publications trouvées
Chemical composition and specific lipids profile of the cashew apple bagasse
Cashew bagasse is a non-upgraded agricultural byproduct. In this study, three categories of
samples consist of red apple skin (R), yellow apple skin (Y), and a mixture of the pulps (P) …
Evaluation of the Effects of Aqueous Extract of Cnestis ferrruginea on Sexual Behaviour in Male Rats
Cnestis ferruginea, a plant of the connaraceace family, is well known to the West African population, including that of Côte d'Ivoire, through its common use in traditional medicine. The leaves of Cnestis ferruginea are used in traditional African medicine to treat numerous pathologies, including infertility. The present study aims to evaluate the effects of the aqueous extract of Cnestis ferruginea leaves on sexual parameters in male rats. The sexual parameters (latency of mating, latency of intromission, latency of ejaculation and mean copulation interval) were assessed by the classical meth...
Économie et Gestion
Lire l'article
Evaluation of the Effects of Aqueous Extract of Cnestis ferrruginea on Sexual Behaviour in Male Rats
Cnestis ferruginea, a plant of the connaraceace family, is well known to the West African population, including that of Côte d'Ivoire, through its common use in traditional medicine. The leaves of Cnestis ferruginea are used in traditional African medicine to treat numerous pathologies, including infertility. The present study aims to evaluate the effects of the aqueous extract of Cnestis ferruginea leaves on sexual parameters in male rats. The sexual parameters (latency of mating, latency of intromission, latency of ejaculation and mean copulation interval) were assessed by the classical meth...
Économie et Gestion
Lire l'article
Evaluation of the Effects of Aqueous Extract of Cnestis ferrruginea on Sexual Behaviour in Male Rats
Cnestis ferruginea, a plant of the connaraceace family, is well known to the West African population, including that of Côte d'Ivoire, through its common use in traditional medicine. The leaves of Cnestis ferruginea are used in traditional African medicine to treat numerous pathologies, including infertility. The present study aims to evaluate the effects of the aqueous extract of Cnestis ferruginea leaves on sexual parameters in male rats. The sexual parameters (latency of mating, latency of intromission, latency of ejaculation and mean copulation interval) were assessed by the classical meth...
Économie et Gestion
Lire l'article
Evaluation of the Effects of Aqueous Extract of Cnestis ferrruginea on Sexual Behaviour in Male Rats
Cnestis ferruginea, a plant of the connaraceace family, is well known to the West African population, including that of Côte d'Ivoire, through its common use in traditional medicine. The leaves of Cnestis ferruginea are used in traditional African medicine to treat numerous pathologies, including infertility. The present study aims to evaluate the effects of the aqueous extract of Cnestis ferruginea leaves on sexual parameters in male rats. The sexual parameters (latency of mating, latency of intromission, latency of ejaculation and mean copulation interval) were assessed by the classical meth...
Économie et Gestion
Lire l'article
Evaluation of the Effects of Aqueous Extract of Cnestis ferrruginea on Sexual Behaviour in Male Rats
Cnestis ferruginea, a plant of the connaraceace family, is well known to the West African population, including that of Côte d'Ivoire, through its common use in traditional medicine. The leaves of Cnestis ferruginea are used in traditional African medicine to treat numerous pathologies, including infertility. The present study aims to evaluate the effects of the aqueous extract of Cnestis ferruginea leaves on sexual parameters in male rats. The sexual parameters (latency of mating, latency of intromission, latency of ejaculation and mean copulation interval) were assessed by the classical meth...
Économie et Gestion
Lire l'article
Evaluation of the Effects of Aqueous Extract of Cnestis ferrruginea on Sexual Behaviour in Male Rats
Cnestis ferruginea, a plant of the connaraceace family, is well known to the West African population, including that of Côte d'Ivoire, through its common use in traditional medicine. The leaves of Cnestis ferruginea are used in traditional African medicine to treat numerous pathologies, including infertility. The present study aims to evaluate the effects of the aqueous extract of Cnestis ferruginea leaves on sexual parameters in male rats. The sexual parameters (latency of mating, latency of intromission, latency of ejaculation and mean copulation interval) were assessed by the classical meth...
Économie et Gestion
Lire l'article
Kinetics of Potentially Toxic Elements decontamination of soil at Komabangou gold mine using indigenous plants
Non classifié
Lire l'article
Kinetics of Potentially Toxic Elements decontamination of soil at Komabangou gold mine using indigenous plants
Non classifié
Lire l'article
Kinetics of Potentially Toxic Elements decontamination of soil at Komabangou gold mine using indigenous plants
Non classifié
Lire l'article
Kinetics of Potentially Toxic Elements decontamination of soil at Komabangou gold mine using indigenous plants
Non classifié
Lire l'article
Kinetics of Potentially Toxic Elements decontamination of soil at Komabangou gold mine using indigenous plants
Non classifié
Lire l'article
Kinetics of Potentially Toxic Elements decontamination of soil at Komabangou gold mine using indigenous plants
Non classifié
Lire l'article
Kinetics of Potentially Toxic Elements decontamination of soil at Komabangou gold mine using indigenous plants
Non classifié
Lire l'article
Physicochemical study of kernel oils from ten varieties of Mangifera indica (Anacardiaceae) cultivated in Cote dIvoire
Mango consumers only use pulp and consider the kernel as wastes. This study aims to valorize the kernel of mango (Mangifera indica). In this study, the kernel of ten mango varieties (Ruby, Kent, Retard, Key, Assabony, Smith tête de chat, Smith normal, Palmer, Governeur and Aravia) collected at Yamoussoukro in the center of Cote d'Ivoire were used. The oils of these kernels were extracted by maceration method. Their physicochemical properties were determinate using standard methods. The yields of oils extracted are higher than 10%. The acid value of these oils varies from 2.50±0.25 to 27.06±0.3...
