384 results on '"A. Gueye"'
Search Results
2. Demo: A Low-Cost Honeynet Infrastructure For Smishing Data Collection.
3. Ontology-Driven Approach for Competency-Oriented and Student-Centered Engineering Education.
4. XGBoost Algorithm to Predict a Patient's Risk of Stroke.
5. F4PW: Fog Computer for Pregnant Women.
6. Fundamental Limitations in High Speed and Low Cost Architecture Free Space Optical (FSO) Networks for Rural Populations.
7. Using machine learning for anomaly detection in drinking water from distribution network.
8. Geo-Semantic Event-POI Matching of Large Mobility Datasets.
9. Embedding-Enhanced Similarity Metrics for Next POI Recommendation.
10. Data Balancing Process to Strengthen a Malaria Control Prediction System in Senegal.
11. A New Strategy for Reducing Latency with Deep Learning in Fog Computing Environment.
12. Row Conditional-TGAN for Generating Synthetic Relational Databases.
13. Evaluating Mobile Banking Application Security Posture Using the OWASP's MASVS Framework.
14. Digital Public Goods Interoperability: A Low-Code Middleware Approach.
15. Physics-Electronics Practical Work Model Accessible and Manipulable Remotely via the Web.
16. Towards a Smart Learning Application for Visual Impaired People.
17. A Learning and Control Perspective for Microfinance.
18. Towards an Optimal Placement of Learning Resources in a Fog Computing Based E-Learning System: The Case of UVS.
19. A Dual Ring Architecture Using Controllers for Better Load Balancing in a Fog Computing Environment.
20. Pest Birds Detection Approach in Rice Crops Using Pre-trained YOLOv4 Model.
21. Une méthode KNN sans paramètre pour prédire les notes des utilisateurs.
22. Remote Practical Work Environment based on Containers to replace Virtual Machines.
23. Software Implementation of a Code-Based Key Encapsulation Mechanism from Binary QD Generalized Srivastava Codes.
24. Threat Mitigation Model with Low False Alarm Rate Based on Hybrid Deep Belief Network.
25. D-Braille: A Digital Learning Application for People with Low Vision.
26. Performance Analysis of Mixed MIMO RF/FSO DF Relaying Based on Globally Coupled Low Density Parity Check (GC-LDPC) Codes.
27. Education 4.0: Proposal of a Model for Autonomous Management of Learning Processes.
28. Security Analysis of a Cryptosystem Based on Subspace Subcodes.
29. Cloud and WebRTC based Laboratory Solution for Practical Work in Computer Science for a Traditional University.
30. Proposing solutions with an application server implementing telephony services in the IMS network.
31. Proposal for an alert and monitoring solution based on the SIP and IoT protocol: the case of agriculture.
32. Web Based Composition using Machine Learning Approaches: A Literature Review.
33. A comparative analysis of SOAP and REST Web service composition based on performance in local and remote Cloud environments.
34. Collaborative Platform for Supervision and Advice of Agricultural Engineer to Farmers Thanks to IoT and WebRTC.
35. DeepDDoS: A Deep-Learning Model for Detecting Software Defined Healthcare IoT Networks Attacks.
36. Performance Analysis of Mixed MIMO RF/FSO DF Relaying Based on Globally Coupled Low Density Parity Check (GC-LDPC) Codes.
37. Proposal for a Deployment of a Non-standalone 5G Mobile Network Architecture for Developing Countries: Case of Senegal.
38. Poster: Proposal of an Intelligent Remote Tutoring Model.
39. Associations Between Indoor Fine Particulate Matter (PM2.5) and Sleep-disordered Breathing in an Urban Sample of School-aged Children
40. Gesunde Häfen – gemeinsam stark (GESA): Ist-Analyse von Strukturen und Prozessen in deutschen IGV-Häfen bei gesundheitlichen Gefahrenlagen
41. Malaria Control: Epidemic Progression Calculation Based on Individual Mobility Data.
42. A Malaria Control Model using Mobility Data: An Early Explanation of Kedougou Case in Senegal.
43. Enriching Geolocalized Dataset with POIs Descriptions at Large Scale.
44. A Matrix Model to Analyze Cascading Failure in Critical Infrastructures.
45. Proposal of the Solution of Virtual Basic Schools in Rural Areas of African Countries in Conflict: Case of the Central African Republic.
46. A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw Types.
47. Contribution to Data Compression and Transmission Techniques: Application in the Field of Computer Science and Distance Education.
48. Measurements of the Most Significant Software Security Weaknesses.
49. An Ontology for Collaborative Decision Making.
50. Proposal for a solution to improve access to mathematics and philosophy education in Senegal thanks to SDN and IPTV.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.