfiguration without data flow interruption in wavelength division multiplexing optical networks. In our previous approach, the available resources of the network (wavelengths) are not considered as limited. In this work, we study tree reconfiguration in a network which has a limited number of wavelengths per link. This paper proposes an algorithm called TRwRC (Tree reconfiguration with resources constraint). TRwRC reconfigures a tree without data flow inter...
Tree Reconfiguration without Lightpath Interruption in Wavelength Division Multiplexing Optical Networks with Limited Resources
Auteurs: Bernard Cousin (1, 2) , Joel Christian Adépo (3) , Michel Babri (3) , Souleymane Oumtanaga (3)
Date publication: 2014
Journal: Journal inconnu
Today, operators use reconfiguration to improve the performance of connection oriented networks. In our previous work, we studied tree reconfiguration without data flow interruption in wavelength division multiplexing optical networks. In our previous approach, the available resources of the network (wavelengths) are not considered as limited. In this work, we study tree reconfiguration in a network which has a limited number of wavelengths per link. This paper proposes an algorithm called TRwRC (Tree reconfiguration with resources constraint). TRwRC reconfigures a tree without data flow inter...
Tree Reconfiguration without Lightpath Interruption in Wavelength Division Multiplexing Optical Networks with Limited Resources
Auteurs: Bernard Cousin (1, 2) , Joel Christian Adépo (3) , Michel Babri (3) , Souleymane Oumtanaga (3)
Date publication: 2014
Journal: Journal inconnu
Today, operators use reconfiguration to improve the performance of connection oriented networks. In our previous work, we studied tree reconfiguration without data flow interruption in wavelength division multiplexing optical networks. In our previous approach, the available resources of the network (wavelengths) are not considered as limited. In this work, we study tree reconfiguration in a network which has a limited number of wavelengths per link. This paper proposes an algorithm called TRwRC (Tree reconfiguration with resources constraint). TRwRC reconfigures a tree without data flow inter...
A survey on Image Data Augmentation for Deep Learning
Auteurs: Connor Shorten, Taghi M. Khoshgoftaar
Date publication: 2019-07-06
Journal: Institute of Advanced Engineering and Science
Deep convolutional neural networks have performed remarkably well on many Computer Vision tasks. However, these networks are heavily reliant on big data to avoid overfitting. Overfitting refers to the phenomenon when a network learns a function with very high variance such as to perfectly model the training data. Unfortunately, many application domains do not have access to big data, such as medical image analysis. This survey focuses on Data Augmentation, a data-space solution to the problem of limited data. Data Augmentation encompasses a suite of techniques that enhance the size and quality...
Sciences et Technologies Lire l'article
A survey on Image Data Augmentation for Deep Learning
Auteurs: Connor Shorten, Taghi M. Khoshgoftaar
Date publication: 2019-07-06
Journal: Institute of Advanced Engineering and Science
Deep convolutional neural networks have performed remarkably well on many Computer Vision tasks. However, these networks are heavily reliant on big data to avoid overfitting. Overfitting refers to the phenomenon when a network learns a function with very high variance such as to perfectly model the training data. Unfortunately, many application domains do not have access to big data, such as medical image analysis. This survey focuses on Data Augmentation, a data-space solution to the problem of limited data. Data Augmentation encompasses a suite of techniques that enhance the size and quality...
Sciences et Technologies Lire l'article
A constrained convolutional neural network with attention mechanism for image manipulation detection
Auteurs: Kamagate Beman Hamidja , Fatoumata Wongbé Rosalie Tokpa , Vincent Monsan , Souleymane Oumtanaga
Date publication:
Journal: Journal inconnu
The information disseminated by online media is often presented in the form of images, in order to quickly captivate readers and increase audience ratings. However, these images can be manipulated for malicious purposes, such as influencing public opinion, undermining media credibility, disrupting democratic processes or creating conflict within society. Various approaches, whether relying on manually developed features or deep learning, have been devised to detect falsified images. However, they frequently prove less effective when confronted with widespread and multiple manipulations...
A constrained convolutional neural network with attention mechanism for image manipulation detection
Auteurs: Kamagate Beman Hamidja , Fatoumata Wongbé Rosalie Tokpa , Vincent Monsan , Souleymane Oumtanaga
Date publication:
Journal: Journal inconnu
The information disseminated by online media is often presented in the form of images, in order to quickly captivate readers and increase audience ratings. However, these images can be manipulated for malicious purposes, such as influencing public opinion, undermining media credibility, disrupting democratic processes or creating conflict within society. Various approaches, whether relying on manually developed features or deep learning, have been devised to detect falsified images. However, they frequently prove less effective when confronted with widespread and multiple manipulations...