Sciences de la Santé
Lire l'article
Physicochemical study of kernel oils from ten varieties of Mangifera indica (Anacardiaceae) cultivated in Cote dIvoire
Mango consumers only use pulp and consider the kernel as wastes. This study aims to valorize the kernel of mango (Mangifera indica). In this study, the kernel of ten mango varieties (Ruby, Kent, Retard, Key, Assabony, Smith tête de chat, Smith normal, Palmer, Governeur and Aravia) collected at Yamoussoukro in the center of Cote d'Ivoire were used. The oils of these kernels were extracted by maceration method. Their physicochemical properties were determinate using standard methods. The yields of oils extracted are higher than 10%. The acid value of these oils varies from 2.50±0.25 to 27.06±0.3...
Sciences de la Santé
Lire l'article
Physicochemical study of kernel oils from ten varieties of Mangifera indica (Anacardiaceae) cultivated in Cote dIvoire
Mango consumers only use pulp and consider the kernel as wastes. This study aims to valorize the kernel of mango (Mangifera indica). In this study, the kernel of ten mango varieties (Ruby, Kent, Retard, Key, Assabony, Smith tête de chat, Smith normal, Palmer, Governeur and Aravia) collected at Yamoussoukro in the center of Cote d'Ivoire were used. The oils of these kernels were extracted by maceration method. Their physicochemical properties were determinate using standard methods. The yields of oils extracted are higher than 10%. The acid value of these oils varies from 2.50±0.25 to 27.06±0.3...
Sciences de la Santé
Lire l'article
Physicochemical study of kernel oils from ten varieties of Mangifera indica (Anacardiaceae) cultivated in Cote dIvoire
Mango consumers only use pulp and consider the kernel as wastes. This study aims to valorize the kernel of mango (Mangifera indica). In this study, the kernel of ten mango varieties (Ruby, Kent, Retard, Key, Assabony, Smith tête de chat, Smith normal, Palmer, Governeur and Aravia) collected at Yamoussoukro in the center of Cote d'Ivoire were used. The oils of these kernels were extracted by maceration method. Their physicochemical properties were determinate using standard methods. The yields of oils extracted are higher than 10%. The acid value of these oils varies from 2.50±0.25 to 27.06±0.3...
Sciences de la Santé
Lire l'article
Etude comparative des caractéristiques phytochimiques des feuilles de Hyptis suaveolens avant et après extraction de l'huile essentielle.
L'extraction des métabolites secondaires des feuilles de Hyptis suaveolens avant et après
extraction de son huile essentielle a été réalisée par macération avec un mélange éthanol-…
Étude phytochimique et activité antimicrobienne d'extraits d'écorce de Ceiba pentandra (L.) Gaertn. (Bombacaceae) de Côte d'Ivoire sur Staphylococcus aureus résistant aux antibiotiques …
L'émergence de bactéries multirésistantes aux antibiotiques est l'un des problèmes de santé de ces dernières décennies
. Parmi les solutions à ce problème, on trouve les métabolites secondaires des plantes médicinales…
Étude phytochimique et activité antimicrobienne d'extraits d'écorce de Ceiba pentandra (L.) Gaertn. (Bombacaceae) de Côte d'Ivoire sur Staphylococcus aureus résistant aux antibiotiques …
L'émergence de bactéries multirésistantes aux antibiotiques est l'un des problèmes de santé de ces dernières décennies
. Parmi les solutions à ce problème, on trouve les métabolites secondaires des plantes médicinales…
Étude phytochimique et activité antimicrobienne d'extraits d'écorce de Ceiba pentandra (L.) Gaertn. (Bombacaceae) de Côte d'Ivoire sur Staphylococcus aureus résistant aux antibiotiques …
L'émergence de bactéries multirésistantes aux antibiotiques est l'un des problèmes de santé de ces dernières décennies
. Parmi les solutions à ce problème, on trouve les métabolites secondaires des plantes médicinales…
Étude phytochimique et activité antimicrobienne d'extraits d'écorce de Ceiba pentandra (L.) Gaertn. (Bombacaceae) de Côte d'Ivoire sur Staphylococcus aureus résistant aux antibiotiques …
L'émergence de bactéries multirésistantes aux antibiotiques est l'un des problèmes de santé de ces dernières décennies
. Parmi les solutions à ce problème, on trouve les métabolites secondaires des plantes médicinales…
Étude phytochimique et activité antimicrobienne d'extraits d'écorce de Ceiba pentandra (L.) Gaertn. (Bombacaceae) de Côte d'Ivoire sur Staphylococcus aureus résistant aux antibiotiques …
L'émergence de bactéries multirésistantes aux antibiotiques est l'un des problèmes de santé de ces dernières décennies
. Parmi les solutions à ce problème, on trouve les métabolites secondaires des plantes médicinales…
Étude phytochimique et activité antimicrobienne d'extraits d'écorce de Ceiba pentandra (L.) Gaertn. (Bombacaceae) de Côte d'Ivoire sur Staphylococcus aureus résistant aux antibiotiques …
L'émergence de bactéries multirésistantes aux antibiotiques est l'un des problèmes de santé de ces dernières décennies
. Parmi les solutions à ce problème, on trouve les métabolites secondaires des plantes médicinales…
Détermination des paramètres influençant le rendement d'extraction hydro-alcoolique des métabolites secondaires de Alchornea cordifolia (Euphorbiaceae) et …
Une étude des facteurs influençant le rendement d'extraction a été déterminée sur les feuilles
de Alchornea cordifolia et sur la plante entière de Tridax procumbens. Le plan de criblage a
Détermination des paramètres influençant le rendement d'extraction hydro-alcoolique des métabolites secondaires de Alchornea cordifolia (Euphorbiaceae) et …
Une étude des facteurs influençant le rendement d'extraction a été déterminée sur les feuilles
de Alchornea cordifolia et sur la plante entière de Tridax procumbens. Le plan de criblage a
State of major tunas stock in Atlantic East center zone, off Ivory Coast
Les technologies utilisées dans le secteur de la pêche sont devenues plus performantes, ne serait-ce que pour répondre aux besoins d'une
