Publications (269)
COMMUNICATION
Study and design of a multi-user detection based radio platform in vehicular ad hoc networks
Pegdwindé Justin Kouraogo , Zbigniew Dziong, Mohamad Haidar, François Gagnon
In this work we study a system and mechanism designed to enhance the throughput and the packet delivery ratio of a multiuser detection based vehicular ad hoc network (VANET), in two radios channels models. The first models we take into account is the wideband multipath channel and the second a vehicular-to-vehicular radio channel. We have used(...)
VANET, Multiuser detection, SDR plateform, channel prédiction
COMMUNICATION
Automédication à l’ère du numérique: enquête auprès de la population de la ville de Ouagadougou (Burkina Faso)
RA YAMEOGO, L BERE, P ZABSONRE, N MEDA
Introduction : L’automédication est un phénomène fréquent avec des conséquences telle que l’émergence des résistances bactériennes. Cette tendance pourrait être en pleine croissance avec l’ère du numérique avec l’amélioration de l’accès à internet et aux informations. L’objet de notre étude était de décrire l’impact d’internet sur la pratique(...)
Automédication, internet, Antibiotiques, Anti-inflammatoires
COMMUNICATION
Speed and Interference Effect Analysis in Multiuser Detection Based Radio Platform for Vehicular Ad Hoc Network
Pegdwindé Justin Kouraogo, Zbigniew Dziong, Mohamad Haidar, François Gagnon
This work presents the performance evaluation of the cross-layer prediction framework in the context of ad hoc network mobility and multiple access interference. Node mobility influences the quality of channel prediction and, obviously, packet reception. It also leads to varying levels of interference, depending on the scenario used and the nu(...)
VANET, SDR plateform, multiuser detection, interference
ARTICLE
Measures To Enhance The Characterization Of Internet Exchange Points
Y. Dabone, T. F. Ouedraogo, O. Sie
The reliability of data transport on the Internet is one of the objectives of researchers in the field of computer science. Data such as videos and audio is becoming increasingly large. Therefore, transporting them over the Internet is becoming difficult. It has therefore been important to establish a method of locally interconnecting autonomo(...)
Characteristic, Autonomous System, Internet Service Provider, Internet eXchange Point
ARTICLE
Evaluating Acoustic Parameters for DeepFake Audio Identification
Albérick Euraste Djiré; Aminata Sabané; Abdoul-Kader Kabore; Rodrique Kafando; Tégawendé F. Bissyandé
The progress made in the field of machine learning applied to signal processing offers interesting perspectives in terms of technological evolution but also causes some troubles in terms of ethics and security. For example, we are witnessing the emergence of audio deepFakes used to orchestrate scams. However, although the tools used in the gen(...)
Deep learning, deepFake audio, Deepfakes, detection, Ethics, Mel frequency cepstral coefficient, mel-spectogram, MFCC, Reliability, Security
COMMUNICATION
Leveraging Conversational AI for Accelerating User-Driven Software Testing
Aminata Sabané, Laura Plein, Tegawendé F. Bissyandé
This work addresses a research challenge in automating the translation of natural language inputs into programming language specifications. We consider the case of bug reports, which are informally written by users, and that must be specifying into executable test cases for reproducing the bug on the target software. Software bugs are indeed l(...)
test generation, LLM, bug report
ARTICLE
Emergency Severity Index (ESI) a more suitable system for emergencies in Burkina Faso
Tougba Manegaouindé Roland, Zerbo Boureima, Guel, Désiré, Kouraogo Justin
The triage system an emergency department must prioritize the patients' needs above all else. Additionally, it enables improved care organization based on client type, institutional mission, and available resources. In order to conduct effective triage, the Orientation and Reception Nurse (ORN) should employ a reliable, valid, and reproducible(...)
Emergency Severity Index (ESI), ECG, SpO2, Healthcare, patient
COMMUNICATION
Enhancing Power Efficiency in NB-IoT Networks: PAPR Reduction in SC-FDMA
Désiré Guel, P. Justin Kouraogo, Boureima Zerbo, Modeste Dembele
NB-IoT, short for NarrowBand IoT, is a communication standard designed to enable the communication of a large number of connected objects over long distances. One of the research areas in NB-IoT systems is the Peak-to-Average Power Ratio (PAPR). NB-IoT, which is an extension of the LTE (Long Term Evolution) technology of 4G, uses the Single Ca(...)