A constrained convolutional neural network with attention mechanism for image manipulation detection
Auteurs: Kamagate Beman Hamidja , Fatoumata Wongbé Rosalie Tokpa , Vincent Monsan , Souleymane Oumtanaga
Date publication:
Journal: Journal inconnu
The information disseminated by online media is often presented in the form of images, in order to quickly captivate readers and increase audience ratings. However, these images can be manipulated for malicious purposes, such as influencing public opinion, undermining media credibility, disrupting democratic processes or creating conflict within society. Various approaches, whether relying on manually developed features or deep learning, have been devised to detect falsified images. However, they frequently prove less effective when confronted with widespread and multiple manipulations...
A constrained convolutional neural network with attention mechanism for image manipulation detection
Auteurs: Kamagate Beman Hamidja , Fatoumata Wongbé Rosalie Tokpa , Vincent Monsan , Souleymane Oumtanaga
Date publication:
Journal: Journal inconnu
The information disseminated by online media is often presented in the form of images, in order to quickly captivate readers and increase audience ratings. However, these images can be manipulated for malicious purposes, such as influencing public opinion, undermining media credibility, disrupting democratic processes or creating conflict within society. Various approaches, whether relying on manually developed features or deep learning, have been devised to detect falsified images. However, they frequently prove less effective when confronted with widespread and multiple manipulations...
Protocole de planification hybride acyclique et sensible aux débordements pour le contrôle intelligent des feux de circulation
Auteurs: GHF Diédié, NG Anoh, S Oumtanaga
Date publication: 2023
Journal: Journal inconnu
Les embouteillages constituent un problème majeur dans les villes modernes. En augmentant les retards et la pollution, les embouteillages limitent la mobilité et constituent une menace pour la santé publique. En particulier, à proximité…
Protocole de planification hybride acyclique et sensible aux débordements pour le contrôle intelligent des feux de circulation
Auteurs: GHF Diédié, NG Anoh, S Oumtanaga
Date publication: 2023
Journal: Journal inconnu
Les embouteillages constituent un problème majeur dans les villes modernes. En augmentant les retards et la pollution, les embouteillages limitent la mobilité et constituent une menace pour la santé publique. En particulier, à proximité…
Protocole de planification hybride acyclique et sensible aux débordements pour le contrôle intelligent des feux de circulation
Auteurs: GHF Diédié, NG Anoh, S Oumtanaga
Date publication: 2023
Journal: Journal inconnu
Les embouteillages constituent un problème majeur dans les villes modernes. En augmentant les retards et la pollution, les embouteillages limitent la mobilité et constituent une menace pour la santé publique. En particulier, à proximité…
A Convolutional Neural Network for Improved Anomaly-Based Network Intrusion Detection
Auteurs: Isra Al-Turaiki, Νajwa Altwaijry
Date publication: 2021-06-01
Journal: Scientific Research Publishing, Inc.
Cybersecurity protects and recovers computer systems and networks from cyber attacks. The importance of cybersecurity is growing commensurately with people's increasing reliance on technology. An anomaly detection-based network intrusion detection system is essential to any security framework within a computer network. In this article, we propose two models based on deep learning to address the binary and multiclass classification of network attacks. We use a convolutional neural network architecture for our models. In addition, a hybrid two-step preprocessing approach is proposed to generate...
Sciences et Technologies Lire l'article
A Convolutional Neural Network for Improved Anomaly-Based Network Intrusion Detection
Auteurs: Isra Al-Turaiki, Νajwa Altwaijry
Date publication: 2021-06-01
Journal: Scientific Research Publishing, Inc.
Cybersecurity protects and recovers computer systems and networks from cyber attacks. The importance of cybersecurity is growing commensurately with people's increasing reliance on technology. An anomaly detection-based network intrusion detection system is essential to any security framework within a computer network. In this article, we propose two models based on deep learning to address the binary and multiclass classification of network attacks. We use a convolutional neural network architecture for our models. In addition, a hybrid two-step preprocessing approach is proposed to generate...
Sciences et Technologies Lire l'article
Deep Learning-Based Two-Step Approach for Intrusion Detection in Networks
Auteurs: Kamagaté Beman Hamidja, Kanga Koffi, Kouassi Adless, Olivier Asseu, Souleymane Oumtanaga
Date publication: 2024
Journal: Journal inconnu
Intrusion Detection Systems (IDS) are essential for computer security, with various techniques developed over time. However, many of these methods suffer from high false positive rates. To address this, we propose an approach utilizing Recurrent Neural Networks (RNN). Our method starts by reducing the dataset’s dimensionality using a Deep Auto-Encoder (DAE), followed by intrusion detection through a Bidirectional Long Short-Term Memory (BiLSTM) network. The proposed DAE-BiLSTM model outperforms Random Forest, AdaBoost, and standard BiLSTM models, achieving an accuracy of 0.97, a recall of 0.95...