population en constante augmentation. Cela a des conséquences considérables sur la gestion durable des ressources vivantes…
State of major tunas stock in Atlantic East center zone, off Ivory Coast
Les technologies utilisées dans le secteur de la pêche sont devenues plus performantes, ne serait-ce que pour répondre aux besoins d'une
population en constante augmentation. Cela a des conséquences considérables sur la gestion durable des ressources vivantes…
State of major tunas stock in Atlantic East center zone, off Ivory Coast
Les technologies utilisées dans le secteur de la pêche sont devenues plus performantes, ne serait-ce que pour répondre aux besoins d'une
population en constante augmentation. Cela a des conséquences considérables sur la gestion durable des ressources vivantes…
State of major tunas stock in Atlantic East center zone, off Ivory Coast
Les technologies utilisées dans le secteur de la pêche sont devenues plus performantes, ne serait-ce que pour répondre aux besoins d'une
population en constante augmentation. Cela a des conséquences considérables sur la gestion durable des ressources vivantes…
Évaluation de l'activité antifongique des extraits totaux de Hugonia platysepala sur les pathogènes responsables de cryptococcoses et de candidoses chez les sujets infectés par le VIH
Objectif : Évaluer in vitro l'activité antifongique des extraits totaux des feuilles de Hugonia
platysepala, plante médicinale du sud-ouest de la Côte d'Ivoire afin de traiter à moindre coût, …
UNE NOUVELLE MÉTHODE DE SEUILAGE BASÉE SUR LA FONCTION EXPONENTIELLE POUR LA DÉTECTION DE POINTS SAILLANTS SPÉCULAIRES
Dans de nombreuses applications, la présence de reflets spéculaires constitue une information perturbatrice. Son élimination
dépend fortement de l'efficacité de sa détection. Dans cet article, nous proposons une nouvelle approche…
UNE NOUVELLE MÉTHODE DE SEUILAGE BASÉE SUR LA FONCTION EXPONENTIELLE POUR LA DÉTECTION DE POINTS SAILLANTS SPÉCULAIRES
Dans de nombreuses applications, la présence de reflets spéculaires constitue une information perturbatrice. Son élimination
dépend fortement de l'efficacité de sa détection. Dans cet article, nous proposons une nouvelle approche…
UNE NOUVELLE MÉTHODE DE SEUILAGE BASÉE SUR LA FONCTION EXPONENTIELLE POUR LA DÉTECTION DE POINTS SAILLANTS SPÉCULAIRES
Dans de nombreuses applications, la présence de reflets spéculaires constitue une information perturbatrice. Son élimination
dépend fortement de l'efficacité de sa détection. Dans cet article, nous proposons une nouvelle approche…
UNE NOUVELLE MÉTHODE DE SEUILAGE BASÉE SUR LA FONCTION EXPONENTIELLE POUR LA DÉTECTION DE POINTS SAILLANTS SPÉCULAIRES
Dans de nombreuses applications, la présence de reflets spéculaires constitue une information perturbatrice. Son élimination
dépend fortement de l'efficacité de sa détection. Dans cet article, nous proposons une nouvelle approche…
Une nouvelle approche d'inpainting d'image basée sur l'algorithme Criminisi
Dans les méthodes de retouche par patchs, l'ordre de remplissage des zones à restaurer est
primordial. Cet ordre est défini par une fonction de priorité intégrant deux paramètres : …
Une nouvelle approche d'inpainting d'image basée sur l'algorithme Criminisi
Dans les méthodes de retouche par patchs, l'ordre de remplissage des zones à restaurer est
primordial. Cet ordre est défini par une fonction de priorité intégrant deux paramètres : …
Une nouvelle approche d'inpainting d'image basée sur l'algorithme Criminisi
Dans les méthodes de retouche par patchs, l'ordre de remplissage des zones à restaurer est
primordial. Cet ordre est défini par une fonction de priorité intégrant deux paramètres : …
Une nouvelle approche d'inpainting d'image basée sur l'algorithme Criminisi
Dans les méthodes de retouche par patchs, l'ordre de remplissage des zones à restaurer est
primordial. Cet ordre est défini par une fonction de priorité intégrant deux paramètres : …
Détection des fausses nouvelles dans les médias sociaux : approches hybrides d'apprentissage profond
Internet permet la création et la publication de contenus générés par l'utilisateur, ainsi que
l'interaction entre utilisateurs. Compte tenu de l'accessibilité de ces moyens de communication et de leur…
Détection des fausses nouvelles dans les médias sociaux : approches hybrides d'apprentissage profond
Internet permet la création et la publication de contenus générés par l'utilisateur, ainsi que
l'interaction entre utilisateurs. Compte tenu de l'accessibilité de ces moyens de communication et de leur…
Détection des fausses nouvelles dans les médias sociaux : approches hybrides d'apprentissage profond
Internet permet la création et la publication de contenus générés par l'utilisateur, ainsi que
l'interaction entre utilisateurs. Compte tenu de l'accessibilité de ces moyens de communication et de leur…
Détection des fausses nouvelles dans les médias sociaux : approches hybrides d'apprentissage profond
Internet permet la création et la publication de contenus générés par l'utilisateur, ainsi que
l'interaction entre utilisateurs. Compte tenu de l'accessibilité de ces moyens de communication et de leur…
A Chatbot for Automatic Processing of Learner Concerns in an Online Learning Platform
Abstract—In this article, we present a chatbot model that can
automatically respond to learners’ concerns on an online training
platform. The proposed chatbot model is based on an adaptation
of the similarity of Dice to understand the concerns of learners.
The first phase of this approach allows selecting the preestablished concerns that the teacher has in a knowledge base
which are closest to those posed by the learner. The second phase
consists of selecting among these k most appropriate concerns
based on a measure of similarity built on the concept of domain
keywords. The experiment...