Peak to Average Power Ratio (PAPR), Single-carrier FDMA (SC-FDMA), Narrowband { Internet of Things (NB-IoT) Networks
ARTICLE
Emergency Severity Index (ESI), a more suitable system for emergencies in Burkina Faso
Roland M. TOUGMA, Boureima ZERBO, Désiré GUEL, P. Justin KOURAOGO
The triage system an emergency department must prioritize the patients' needs above all else. Additionally, it enables improved care organization based on client type, institutional mission, and available resources. In order to conduct effective triage, the Orientation and Reception Nurse (ORN) should employ a reliable, valid, and reproducible(...)
Emergency Severity Index (ESI), Electrocardiogram (ECG), Pulse Oxymetry, Healthcare, patient
ARTICLE
Enhancing Power Efficiency in NB-IoT Networks: PAPR Reduction in SC-FDMA
Désiré Guel, P. Justin Kouraogo, Boureima Zerbo, Modeste Dembele
NB-IoT, short for NarrowBand IoT, is a communication standard designed to enable the communication of a large number of connected objects over long distances. One of the research areas in NB-IoT systems is the Peak-to-Average Power Ratio (PAPR). NB-IoT, which is an extension of the LTE (Long Term Evolution) technology of 4G, uses the Single Ca(...)
Peak to Average Power Ratio (PAPR) Single-carrier FDMA (SC-FDMA) Narrowband { Internet of Things (NB-IoT) Networks
ARTICLE
Indexing and Searching Visual Content in a Data Lake Context
S. Sore, F. T. Ouedraogo, Y. Traore and M. Bikienga
Nowadays, we are witnessing a steady increase in the number of available images, whether for experts or the general public, particularly in the age of Big Data, where data are distinguished by their volume, variety, authenticity and speed. Often, these vast databases contain numerous images, accompanied by texts and annotations more or less de(...)
Big data, data lake, image, visual search, visual descriptor
COMMUNICATION
Characterization of Malicious URLs Using Machine Learning and Feature Engineering
Sidwendluian Romaric Nana, Didier Bassolé, Jean Serge Dimitri Ouattara & Oumarou Sié
In this paper, we use Machine Learning models for malicious URL detection and classification by Feature Engineering techniques. These models were implemented with scikit-learn using Random Forest, Support Vector Machine and XGBoost classifier algorithms. Our models were trained, tested, and then optimized with a dataset of 641,125 URLs (benign(...)
Malicious URL, Characterization, Feature Engineering, Detection
ARTICLE
Early alert of an outbreak based on event detection and tracking on social networks: The case of Covid-19 and meningitis
Julie Thiombiano; Yaya Traore; Sadouanouan Malo
In this paper, we propose an early warning approach for the occurrence of meningitis or Covid-19 epidemics based on the analysis of Twitter messages (tweets). To achieve this, we initially employed automatic classification techniques using Natural Language Processing and domain ontologies to filter the tweets. Subsequently, we utilized the met(...)
Event Detection, Location Prediction, Classification, Twitter, Geo-tagging
ARTICLE
Automatic Graphical User Interface aesthetic evaluation tool using the UIED segmentation algorithm
Yacouba Kyelem, Mamadou Zo, Kisito K. Kabore, Frédéric T. Ouedraogo
In this work, we deal with the issue of automating the evaluation of the aesthetics of the user's applications interfaces. The aesthetics of the user interface is a sub-factor of software quality. The aesthetics of the interface provides several advantages to the users, such as the attraction of the interface, an impact on the usability of the(...)
Automatic Graphical User Interface, aesthetic evaluation , segmentation algorithm
ARTICLE
Software Vulnerabilities’ Detection by analysing application execution traces
Gouayon KOALA, Didier BASSOLE, Telesphore TIENDREBEOGO and Oumarou SIE
Over the years, digital traces have proven to be significant for analyzing IT systems, including applications. With the persistent threats arising from the widespread proliferation of malware and the evasive techniques employed by cybercriminals, researchers and application vendors alike are concerned about finding effective solutions. In this(...)
Execution traces; events; vulnerability detection; malware; applications