Deep Learning-Based Two-Step Approach for Intrusion Detection in Networks
Auteurs: Kamagaté Beman Hamidja, Kanga Koffi, Kouassi Adless, Olivier Asseu, Souleymane Oumtanaga
Date publication: 2024
Journal: Journal inconnu
Intrusion Detection Systems (IDS) are essential for computer security, with various techniques developed over time. However, many of these methods suffer from high false positive rates. To address this, we propose an approach utilizing Recurrent Neural Networks (RNN). Our method starts by reducing the dataset’s dimensionality using a Deep Auto-Encoder (DAE), followed by intrusion detection through a Bidirectional Long Short-Term Memory (BiLSTM) network. The proposed DAE-BiLSTM model outperforms Random Forest, AdaBoost, and standard BiLSTM models, achieving an accuracy of 0.97, a recall of 0.95...
Deep Learning-Based Two-Step Approach for Intrusion Detection in Networks
Auteurs: Kamagaté Beman Hamidja, Kanga Koffi, Kouassi Adless, Olivier Asseu, Souleymane Oumtanaga
Date publication: 2024
Journal: Journal inconnu
Intrusion Detection Systems (IDS) are essential for computer security, with various techniques developed over time. However, many of these methods suffer from high false positive rates. To address this, we propose an approach utilizing Recurrent Neural Networks (RNN). Our method starts by reducing the dataset’s dimensionality using a Deep Auto-Encoder (DAE), followed by intrusion detection through a Bidirectional Long Short-Term Memory (BiLSTM) network. The proposed DAE-BiLSTM model outperforms Random Forest, AdaBoost, and standard BiLSTM models, achieving an accuracy of 0.97, a recall of 0.95...
Deep Learning-Based Two-Step Approach for Intrusion Detection in Networks
Auteurs: Kamagaté Beman Hamidja, Kanga Koffi, Kouassi Adless, Olivier Asseu, Souleymane Oumtanaga
Date publication: 2024
Journal: Journal inconnu
Intrusion Detection Systems (IDS) are essential for computer security, with various techniques developed over time. However, many of these methods suffer from high false positive rates. To address this, we propose an approach utilizing Recurrent Neural Networks (RNN). Our method starts by reducing the dataset’s dimensionality using a Deep Auto-Encoder (DAE), followed by intrusion detection through a Bidirectional Long Short-Term Memory (BiLSTM) network. The proposed DAE-BiLSTM model outperforms Random Forest, AdaBoost, and standard BiLSTM models, achieving an accuracy of 0.97, a recall of 0.95...
Deep Learning-Based Two-Step Approach for Intrusion Detection in Networks
Auteurs: Kamagaté Beman Hamidja, Kanga Koffi, Kouassi Adless, Olivier Asseu, Souleymane Oumtanaga
Date publication: 2024
Journal: Journal inconnu
Intrusion Detection Systems (IDS) are essential for computer security, with various techniques developed over time. However, many of these methods suffer from high false positive rates. To address this, we propose an approach utilizing Recurrent Neural Networks (RNN). Our method starts by reducing the dataset’s dimensionality using a Deep Auto-Encoder (DAE), followed by intrusion detection through a Bidirectional Long Short-Term Memory (BiLSTM) network. The proposed DAE-BiLSTM model outperforms Random Forest, AdaBoost, and standard BiLSTM models, achieving an accuracy of 0.97, a recall of 0.95...
Redundancy detection protocol for area coverage control in heterogeneous wireless sensor networks
Auteurs: Hervé Gokou Diédié , Michel Babri ,Souleymane Oumtanaga
Date publication: 2015
Journal: Journal inconnu
In a wireless sensor network, eliminating redundancies in area coverage in the deployment zone represents a major challenge where the stake is its lifetime increase. Current works dealing with this topic use different deterministic or probabilistic techniques for nodes redundancies check. In this paper, we propose a quasi-quadratic time distributed algorithm based on a deterministic approach enabling each node to know its exact status even in the context of heterogeneous sensing ranges. Simulations show that this novel technique is more accurate and precise in comparison with other tr...