A Chatbot for Automatic Processing of Learner Concerns in an Online Learning Platform
Abstract—In this article, we present a chatbot model that can
automatically respond to learners’ concerns on an online training
platform. The proposed chatbot model is based on an adaptation
of the similarity of Dice to understand the concerns of learners.
The first phase of this approach allows selecting the preestablished concerns that the teacher has in a knowledge base
which are closest to those posed by the learner. The second phase
consists of selecting among these k most appropriate concerns
based on a measure of similarity built on the concept of domain
keywords. The experiment...
A Chatbot for Automatic Processing of Learner Concerns in an Online Learning Platform
Abstract—In this article, we present a chatbot model that can
automatically respond to learners’ concerns on an online training
platform. The proposed chatbot model is based on an adaptation
of the similarity of Dice to understand the concerns of learners.
The first phase of this approach allows selecting the preestablished concerns that the teacher has in a knowledge base
which are closest to those posed by the learner. The second phase
consists of selecting among these k most appropriate concerns
based on a measure of similarity built on the concept of domain
keywords. The experiment...
A Chatbot for Automatic Processing of Learner Concerns in an Online Learning Platform
Abstract—In this article, we present a chatbot model that can
automatically respond to learners’ concerns on an online training
platform. The proposed chatbot model is based on an adaptation
of the similarity of Dice to understand the concerns of learners.
The first phase of this approach allows selecting the preestablished concerns that the teacher has in a knowledge base
which are closest to those posed by the learner. The second phase
consists of selecting among these k most appropriate concerns
based on a measure of similarity built on the concept of domain
keywords. The experiment...
A Chatbot for Automatic Processing of Learner Concerns in an Online Learning Platform
Abstract—In this article, we present a chatbot model that can
automatically respond to learners’ concerns on an online training
platform. The proposed chatbot model is based on an adaptation
of the similarity of Dice to understand the concerns of learners.
The first phase of this approach allows selecting the preestablished concerns that the teacher has in a knowledge base
which are closest to those posed by the learner. The second phase
consists of selecting among these k most appropriate concerns
based on a measure of similarity built on the concept of domain
keywords. The experiment...
Algorithme de recommandation de cours basé sur la prédiction des performances en e-learning
L'efficacité des systèmes de recommandation dépend de la performance des algorithmes qui les composent. La qualité des algorithmes dépend de la qualité des stratégies qui les ont conçus. Ces stratégies varient d'un auteur à l'autre. Concevoir un bon système de recommandation implique donc de mettre en œuvre les bonnes stratégies. C'est dans ce contexte que plusieurs travaux de recherche ont été proposés sur diverses stratégies appliquées aux algorithmes pour répondre aux besoins de recommandation. Les chercheurs tentent sans cesse d'atteindre cet objectif de recherche des qualités des algorith...
Algorithme de recommandation de cours basé sur la prédiction des performances en e-learning
L'efficacité des systèmes de recommandation dépend de la performance des algorithmes qui les composent. La qualité des algorithmes dépend de la qualité des stratégies qui les ont conçus. Ces stratégies varient d'un auteur à l'autre. Concevoir un bon système de recommandation implique donc de mettre en œuvre les bonnes stratégies. C'est dans ce contexte que plusieurs travaux de recherche ont été proposés sur diverses stratégies appliquées aux algorithmes pour répondre aux besoins de recommandation. Les chercheurs tentent sans cesse d'atteindre cet objectif de recherche des qualités des algorith...
Algorithme de recommandation de cours basé sur la prédiction des performances en e-learning
L'efficacité des systèmes de recommandation dépend de la performance des algorithmes qui les composent. La qualité des algorithmes dépend de la qualité des stratégies qui les ont conçus. Ces stratégies varient d'un auteur à l'autre. Concevoir un bon système de recommandation implique donc de mettre en œuvre les bonnes stratégies. C'est dans ce contexte que plusieurs travaux de recherche ont été proposés sur diverses stratégies appliquées aux algorithmes pour répondre aux besoins de recommandation. Les chercheurs tentent sans cesse d'atteindre cet objectif de recherche des qualités des algorith...
Algorithme de recommandation de cours basé sur la prédiction des performances en e-learning
L'efficacité des systèmes de recommandation dépend de la performance des algorithmes qui les composent. La qualité des algorithmes dépend de la qualité des stratégies qui les ont conçus. Ces stratégies varient d'un auteur à l'autre. Concevoir un bon système de recommandation implique donc de mettre en œuvre les bonnes stratégies. C'est dans ce contexte que plusieurs travaux de recherche ont été proposés sur diverses stratégies appliquées aux algorithmes pour répondre aux besoins de recommandation. Les chercheurs tentent sans cesse d'atteindre cet objectif de recherche des qualités des algorith...
Algorithme de recommandation de cours basé sur la prédiction des performances en e-learning
L'efficacité des systèmes de recommandation dépend de la performance des algorithmes qui les composent. La qualité des algorithmes dépend de la qualité des stratégies qui les ont conçus. Ces stratégies varient d'un auteur à l'autre. Concevoir un bon système de recommandation implique donc de mettre en œuvre les bonnes stratégies. C'est dans ce contexte que plusieurs travaux de recherche ont été proposés sur diverses stratégies appliquées aux algorithmes pour répondre aux besoins de recommandation. Les chercheurs tentent sans cesse d'atteindre cet objectif de recherche des qualités des algorith...
Algorithme de recommandation de cours basé sur la prédiction des performances en e-learning
L'efficacité des systèmes de recommandation dépend de la performance des algorithmes qui les composent. La qualité des algorithmes dépend de la qualité des stratégies qui les ont conçus. Ces stratégies varient d'un auteur à l'autre. Concevoir un bon système de recommandation implique donc de mettre en œuvre les bonnes stratégies. C'est dans ce contexte que plusieurs travaux de recherche ont été proposés sur diverses stratégies appliquées aux algorithmes pour répondre aux besoins de recommandation. Les chercheurs tentent sans cesse d'atteindre cet objectif de recherche des qualités des algorith...
