Prosper KIMOU - Academia.edu (original) (raw)

Papers by Prosper KIMOU

Research paper thumbnail of ALOA2i : OPTIMIZATION OF EXTRACTION K-itemsets FREQUENT (FOR K ≤ 2)

Research paper thumbnail of Fermat and Pythagoras Divisors for a New Explicit Proof of Fermat&amp;#8217;s Theorem:<i>a</i><sup>4</sup> + <i>b</i><sup>4</sup> = <i>c</i><sup>4</sup>. Part I

Advances in pure mathematics, 2024

In this paper we prove in a new way, the well known result, that Fermat's equation a 4 + b 4 = c ... more In this paper we prove in a new way, the well known result, that Fermat's equation a 4 + b 4 = c 4 , is not solvable in  , when 0 abc ≠. To show this result, it suffices to prove that:

Research paper thumbnail of Specification of a Model of Honeypot Attack Based On Raised Data

Zenodo (CERN European Organization for Nuclear Research), Nov 29, 2008

The security of their network remains the priorities of almost all companies. Existing security s... more The security of their network remains the priorities of almost all companies. Existing security systems have shown their limit; thus a new type of security systems was born: honeypots. Honeypots are defined as programs or intended servers which have to attract pirates to study theirs behaviours. It is in this context that the leurre.com project of gathering about twenty platforms was born. This article aims to specify a model of honeypots attack. Our model describes, on a given platform, the evolution of attacks according to theirs hours. Afterward, we show the most attacked services by the studies of attacks on the various ports.

Research paper thumbnail of Diophantine Quotients and Remainders with Applications to Fermat and Pythagorean Equations

American Journal of Computational Mathematics, 2023

Research paper thumbnail of Pythagorician Divisors and Applications to Some Diophantine Equations

Advances in Pure Mathematics, 2023

We consider the Pythagoras equation

Research paper thumbnail of On Fermat Last Theorem: The New Efficient Expression of a Hypothetical Solution as a Function of Its Fermat Divisors

American Journal of Computational Mathematics, 2023

Research paper thumbnail of Diophantine Quotients and Remainders with Applications to Fermat and Pythagorean Equations

American Journal of Computational Mathematics, 2023

Diophantine equations have always fascinated mathematicians about existence, finitude, and the ca... more Diophantine equations have always fascinated mathematicians about existence, finitude, and the calculation of possible solutions. Among these equations, one of them will be the object of our research.

Research paper thumbnail of Pythagorician Divisors and Applications to Some Diophantine Equations

Advances in Pure Mathematics

Research paper thumbnail of On Fermat Last Theorem: The New Efficient Expression of a Hypothetical Solution as a Function of Its Fermat Divisors

American Journal of Computational Mathematics

Research paper thumbnail of Hybrid Model for the Classification of Questions Expressed in Natural Language

International Journal of Advanced Research

Question-answering systems rely on an unstructured text corpora or a knowledge base to answer use... more Question-answering systems rely on an unstructured text corpora or a knowledge base to answer user questions. Most of these systems store knowledge in multiple repositories including RDF. To access this type of repository, SPARQL is the most convenient formal language. It is a complex language, it is therefore necessary to transform the questions expressed in natural language by users into a SPARQL query. As this language is complex, several approaches have been proposed to transform the questions expressed in natural language by users into a SPARQL query.However, the identification of the question type is a serious problem. Questions classification plays a potential role at this level. Machine learning algorithms including neural networks are used for this classification. With the increase in the volume of data, neural networks better perform than those obtained by machine learning algorithms, in general. That is, neural networks, machine learning algorithms also remain good classi...

Research paper thumbnail of Specification of a Model of Honeypot Attack Based On Raised Data

Journal of information and communication convergence engineering, 2008

The security of their network remains the priorities of almost all companies. Existing security s... more The security of their network remains the priorities of almost all companies. Existing security systems have shown their limit; thus a new type of security systems was born: honeypots. Honeypots are defined as programs or intended servers which have to attract pirates to study theirs behaviours. It is in this context that the leurre.com project of gathering about twenty platforms was born. This article aims to specify a model of honeypots attack. Our model describes, on a given platform, the evolution of attacks according to theirs hours. Afterward, we show the most attacked services by the studies of attacks on the various ports. It is advisable to note that this article was elaborated within the framework of the research projects on honeyspots within the LABTIC (Laboratory of Information Technologies and Communication). Keywords—Honeypot, networks, attack, leurrecom, computer network

