Publications (193)
ARTICLE
Implementation of E-health in Burkina Faso : A Status Report
Sadouanouan MALO, Lydie Simone Kone/ Tapsoba, Yaya TRAORE
The term e-health refers to all areas where information and communication technologies (ICT) are used for health. E-health appears more and more as a relevant solution to meet the challenges health systems are facing. However, despite its interest, e-health has long remained underexploited in Burkina Faso even if many softwares have been the s(...)
Interoperability • Hospital information system • Ontology • Web service
ARTICLE
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE (IAAS) : STUDY OF ARCHITECTURAL APPROACHES
Kyelem Yacouba, Kabore Kiswendsida Kisito, Ouedraogo Tounwendyam Frédéric, Sèdes Florence
Recommendation systems only provide more specific recommendations to users. They do not consider
giving a justification for the recommendation. However, the justification for the recommendation allows the
user to make the decision whether or not to accept the recommendation. It also improves user satisfaction
and the relevance of the recomm(...)
IAAS,, justification of recommendations, weight of comments, relevance of recommendations, justification of recommendation architecture for IAAS.
ARTICLE
Towards an Ontology for Islamic Finance
Sione Aboubaca, Kabore Kiswendsida Kisito, Traore Yaya
Islamic finance is a close combination of
conventional finance, ethics, Islamic law, and
jurisprudence. It has developed in an unprecedented way
over the past half-century and has attracted the attention
of Western central banks. It has been adopted by several
countries, including non-Muslim countries, to deal with
the excesses of conven(...)
Islamic finance, sharia, banking, Halal, Haram, riba, ontology.
ARTICLE
Study of the migration of a Document Unit Recommendation Service to Cloud Computing»
Kiswendsida Kisito Kaboré, Bertin Kaboré
Cloud Computing is a major current trend to distribute processing and data virtually on configurable execution environments.
The development and deployment of software for the Cloud proposes a new scientific challenge in terms of expression and consideration
of variability. Indeed, cloud computing is based on principles of heterogeneity and(...)
Application's migrations, Big Data, Cloud computing, Data migration, IAAS, Recommendation system.
ARTICLE
Early Detection of Security-Relevant Bug Reports using Machine Learning: How Far Are We?
Arthur D. Sawadogo, Quentin Guimard, Tegawendé F. Bissyandé, Abdoul Kader Kaboré, Jacques Klein, Naouel Moha
Bug reports are common artefacts in software development. They serve as the main channel for users to communicate to developers information about the issues that they encounter when using released versions of software programs. In the descriptions of issues, however, a user may, intentionally or not, expose a vulnerability. In a typical mainte(...)
vulnerabilities, silent fixes, automatic monitoring, source code, bugs reports
ARTICLE
Comparative study of justification Methods in recommender systems: Example of information access Assistance service (IAAS)
Kyelem Yacouba, Kabore Kiswendsida Kisito, Ouedraogo Tounwendyam Frédéric, Sèdes Florence
Justification of recommendations increases trust between users and the system but also
generates more relevant recommendations than recommendation systems that do not
incorporate it. That is why, we conducted a justification study of the recommendation for IAAS.
Our comparative study shows that IAAS, which currently does not offer the oppor(...)
IAAS, Justification in Recommender Systems, users reviews, weight of reviews.
ARTICLE
Intrusions Detection and Classification Using Deep Learning Approach
Léonard M Sawadogo, Didier Bassolé, Gouayon Koala, Oumarou Sié
In this paper we propose an intrusions detection technique using Deep Learning approach that can classify different types of attacks based on user behavior and not on attacks signatures. The Deep Learning approach used is Supervised Learning model called Convolutional Neural Networks (CNN) coupled with Tree Structure whose set is named Tree-CN(...)
Mots clés non renseignés
ARTICLE
Hybrid Approach to Cross-Platform Mobile Interface Development for IAAS
Yacouba Kyelem, Kisito Kiswendsida Kabore, Didier Bassole
Information Access Assistant Service (IAAS) is a collaborative filtered document recommendation system. The validation of the model was carried out by implementing the system on a library management software in a target and closed environment using Web technology. The tests are performed with computers, which limits the use of IAAS. As of toda(...)