Algorithme de recommandation de cours basé sur la prédiction des performances en e-learning
L'efficacité des systèmes de recommandation dépend de la performance des algorithmes qui les composent. La qualité des algorithmes dépend de la qualité des stratégies qui les ont conçus. Ces stratégies varient d'un auteur à l'autre. Concevoir un bon système de recommandation implique donc de mettre en œuvre les bonnes stratégies. C'est dans ce contexte que plusieurs travaux de recherche ont été proposés sur diverses stratégies appliquées aux algorithmes pour répondre aux besoins de recommandation. Les chercheurs tentent sans cesse d'atteindre cet objectif de recherche des qualités des algorith...
Algorithme de recommandation de cours basé sur la prédiction des performances en e-learning
L'efficacité des systèmes de recommandation dépend de la performance des algorithmes qui les composent. La qualité des algorithmes dépend de la qualité des stratégies qui les ont conçus. Ces stratégies varient d'un auteur à l'autre. Concevoir un bon système de recommandation implique donc de mettre en œuvre les bonnes stratégies. C'est dans ce contexte que plusieurs travaux de recherche ont été proposés sur diverses stratégies appliquées aux algorithmes pour répondre aux besoins de recommandation. Les chercheurs tentent sans cesse d'atteindre cet objectif de recherche des qualités des algorith...
Algorithme de recommandation de cours basé sur la prédiction des performances en e-learning
L'efficacité des systèmes de recommandation dépend de la performance des algorithmes qui les composent. La qualité des algorithmes dépend de la qualité des stratégies qui les ont conçus. Ces stratégies varient d'un auteur à l'autre. Concevoir un bon système de recommandation implique donc de mettre en œuvre les bonnes stratégies. C'est dans ce contexte que plusieurs travaux de recherche ont été proposés sur diverses stratégies appliquées aux algorithmes pour répondre aux besoins de recommandation. Les chercheurs tentent sans cesse d'atteindre cet objectif de recherche des qualités des algorith...
Algorithme de recommandation de cours basé sur la prédiction des performances en e-learning
L'efficacité des systèmes de recommandation dépend de la performance des algorithmes qui les composent. La qualité des algorithmes dépend de la qualité des stratégies qui les ont conçus. Ces stratégies varient d'un auteur à l'autre. Concevoir un bon système de recommandation implique donc de mettre en œuvre les bonnes stratégies. C'est dans ce contexte que plusieurs travaux de recherche ont été proposés sur diverses stratégies appliquées aux algorithmes pour répondre aux besoins de recommandation. Les chercheurs tentent sans cesse d'atteindre cet objectif de recherche des qualités des algorith...
A New Uncertainty Measure in Belief Entropy Framework
Abstract—Belief entropy, which represents the uncertainty
measure between several pieces of evidence in the DempsterShafer framework, is attracting increasing interest in research.
It has been used in many applications and is mainly based on
the theory of evidence. To quantify uncertainty, several measures
have been proposed in the literature. These measures, sometimes
in extended or hybrid forms, use the Shannon entropy principle to
determine uncertainty degree. However, the failure to consider
the scale of the frame of discernment framework remains an
open issue in quantifying uncert...
A New Uncertainty Measure in Belief Entropy Framework
Abstract—Belief entropy, which represents the uncertainty
measure between several pieces of evidence in the DempsterShafer framework, is attracting increasing interest in research.
It has been used in many applications and is mainly based on
the theory of evidence. To quantify uncertainty, several measures
have been proposed in the literature. These measures, sometimes
in extended or hybrid forms, use the Shannon entropy principle to
determine uncertainty degree. However, the failure to consider
the scale of the frame of discernment framework remains an
open issue in quantifying uncert...
A New Uncertainty Measure in Belief Entropy Framework
Abstract—Belief entropy, which represents the uncertainty
measure between several pieces of evidence in the DempsterShafer framework, is attracting increasing interest in research.
It has been used in many applications and is mainly based on
the theory of evidence. To quantify uncertainty, several measures
have been proposed in the literature. These measures, sometimes
in extended or hybrid forms, use the Shannon entropy principle to
determine uncertainty degree. However, the failure to consider
the scale of the frame of discernment framework remains an
open issue in quantifying uncert...
A New Uncertainty Measure in Belief Entropy Framework
Abstract—Belief entropy, which represents the uncertainty
measure between several pieces of evidence in the DempsterShafer framework, is attracting increasing interest in research.
It has been used in many applications and is mainly based on
the theory of evidence. To quantify uncertainty, several measures
have been proposed in the literature. These measures, sometimes
in extended or hybrid forms, use the Shannon entropy principle to
determine uncertainty degree. However, the failure to consider
the scale of the frame of discernment framework remains an
open issue in quantifying uncert...
A New Uncertainty Measure in Belief Entropy Framework
Abstract—Belief entropy, which represents the uncertainty
measure between several pieces of evidence in the DempsterShafer framework, is attracting increasing interest in research.
It has been used in many applications and is mainly based on
the theory of evidence. To quantify uncertainty, several measures
have been proposed in the literature. These measures, sometimes
in extended or hybrid forms, use the Shannon entropy principle to
determine uncertainty degree. However, the failure to consider
the scale of the frame of discernment framework remains an
open issue in quantifying uncert...
Tree Reconfiguration without Lightpath Interruption in Wavelength Division Multiplexing Optical Networks with Limited Resources
Today, operators use reconfiguration to improve the performance of connection oriented networks. In our previous work, we studied tree reconfiguration without data flow interruption in wavelength division multiplexing optical networks. In our previous approach, the available resources of the network (wavelengths) are not considered as limited. In this work, we study tree reconfiguration in a network which has a limited number of wavelengths per link. This paper proposes an algorithm called TRwRC (Tree reconfiguration with resources constraint). TRwRC reconfigures a tree without data flow inter...
