Publications (115)
COMMUNICATION
A mobile cloud-based application for renal insufficiency patient monitoring
Lydie Simone Tapsoba, Ferdinand GUINKO, et Hatem Ben Sta,
Burkina Faso is witnessing a rising of Chronic Kidney Diseases (CKD). Despite numerous challenges to the healthcare systems, the government has recognized CKD as a top priority in his agenda and has set effective strategies against the disease. To go along with the government strategy we have proposed a mobile health application architecture f(...)
Mots clés non renseignés
ARTICLE
Packet Microwave Layer 1 and Layer 2 Throughput in E-band for Mobile Broadband Communications
Sawadogo Moumouni, Sanou SR, Kebre BM, Doumounia A, Illa K, Zougmoré F.
We have more innovation on Ethernet wireless links nowadays. The introduction of the E-band and V-Band provide more spectral capacity to build microwave links with high throughput. That is done with Ethernet and MPLS in a microwave technology. In this paper we describe the evolution, application and best opportunities to use microwave in E-ban(...)
Microwave; Wireless; E-band; V-band
ARTICLE
Tone Reservation Based Gaussian Clipping and Filtering for OFDM PAPR Mitigation
Palicot Jacques, Louet Yves, Guel, Desire
In this paper, a new Tone Reservation (TR) method to decrease the OFDM Peak to Average Power Ratio (PAPR) is described. The proposed TR method is based on a new Clipping Function: the Gaussian function to generate the signal which will be inserted on the reserved tones. The advantages of this approach is twofold: First, the Gaussian clipping f(...)
Peak to average power ratio, Frequency-domain analysis, Filtering, Bit error rate
ARTICLE
A New Clipping Function for PAPR Mitigation: The Gaussian Clipping Function
Jacques Palicot, Yves Louet, Désiré Guel
A Gaussian function to clip multicarrier modulation is presented in this paper in order to decrease their Peak to Average Power Ratio (PAPR). The Gaussian clipping (GC) function is a soft non-linear function which keeps constant the average power of the signal, what is a characteristic of great importance in real transmission. The characterist(...)
PAPR, Clipping, Gaussian Clipping
ARTICLE
G-Cloud: Opportunities and Security Challenges for Burkina Faso
Didier Bassole, Frédéric T Ouedraogo, Oumarou Sie
In this paper, we try to clearly outline the opportunities of cloud computing in the context of developing countries, while helping stakeholders grasp the challenges ahead. In particular, we consider the case of the G-Cloud project engaged by the government of Burkina Faso to boost the ICT economy, improve administration-citizen relations, and(...)
Mots clés non renseignés
ARTICLE
Accessibility of the ccTLDs Name Servers of West African Countries
Frédéric T. Ouédraogo, Didier Bassolé
A compléter
Mots clés non renseignés
ARTICLE
Impact of Small-World Effect on the ip-level Routing Dynamics
Frédéric Tounwendyam Ouédraogo, Tegawendé Bissyandé, Sawadogo Daouda, Didier Bassolé, Abdoulaye Séré, Oumarou Sié
Running periodically traceroute-like measurements at suite frequency from a given monitor towards a fixed set of destinations allows observing a dynamics of routing topology around the monitor. This observed dynamics has revealed two main characteristics: the topology evolves at a pace much higher than expected and the occurrence of observed i(...)
Mots clés non renseignés
ARTICLE
Arnaoudova Venera, Giuliano Antoniol. Fragile base-class problem, problem?
Aminata Zerbo/Sabané, Tegawendé F Bissyandé
The fragile base-class problem (FBCP) has been described in the literature as a consequence of “misusing” inheritance and composition in object-oriented programming when (re)using frameworks. Many research works have focused on preventing the FBCP by proposing alternative mechanisms for reuse, but, to the best of our knowledge, there is no pre(...)
Mots clés non renseignés
ARTICLE
Finding the best compromise between design quality and testing eort during refactoring
Rodrigo Morales; Aminata Sabane; Pooya Musavi; Foutse Khomh; Francisco Chicano; Giuliano Antoniol
Anti-patterns are poor design choices that hinder code evolution, and understandability. Practitioners perform refactoring, that are semantic-preserving-code transformations, to correct anti-patterns and to improve design quality. However, manual refactoring is a consuming task and a heavy burden for developers who have to struggle to complete(...)
Mots clés non renseignés
ARTICLE
Empirical assessment of machine learning-based malware detectors for Android
T. BISSYANDE
To address the issue of malware detection through large sets of applications, researchers have recently started to investigate the capabilities of machine-learning techniques for proposing effective approaches. So far, several promising results were recorded in the literature, many approaches being assessed with what we call in the lab validat(...)
Mots clés non renseignés
ARTICLE
Évaluation de l’impact de fautes matérielles sur le logiciel par Model Checking.
Didier Bassole, Jean-Louis Lanet, and Axel Legay
A compléter
Mots clés non renseignés
COMMUNICATION
Energy-free Security in Wireless Sensor Networks
Adel Elgaber (1) , Julien Bernard (1) , Yacouba Ouattara (1)
Wireless sensor networks are often deployed in open and uncontrolled environments that make them more vulnerable to security attacks. Cryptographic algorithms can be used to protect the data collected by the sensors against an intruder. The cost in terms of energy to provide enough security can be quite large as these algorithms may be very co(...)
Mots clés non renseignés
ARTICLE
Energy-free Security in Wireless Sensor Networks
Adel Elgaber, Julien Bernard, Yacouba Ouattara
Wireless sensor networks are often deployed in open and uncontrolled environments that make them more vulnerable
to security attacks. Cryptographic algorithms can be used to protect the data collected by the sensors against an intruder. The cost in terms of energy to provide enough security can be quite large as these algorithms may be very c(...)
Wireless sensor networks; security; compression; energy
ARTICLE
Évaluation de l’impact de fautes matérielles sur le logiciel par Model Checking
D. BASSOLE, Jean-Louis Lanet, and Axel Legay
La mutation de programme dû à un défaut d'environnement est susceptible de générer des problèmes de sécurité comme la non exécution de procédure de vérification, le saut de bloc d'instruction etc.. Pour les éradiquer il est nécessaire de comprendre les effets de ces perturbations sur le logiciel. Souvent les travaux explorent les effets au niv(...)
Mots clés non renseignés
ARTICLE
Three Thresholds for the Efficiency in Energy Management in WSN
Yacouba Ouattara, Christophe Lang, and Adel Elgaber
Nowadays, the domain of sensor networks constitutes a very active research field. People are using a lot of
low cost networks. As a result, they are facing an important energy management problem. Consequently, Researchers have tried to ensure long life to networks [1]-[8]. LEACH, PEGASUS, TEEN and APTEEN are pioneers in the reduction of WSN e(...)
Wirless, WSN