Redundancy detection protocol for area coverage control in heterogeneous wireless sensor networks
Auteurs: Hervé Gokou Diédié , Michel Babri ,Souleymane Oumtanaga
Date publication: 2015
Journal: Journal inconnu
In a wireless sensor network, eliminating redundancies in area coverage in the deployment zone represents a major challenge where the stake is its lifetime increase. Current works dealing with this topic use different deterministic or probabilistic techniques for nodes redundancies check. In this paper, we propose a quasi-quadratic time distributed algorithm based on a deterministic approach enabling each node to know its exact status even in the context of heterogeneous sensing ranges. Simulations show that this novel technique is more accurate and precise in comparison with other tr...
Redundancy detection protocol for area coverage control in heterogeneous wireless sensor networks
Auteurs: Hervé Gokou Diédié , Michel Babri ,Souleymane Oumtanaga
Date publication: 2015
Journal: Journal inconnu
In a wireless sensor network, eliminating redundancies in area coverage in the deployment zone represents a major challenge where the stake is its lifetime increase. Current works dealing with this topic use different deterministic or probabilistic techniques for nodes redundancies check. In this paper, we propose a quasi-quadratic time distributed algorithm based on a deterministic approach enabling each node to know its exact status even in the context of heterogeneous sensing ranges. Simulations show that this novel technique is more accurate and precise in comparison with other tr...
Minimize Flow Interruptions during Reconfiguration of a set of Light-trees in All-optical WDM Network
Auteurs: Amanvon Ferdinand Atta (1) , Bernard Cousin (2) , Joel Christian Adepo (3) , Souleymane Oumtanaga (1)
Date publication: 2020
Journal: Journal inconnu
Reconfiguration of all-optical WDM networks is an important task performed by the network operators to re-optimize the allocation of network resources. Multicast applications such as video conference and telemedicine are increasingly in demand on the network. Thus, our study focuses on the reconfiguration of multicast connection paths. A multicast connection path is supposed to be a light-tree. The reconfiguration problem studied here is to find a sequence of configurations with minimum cost that allows to migrate an optical flow from a current configuration of a set of light-trees to a final...
Minimize Flow Interruptions during Reconfiguration of a set of Light-trees in All-optical WDM Network
Auteurs: Amanvon Ferdinand Atta (1) , Bernard Cousin (2) , Joel Christian Adepo (3) , Souleymane Oumtanaga (1)
Date publication: 2020
Journal: Journal inconnu
Reconfiguration of all-optical WDM networks is an important task performed by the network operators to re-optimize the allocation of network resources. Multicast applications such as video conference and telemedicine are increasingly in demand on the network. Thus, our study focuses on the reconfiguration of multicast connection paths. A multicast connection path is supposed to be a light-tree. The reconfiguration problem studied here is to find a sequence of configurations with minimum cost that allows to migrate an optical flow from a current configuration of a set of light-trees to a final...
Minimize Flow Interruptions during Reconfiguration of a set of Light-trees in All-optical WDM Network
Auteurs: Amanvon Ferdinand Atta (1) , Bernard Cousin (2) , Joel Christian Adepo (3) , Souleymane Oumtanaga (1)
Date publication: 2020
Journal: Journal inconnu
Reconfiguration of all-optical WDM networks is an important task performed by the network operators to re-optimize the allocation of network resources. Multicast applications such as video conference and telemedicine are increasingly in demand on the network. Thus, our study focuses on the reconfiguration of multicast connection paths. A multicast connection path is supposed to be a light-tree. The reconfiguration problem studied here is to find a sequence of configurations with minimum cost that allows to migrate an optical flow from a current configuration of a set of light-trees to a final...
Minimize Flow Interruptions during Reconfiguration of a set of Light-trees in All-optical WDM Network
Auteurs: Amanvon Ferdinand Atta (1) , Bernard Cousin (2) , Joel Christian Adepo (3) , Souleymane Oumtanaga (1)
Date publication: 2020
Journal: Journal inconnu
Reconfiguration of all-optical WDM networks is an important task performed by the network operators to re-optimize the allocation of network resources. Multicast applications such as video conference and telemedicine are increasingly in demand on the network. Thus, our study focuses on the reconfiguration of multicast connection paths. A multicast connection path is supposed to be a light-tree. The reconfiguration problem studied here is to find a sequence of configurations with minimum cost that allows to migrate an optical flow from a current configuration of a set of light-trees to a final...
Managing an External Depot in a Production Routing Problem
Auteurs: Bi Kouaï Bertin Kayé , Moustapha Diaby , Tchimou N’Takpé , Souleymane Oumtanaga
Date publication: 2020
Journal: Journal inconnu
Abstract—This paper addresses a production and distribution problem in a supply chain. The supply chain consists of a plant with no storage capacity that produces only one type of product. The manufactured products are then transported to a depot for storage. Customers demand is met by a homogeneous fleet of vehicles that begins and ends their trips at the depot. The objective of the study is to minimize the overall cost of production, inventory and transport throughout the supply chain. A Branch-and-Cut and a hybrid Two Phases Decomposition Heuristic using a Mixed Integer Programming...