Tree Reconfiguration without Lightpath Interruption in Wavelength Division Multiplexing Optical Networks with Limited Resources
Today, operators use reconfiguration to improve the performance of connection oriented networks. In our previous work, we studied tree reconfiguration without data flow interruption in wavelength division multiplexing optical networks. In our previous approach, the available resources of the network (wavelengths) are not considered as limited. In this work, we study tree reconfiguration in a network which has a limited number of wavelengths per link. This paper proposes an algorithm called TRwRC (Tree reconfiguration with resources constraint). TRwRC reconfigures a tree without data flow inter...
Tree Reconfiguration without Lightpath Interruption in Wavelength Division Multiplexing Optical Networks with Limited Resources
Today, operators use reconfiguration to improve the performance of connection oriented networks. In our previous work, we studied tree reconfiguration without data flow interruption in wavelength division multiplexing optical networks. In our previous approach, the available resources of the network (wavelengths) are not considered as limited. In this work, we study tree reconfiguration in a network which has a limited number of wavelengths per link. This paper proposes an algorithm called TRwRC (Tree reconfiguration with resources constraint). TRwRC reconfigures a tree without data flow inter...
Tree Reconfiguration without Lightpath Interruption in Wavelength Division Multiplexing Optical Networks with Limited Resources
Today, operators use reconfiguration to improve the performance of connection oriented networks. In our previous work, we studied tree reconfiguration without data flow interruption in wavelength division multiplexing optical networks. In our previous approach, the available resources of the network (wavelengths) are not considered as limited. In this work, we study tree reconfiguration in a network which has a limited number of wavelengths per link. This paper proposes an algorithm called TRwRC (Tree reconfiguration with resources constraint). TRwRC reconfigures a tree without data flow inter...
Tree Reconfiguration without Lightpath Interruption in Wavelength Division Multiplexing Optical Networks with Limited Resources
Today, operators use reconfiguration to improve the performance of connection oriented networks. In our previous work, we studied tree reconfiguration without data flow interruption in wavelength division multiplexing optical networks. In our previous approach, the available resources of the network (wavelengths) are not considered as limited. In this work, we study tree reconfiguration in a network which has a limited number of wavelengths per link. This paper proposes an algorithm called TRwRC (Tree reconfiguration with resources constraint). TRwRC reconfigures a tree without data flow inter...
A survey on Image Data Augmentation for Deep Learning
Deep convolutional neural networks have performed remarkably well on many Computer Vision tasks. However, these networks are heavily reliant on big data to avoid overfitting. Overfitting refers to the phenomenon when a network learns a function with very high variance such as to perfectly model the training data. Unfortunately, many application domains do not have access to big data, such as medical image analysis. This survey focuses on Data Augmentation, a data-space solution to the problem of limited data. Data Augmentation encompasses a suite of techniques that enhance the size and quality...
Sciences et Technologies
Lire l'article
A survey on Image Data Augmentation for Deep Learning
Deep convolutional neural networks have performed remarkably well on many Computer Vision tasks. However, these networks are heavily reliant on big data to avoid overfitting. Overfitting refers to the phenomenon when a network learns a function with very high variance such as to perfectly model the training data. Unfortunately, many application domains do not have access to big data, such as medical image analysis. This survey focuses on Data Augmentation, a data-space solution to the problem of limited data. Data Augmentation encompasses a suite of techniques that enhance the size and quality...
Sciences et Technologies
Lire l'article
A constrained convolutional neural network with attention mechanism for image manipulation detection
The information disseminated by online media is often presented in the form
of images, in order to quickly captivate readers and increase audience
ratings. However, these images can be manipulated for malicious purposes,
such as influencing public opinion, undermining media credibility,
disrupting democratic processes or creating conflict within society. Various
approaches, whether relying on manually developed features or deep
learning, have been devised to detect falsified images. However, they
frequently prove less effective when confronted with widespread and
multiple manipulations...
A constrained convolutional neural network with attention mechanism for image manipulation detection
The information disseminated by online media is often presented in the form
of images, in order to quickly captivate readers and increase audience
ratings. However, these images can be manipulated for malicious purposes,
such as influencing public opinion, undermining media credibility,
disrupting democratic processes or creating conflict within society. Various
approaches, whether relying on manually developed features or deep
learning, have been devised to detect falsified images. However, they
frequently prove less effective when confronted with widespread and
multiple manipulations...
A constrained convolutional neural network with attention mechanism for image manipulation detection
The information disseminated by online media is often presented in the form
of images, in order to quickly captivate readers and increase audience
ratings. However, these images can be manipulated for malicious purposes,
such as influencing public opinion, undermining media credibility,
disrupting democratic processes or creating conflict within society. Various
approaches, whether relying on manually developed features or deep
learning, have been devised to detect falsified images. However, they
frequently prove less effective when confronted with widespread and
multiple manipulations...
A constrained convolutional neural network with attention mechanism for image manipulation detection
The information disseminated by online media is often presented in the form
of images, in order to quickly captivate readers and increase audience
ratings. However, these images can be manipulated for malicious purposes,
such as influencing public opinion, undermining media credibility,
disrupting democratic processes or creating conflict within society. Various
approaches, whether relying on manually developed features or deep
learning, have been devised to detect falsified images. However, they
frequently prove less effective when confronted with widespread and
multiple manipulations...
Protocole de planification hybride acyclique et sensible aux débordements pour le contrôle intelligent des feux de circulation
Les embouteillages constituent un problème majeur dans les villes modernes. En augmentant les retards et la pollution, les embouteillages
limitent la mobilité et constituent une menace pour la santé publique. En particulier, à proximité…
Protocole de planification hybride acyclique et sensible aux débordements pour le contrôle intelligent des feux de circulation
Les embouteillages constituent un problème majeur dans les villes modernes. En augmentant les retards et la pollution, les embouteillages
limitent la mobilité et constituent une menace pour la santé publique. En particulier, à proximité…
Protocole de planification hybride acyclique et sensible aux débordements pour le contrôle intelligent des feux de circulation
Les embouteillages constituent un problème majeur dans les villes modernes. En augmentant les retards et la pollution, les embouteillages
limitent la mobilité et constituent une menace pour la santé publique. En particulier, à proximité…
A Convolutional Neural Network for Improved Anomaly-Based Network Intrusion Detection
Cybersecurity protects and recovers computer systems and networks from cyber attacks. The importance of cybersecurity is growing commensurately with people's increasing reliance on technology. An anomaly detection-based network intrusion detection system is essential to any security framework within a computer network. In this article, we propose two models based on deep learning to address the binary and multiclass classification of network attacks. We use a convolutional neural network architecture for our models. In addition, a hybrid two-step preprocessing approach is proposed to generate...