IAAS, Cross-platform, Ionic, Hybrid approach
ARTICLE
IA et Afrique: quel développement?
Didier Bassolé, Claude Lishou, Sadouanouan Malo, Sere Abdoulaye, Alain Mille
L’intelligence artificielle se développe en Afrique dans un contexte culturel, économique et social spécifique. Dans cet article nous précisons l’impact de ce contexte, analysons les conditions de l’émergence d’une IA africaine. En articulation étroite avec les initiatives institutionnelles, nous proposons une dynamique ascendante associant fo(...)
Mots clés non renseignés
ARTICLE
Current Status of e-Health in Burkina Faso
Lydie Simone KONE/TAPSOBA, Yaya TRAORE, Sadouanouan MALO
The term e-health refers to all areas where information and communication technologies (ICT) are used for health. E-health appears more and more as a relevant solution to meet the challenges health systems are facing. However, despite its interest, e-health has long remained underexploited in Burkina Faso even if many softwares have been the s(...)
Hospital information system; interoperability; web service.
COMMUNICATION
Current Status of e-health in Burkina Faso
Lydie Simone TAPSOBA, Yaya TRAORE, et Sadouanouan MALO
The term e-health refers to all areas where information and communication technologies (ICT) are used for health. E-health appears more and more as a relevant solution to meet the challenges health systems are facing. However, despite its interest, e-health has long remained underexploited in Burkina Faso even if many softwares have been the s(...)
Mots clés non renseignés
ARTICLE
Revisiting the VCCFinder approach for the identification of vulnerability-contributing commits
Timothé Riom, Arthur Sawadogo, Kevin Allix, Tegawendé F Bissyandé, Naouel Moha, Jacques Klein
Detecting vulnerabilities in software is a constant race between development teams and potential attackers. While many static and dynamic approaches have focused on regularly analyzing the software in its entirety, a recent research direction has focused on the analysis of changes that are applied to the code. VCCFinder is a seminal approach i(...)
timely patching, security patches, code repositories, vulnerabilities, silent fixes, co-training, automatic monitoring, source code, security-relevant changes
ARTICLE
Detection of Vulnerabilities Related to Permissions Requests for Android Apps Using Machine Learning Techniques
Didier Bassolé, Yaya Traoré, Gouayon Koala, Franklin Tchakounté & Oumarou Sié
Android application vulnerabilities are weaknesses in the applications or their design that allow an attacker to execute commands, access unauthorised data and carry out denial of service attacks. In this paper, we try to improve the detection of vulnerabilities, especially those based on permissions in Android applications. We propose a model(...)
Vulnerability, Permission-based, Machine learning, Android applications
ARTICLE
An Agent-Based Study of the Impact of Sensitization on the Spread of Covid 19 in Burkina Faso
E. Youl, S. Malo, S. Ouaro
Emerging infectious diseases, such as severe acute respiratory syndrome (SARS), pose a major threat to public health. Despite intense research efforts on how, when and where these new diseases appear, they are still a source of considerable uncertainty. An outbreak of a new coronavirus, severe acute respiratory syndrome coronavirus 2 (SARS - C(...)
Agent-based approach Information diffusion Contact networks COVD - 19
ARTICLE
A Framework for Data Research in GIS Database using Meshing Techniques and the Map-Reduce Algorithm
SERE Abdoulaye, Jean Serge Dimitri OUATTARA, Didier BASSOLE, Jose Arthur OUEDRAOGO, Moubaric KABORE
Everywhere, centers, laboratories, hospital and pharmacy have faced many challenges to delivery quality of health service due to constraints related to limited availability of resources such as drugs, places, equipments and specialists, often in health deficit with increasing number of patients, for instance during COVID-19 pandemic. Late info(...)
Mots clés non renseignés