Publications (115)
ARTICLE
A mobile cloud-based application for renal insufficiency patient monitoring
Lydie Simone Tapsoba, Ferdinand GUINKO, et Hatem Ben Sta,Burkina Faso is witnessing a rising of Chronic Kidney Diseases (CKD). Despite numerous challenges to the healthcare systems, the government has recognized CKD as a top priority in his agenda and has set effective strategies against the disease. To go along with the government strategy we have...
ARTICLE
Packet Microwave Layer 1 and Layer 2 Throughput in E-band for Mobile Broadband Communications
Sawadogo Moumouni, Sanou SR, Kebre BM, Doumounia A, Illa K, Zougmoré F.We have more innovation on Ethernet wireless links nowadays. The introduction of the E-band and V-Band provide more spectral capacity to build microwave links with high throughput. That is done with Ethernet and MPLS in a microwave technology. In this paper we describe the evolution, application...
ARTICLE
Tone Reservation Based Gaussian Clipping and Filtering for OFDM PAPR Mitigation
Palicot Jacques, Louet Yves, Guel, DesireIn this paper, a new Tone Reservation (TR) method to decrease the OFDM Peak to Average Power Ratio (PAPR) is described. The proposed TR method is based on a new Clipping Function: the Gaussian function to generate the signal which will be inserted on the reserved tones. The advantages of this...
ARTICLE
A New Clipping Function for PAPR Mitigation: The Gaussian Clipping Function
Jacques Palicot, Yves Louet, Désiré GuelA Gaussian function to clip multicarrier modulation is presented in this paper in order to decrease their Peak to Average Power Ratio (PAPR). The Gaussian clipping (GC) function is a soft non-linear function which keeps constant the average power of the signal, what is a characteristic of great...
ARTICLE
G-Cloud: Opportunities and Security Challenges for Burkina Faso
Didier Bassole, Frédéric T Ouedraogo, Oumarou SieIn this paper, we try to clearly outline the opportunities of cloud computing in the context of developing countries, while helping stakeholders grasp the challenges ahead. In particular, we consider the case of the G-Cloud project engaged by the government of Burkina Faso to boost the ICT...
ARTICLE
Accessibility of the ccTLDs Name Servers of West African Countries
Frédéric T. Ouédraogo, Didier BassoléA compléter
ARTICLE
Impact of Small-World Effect on the ip-level Routing Dynamics
Frédéric Tounwendyam Ouédraogo, Tegawendé Bissyandé, Sawadogo Daouda, Didier Bassolé, Abdoulaye Séré, Oumarou SiéRunning periodically traceroute-like measurements at suite frequency from a given monitor towards a fixed set of destinations allows observing a dynamics of routing topology around the monitor. This observed dynamics has revealed two main characteristics: the topology evolves at a pace much...
ARTICLE
Arnaoudova Venera, Giuliano Antoniol. Fragile base-class problem, problem?
Aminata Zerbo/Sabané, Tegawendé F BissyandéThe fragile base-class problem (FBCP) has been described in the literature as a consequence of “misusing” inheritance and composition in object-oriented programming when (re)using frameworks. Many research works have focused on preventing the FBCP by proposing alternative mechanisms for...
ARTICLE
Finding the best compromise between design quality and testing eort during refactoring
Rodrigo Morales; Aminata Sabane; Pooya Musavi; Foutse Khomh; Francisco Chicano; Giuliano AntoniolAnti-patterns are poor design choices that hinder code evolution, and understandability. Practitioners perform refactoring, that are semantic-preserving-code transformations, to correct anti-patterns and to improve design quality. However, manual refactoring is a consuming task and a heavy...
ARTICLE
Empirical assessment of machine learning-based malware detectors for Android
T. BISSYANDETo address the issue of malware detection through large sets of applications, researchers have recently started to investigate the capabilities of machine-learning techniques for proposing effective approaches. So far, several promising results were recorded in the literature, many approaches...
ARTICLE
Évaluation de l’impact de fautes matérielles sur le logiciel par Model Checking.
Didier Bassole, Jean-Louis Lanet, and Axel LegayA compléter
COMMUNICATION
Energy-free Security in Wireless Sensor Networks
Adel Elgaber (1) , Julien Bernard (1) , Yacouba Ouattara (1)Wireless sensor networks are often deployed in open and uncontrolled environments that make them more vulnerable to security attacks. Cryptographic algorithms can be used to protect the data collected by the sensors against an intruder. The cost in terms of energy to provide enough security can...
ARTICLE
Energy-free Security in Wireless Sensor Networks
Adel Elgaber, Julien Bernard, Yacouba OuattaraWireless sensor networks are often deployed in open and uncontrolled environments that make them more vulnerable
to security attacks. Cryptographic algorithms can be used to protect the data collected by the sensors against an intruder. The cost in terms of energy to provide enough security can...
ARTICLE
Évaluation de l’impact de fautes matérielles sur le logiciel par Model Checking
D. BASSOLE, Jean-Louis Lanet, and Axel LegayLa mutation de programme dû à un défaut d'environnement est susceptible de générer des problèmes de sécurité comme la non exécution de procédure de vérification, le saut de bloc d'instruction etc.. Pour les éradiquer il est nécessaire de comprendre les effets de ces perturbations...
ARTICLE
Three Thresholds for the Efficiency in Energy Management in WSN
Yacouba Ouattara, Christophe Lang, and Adel ElgaberNowadays, the domain of sensor networks constitutes a very active research field. People are using a lot of
low cost networks. As a result, they are facing an important energy management problem. Consequently, Researchers have tried to ensure long life to networks [1]-[8]. LEACH, PEGASUS, TEEN...