Sciences et Technologies
Lire l'article
A Convolutional Neural Network for Improved Anomaly-Based Network Intrusion Detection
Cybersecurity protects and recovers computer systems and networks from cyber attacks. The importance of cybersecurity is growing commensurately with people's increasing reliance on technology. An anomaly detection-based network intrusion detection system is essential to any security framework within a computer network. In this article, we propose two models based on deep learning to address the binary and multiclass classification of network attacks. We use a convolutional neural network architecture for our models. In addition, a hybrid two-step preprocessing approach is proposed to generate...
Sciences et Technologies
Lire l'article
Deep Learning-Based Two-Step Approach for Intrusion Detection in Networks
Intrusion Detection Systems (IDS) are essential for computer security, with various techniques developed over time. However, many of these methods suffer from high false positive rates. To address this, we propose an approach utilizing Recurrent Neural Networks (RNN). Our method starts by reducing the dataset’s dimensionality using a Deep Auto-Encoder (DAE), followed by intrusion detection through a Bidirectional Long Short-Term Memory (BiLSTM) network. The proposed DAE-BiLSTM model outperforms Random Forest, AdaBoost, and standard BiLSTM models, achieving an accuracy of 0.97, a recall of 0.95...
Deep Learning-Based Two-Step Approach for Intrusion Detection in Networks
Intrusion Detection Systems (IDS) are essential for computer security, with various techniques developed over time. However, many of these methods suffer from high false positive rates. To address this, we propose an approach utilizing Recurrent Neural Networks (RNN). Our method starts by reducing the dataset’s dimensionality using a Deep Auto-Encoder (DAE), followed by intrusion detection through a Bidirectional Long Short-Term Memory (BiLSTM) network. The proposed DAE-BiLSTM model outperforms Random Forest, AdaBoost, and standard BiLSTM models, achieving an accuracy of 0.97, a recall of 0.95...
Deep Learning-Based Two-Step Approach for Intrusion Detection in Networks
Intrusion Detection Systems (IDS) are essential for computer security, with various techniques developed over time. However, many of these methods suffer from high false positive rates. To address this, we propose an approach utilizing Recurrent Neural Networks (RNN). Our method starts by reducing the dataset’s dimensionality using a Deep Auto-Encoder (DAE), followed by intrusion detection through a Bidirectional Long Short-Term Memory (BiLSTM) network. The proposed DAE-BiLSTM model outperforms Random Forest, AdaBoost, and standard BiLSTM models, achieving an accuracy of 0.97, a recall of 0.95...
Deep Learning-Based Two-Step Approach for Intrusion Detection in Networks
Intrusion Detection Systems (IDS) are essential for computer security, with various techniques developed over time. However, many of these methods suffer from high false positive rates. To address this, we propose an approach utilizing Recurrent Neural Networks (RNN). Our method starts by reducing the dataset’s dimensionality using a Deep Auto-Encoder (DAE), followed by intrusion detection through a Bidirectional Long Short-Term Memory (BiLSTM) network. The proposed DAE-BiLSTM model outperforms Random Forest, AdaBoost, and standard BiLSTM models, achieving an accuracy of 0.97, a recall of 0.95...
Deep Learning-Based Two-Step Approach for Intrusion Detection in Networks
Intrusion Detection Systems (IDS) are essential for computer security, with various techniques developed over time. However, many of these methods suffer from high false positive rates. To address this, we propose an approach utilizing Recurrent Neural Networks (RNN). Our method starts by reducing the dataset’s dimensionality using a Deep Auto-Encoder (DAE), followed by intrusion detection through a Bidirectional Long Short-Term Memory (BiLSTM) network. The proposed DAE-BiLSTM model outperforms Random Forest, AdaBoost, and standard BiLSTM models, achieving an accuracy of 0.97, a recall of 0.95...
Redundancy detection protocol for area coverage control in heterogeneous wireless sensor networks
In a wireless sensor network, eliminating redundancies in area
coverage in the deployment zone represents a major challenge
where the stake is its lifetime increase. Current works dealing
with this topic use different deterministic or probabilistic
techniques for nodes redundancies check. In this paper, we
propose a quasi-quadratic time distributed algorithm based on a
deterministic approach enabling each node to know its exact
status even in the context of heterogeneous sensing ranges.
Simulations show that this novel technique is more accurate and
precise in comparison with other tr...
Redundancy detection protocol for area coverage control in heterogeneous wireless sensor networks
In a wireless sensor network, eliminating redundancies in area
coverage in the deployment zone represents a major challenge
where the stake is its lifetime increase. Current works dealing
with this topic use different deterministic or probabilistic
techniques for nodes redundancies check. In this paper, we
propose a quasi-quadratic time distributed algorithm based on a
deterministic approach enabling each node to know its exact
status even in the context of heterogeneous sensing ranges.
Simulations show that this novel technique is more accurate and
precise in comparison with other tr...
Redundancy detection protocol for area coverage control in heterogeneous wireless sensor networks
In a wireless sensor network, eliminating redundancies in area
coverage in the deployment zone represents a major challenge
where the stake is its lifetime increase. Current works dealing
with this topic use different deterministic or probabilistic
techniques for nodes redundancies check. In this paper, we
propose a quasi-quadratic time distributed algorithm based on a
deterministic approach enabling each node to know its exact
status even in the context of heterogeneous sensing ranges.