Managing an External Depot in a Production Routing Problem
Auteurs: Bi Kouaï Bertin Kayé , Moustapha Diaby , Tchimou N’Takpé , Souleymane Oumtanaga
Date publication: 2020
Journal: Journal inconnu
Abstract—This paper addresses a production and distribution problem in a supply chain. The supply chain consists of a plant with no storage capacity that produces only one type of product. The manufactured products are then transported to a depot for storage. Customers demand is met by a homogeneous fleet of vehicles that begins and ends their trips at the depot. The objective of the study is to minimize the overall cost of production, inventory and transport throughout the supply chain. A Branch-and-Cut and a hybrid Two Phases Decomposition Heuristic using a Mixed Integer Programming...
Managing an External Depot in a Production Routing Problem
Auteurs: Bi Kouaï Bertin Kayé , Moustapha Diaby , Tchimou N’Takpé , Souleymane Oumtanaga
Date publication: 2020
Journal: Journal inconnu
Abstract—This paper addresses a production and distribution problem in a supply chain. The supply chain consists of a plant with no storage capacity that produces only one type of product. The manufactured products are then transported to a depot for storage. Customers demand is met by a homogeneous fleet of vehicles that begins and ends their trips at the depot. The objective of the study is to minimize the overall cost of production, inventory and transport throughout the supply chain. A Branch-and-Cut and a hybrid Two Phases Decomposition Heuristic using a Mixed Integer Programming...
Managing an External Depot in a Production Routing Problem
Auteurs: Bi Kouaï Bertin Kayé , Moustapha Diaby , Tchimou N’Takpé , Souleymane Oumtanaga
Date publication: 2020
Journal: Journal inconnu
Abstract—This paper addresses a production and distribution problem in a supply chain. The supply chain consists of a plant with no storage capacity that produces only one type of product. The manufactured products are then transported to a depot for storage. Customers demand is met by a homogeneous fleet of vehicles that begins and ends their trips at the depot. The objective of the study is to minimize the overall cost of production, inventory and transport throughout the supply chain. A Branch-and-Cut and a hybrid Two Phases Decomposition Heuristic using a Mixed Integer Programming...
Algorithme de localisation sans ancre utilisant des contrôleurs dans des réseaux de capteurs sans fil
Auteurs: SGA Keupondejo, BJB Gouho, S Oumtanaga
Date publication: 2022
Journal: Journal inconnu
La localisation des capteurs sans fil est un aspect très important des réseaux de capteurs sans fil (WSN) car elle détermine le bon fonctionnement et la durée de vie des capteurs sans fil qui…
Algorithme de localisation sans ancre utilisant des contrôleurs dans des réseaux de capteurs sans fil
Auteurs: SGA Keupondejo, BJB Gouho, S Oumtanaga
Date publication: 2022
Journal: Journal inconnu
La localisation des capteurs sans fil est un aspect très important des réseaux de capteurs sans fil (WSN) car elle détermine le bon fonctionnement et la durée de vie des capteurs sans fil qui…
Algorithme de localisation sans ancre utilisant des contrôleurs dans des réseaux de capteurs sans fil
Auteurs: SGA Keupondejo, BJB Gouho, S Oumtanaga
Date publication: 2022
Journal: Journal inconnu
La localisation des capteurs sans fil est un aspect très important des réseaux de capteurs sans fil (WSN) car elle détermine le bon fonctionnement et la durée de vie des capteurs sans fil qui…
Optimisation de la latence dans les réseaux SDN
Auteurs: Gilles Armel KEUPONDJO SATCHOU ,Nogbou Georges ANOH ,Tchimou N'Takpé ,Souleymane Oumtanaga
Date publication: 2018
Journal: Journal inconnu
Contrairement aux réseaux traditionnels, les réseaux définis par logiciel (SDN) se caractérisent par une séparation physique du contrôle et du plan de transfert. Ainsi, un contrôleur centralisé communique les fonctions du plan de contrôle à chaque appareil via le protocole OpenFlow dès qu'il le lui demande ou qu'il le juge approprié. Cela a un impact important sur le temps de latence, un facteur important pour les nouveaux services ou les applications multimédias. Afin d'optimiser le temps de transmission des données réseau avec le SDN, une approche proactive basée sur l'algorithme de contre-p...