Simulations show that this novel technique is more accurate and
precise in comparison with other tr...
Minimize Flow Interruptions during Reconfiguration of a set of Light-trees in All-optical WDM Network
Reconfiguration of all-optical WDM networks is an important task performed by the network operators to re-optimize the allocation of network resources. Multicast applications such as video conference and telemedicine are increasingly in demand on the network. Thus, our study focuses on the reconfiguration of multicast connection paths. A multicast connection path is supposed to be a light-tree. The reconfiguration problem studied here is to find a sequence of configurations with minimum cost that allows to migrate an optical flow from a current configuration of a set of light-trees to a final...
Minimize Flow Interruptions during Reconfiguration of a set of Light-trees in All-optical WDM Network
Reconfiguration of all-optical WDM networks is an important task performed by the network operators to re-optimize the allocation of network resources. Multicast applications such as video conference and telemedicine are increasingly in demand on the network. Thus, our study focuses on the reconfiguration of multicast connection paths. A multicast connection path is supposed to be a light-tree. The reconfiguration problem studied here is to find a sequence of configurations with minimum cost that allows to migrate an optical flow from a current configuration of a set of light-trees to a final...
Minimize Flow Interruptions during Reconfiguration of a set of Light-trees in All-optical WDM Network
Reconfiguration of all-optical WDM networks is an important task performed by the network operators to re-optimize the allocation of network resources. Multicast applications such as video conference and telemedicine are increasingly in demand on the network. Thus, our study focuses on the reconfiguration of multicast connection paths. A multicast connection path is supposed to be a light-tree. The reconfiguration problem studied here is to find a sequence of configurations with minimum cost that allows to migrate an optical flow from a current configuration of a set of light-trees to a final...
Minimize Flow Interruptions during Reconfiguration of a set of Light-trees in All-optical WDM Network
Reconfiguration of all-optical WDM networks is an important task performed by the network operators to re-optimize the allocation of network resources. Multicast applications such as video conference and telemedicine are increasingly in demand on the network. Thus, our study focuses on the reconfiguration of multicast connection paths. A multicast connection path is supposed to be a light-tree. The reconfiguration problem studied here is to find a sequence of configurations with minimum cost that allows to migrate an optical flow from a current configuration of a set of light-trees to a final...
Managing an External Depot in a Production Routing Problem
Abstract—This paper addresses a production and distribution
problem in a supply chain. The supply chain consists of a plant
with no storage capacity that produces only one type of product.
The manufactured products are then transported to a depot for
storage. Customers demand is met by a homogeneous fleet of
vehicles that begins and ends their trips at the depot. The
objective of the study is to minimize the overall cost of
production, inventory and transport throughout the supply
chain. A Branch-and-Cut and a hybrid Two Phases
Decomposition Heuristic using a Mixed Integer Programming...
Managing an External Depot in a Production Routing Problem
Abstract—This paper addresses a production and distribution
problem in a supply chain. The supply chain consists of a plant
with no storage capacity that produces only one type of product.
The manufactured products are then transported to a depot for
storage. Customers demand is met by a homogeneous fleet of
vehicles that begins and ends their trips at the depot. The
objective of the study is to minimize the overall cost of
production, inventory and transport throughout the supply
chain. A Branch-and-Cut and a hybrid Two Phases
Decomposition Heuristic using a Mixed Integer Programming...
Managing an External Depot in a Production Routing Problem
Abstract—This paper addresses a production and distribution
problem in a supply chain. The supply chain consists of a plant
with no storage capacity that produces only one type of product.
The manufactured products are then transported to a depot for
storage. Customers demand is met by a homogeneous fleet of
vehicles that begins and ends their trips at the depot. The
objective of the study is to minimize the overall cost of
production, inventory and transport throughout the supply
chain. A Branch-and-Cut and a hybrid Two Phases
Decomposition Heuristic using a Mixed Integer Programming...
Managing an External Depot in a Production Routing Problem
Abstract—This paper addresses a production and distribution
problem in a supply chain. The supply chain consists of a plant
with no storage capacity that produces only one type of product.
The manufactured products are then transported to a depot for
storage. Customers demand is met by a homogeneous fleet of
vehicles that begins and ends their trips at the depot. The
objective of the study is to minimize the overall cost of
production, inventory and transport throughout the supply
chain. A Branch-and-Cut and a hybrid Two Phases
Decomposition Heuristic using a Mixed Integer Programming...
Algorithme de localisation sans ancre utilisant des contrôleurs dans des réseaux de capteurs sans fil
La localisation des capteurs sans fil est un aspect très important des réseaux de capteurs sans fil (WSN)
car elle détermine le bon fonctionnement et la durée de vie des capteurs sans fil qui…
Algorithme de localisation sans ancre utilisant des contrôleurs dans des réseaux de capteurs sans fil
La localisation des capteurs sans fil est un aspect très important des réseaux de capteurs sans fil (WSN)
car elle détermine le bon fonctionnement et la durée de vie des capteurs sans fil qui…
Algorithme de localisation sans ancre utilisant des contrôleurs dans des réseaux de capteurs sans fil
La localisation des capteurs sans fil est un aspect très important des réseaux de capteurs sans fil (WSN)
car elle détermine le bon fonctionnement et la durée de vie des capteurs sans fil qui…
Optimisation de la latence dans les réseaux SDN
Contrairement aux réseaux traditionnels, les réseaux définis par logiciel (SDN) se caractérisent par une séparation physique du contrôle et du plan de transfert. Ainsi, un contrôleur centralisé communique les fonctions du plan de contrôle à chaque appareil via le protocole OpenFlow dès qu'il le lui demande ou qu'il le juge approprié. Cela a un impact important sur le temps de latence, un facteur important pour les nouveaux services ou les applications multimédias. Afin d'optimiser le temps de transmission des données réseau avec le SDN, une approche proactive basée sur l'algorithme de contre-p...