Research paper thumbnail of ALOA2i : OPTIMISATION D'EXTRACTION DES K- ITEMSETS FREQUENTS (POUR K ≤ 2)

Dans cet article, nous proposons une nouvelle approche d'optimisation de l'algorithme de ... more Dans cet article, nous proposons une nouvelle approche d'optimisation de l'algorithme de reference APRIORI (AGR 94).La demarche utilisee est basee sur des ensembles a un et deux items. Nous commencons par calculer les supports des 1-itemsets (ensembles de singletons), ensuite nous elaguons les 1-itemsets non frequents et ne conservons que ceux qui sont frequents (c'est-a-dire ceux qui ont des frequences d'apparition appelees supports dont les valeurs sont superieures ou egales a un seuil minimal fixe).Pendant la deuxieme iteration, nous trions les 1-itemsets frequents par ordre decroissant de leurs supports respectifs puis nous formons les 2-itemsets. De cette facon les regles d'association sont decouvertes plus rapidement.Experimentalement, la comparaison de notre algorithme avec APRIORI, PASCAL, CLOSE et MAX-MINER, montre son efficacite sur des donnees faiblement correlees

Research paper thumbnail of Proposition of a model of data backup in XML format

The data backup implicates the choice of formats that assure accessibility and integrity of infor... more The data backup implicates the choice of formats that assure accessibility and integrity of information. Facing to these numerous data saving formats, XML is one of the simplest and most promising approaches to guarantee the perpetuity and the integrity of data. In this article, we propose a model of data backup in XML format. This model is developed with Java. Our approach consists in defining an application able to convert information of a database in XML format and restore them later. This model will allow the managing of the recurring problems of disparities between different platforms and versions met during the data saving.

Research paper thumbnail of Efficient Reduction of Overgeneration Errors for Automatic Controlled Indexing with an Application to the Biomedical Domain

International Journal of Advanced Computer Science and Applications

Studies on MetaMap and MaxMatcher has shown that both concept extraction systems suffer from over... more Studies on MetaMap and MaxMatcher has shown that both concept extraction systems suffer from overgeneration problems. Over-generation occurs when the extraction systems mistakenly select an irrelevant concept. One of the reasons for these errors is that these systems use the words to weight the terms of the concepts. In this paper, an Integer Linear Programming model is used to select the optimal subset of extracted concept mentions covering the largest number of important words in the document to be indexed. Then each concept mentions that this set is mapped to a unique concept in UMLS using an information retrieval model.

Research paper thumbnail of Specification of a Model of Honeypot Attack based on Raised Data

Page 1. Specification of a Model of Honeypot Attack based on Raised Data Souleymane Oumtanaga, Pr... more Page 1. Specification of a Model of Honeypot Attack based on Raised Data Souleymane Oumtanaga, Prosper Kimou, and Kouadio Gaza Kevin ... This base is then enriched by other information on the geographic localization, the operating system and the domain name. ...

Research paper thumbnail of Proposition of a model of data backup in XML format

Proceedings of the 6th Wseas International Conference on Software Engineering Parallel and Distributed Systems, Feb 16, 2007

Page 1. Proposition of a model of Data backup in XML format. SOULEYMANE OUMTANAGA 1 , KONE TIEMOM... more Page 1. Proposition of a model of Data backup in XML format. SOULEYMANE OUMTANAGA 1 , KONE TIEMOMAN 2 , PROSPER KIMOU 3 , ... A database contains 0 or several tables <TABLE>. A Table has an attribute NAME and contains 0 or several lines <ROWS>. ...

Research paper thumbnail of ALOA2i : OPTIMIZATION OF EXTRACTION K-itemsets FREQUENT (FOR K ≤ 2)

Research paper thumbnail of Fermat and Pythagoras Divisors for a New Explicit Proof of Fermat&amp;#8217;s Theorem:<i>a</i><sup>4</sup> + <i>b</i><sup>4</sup> = <i>c</i><sup>4</sup>. Part I

Advances in pure mathematics, 2024

In this paper we prove in a new way, the well known result, that Fermat's equation a 4 + b 4 = c ... more In this paper we prove in a new way, the well known result, that Fermat's equation a 4 + b 4 = c 4 , is not solvable in  , when 0 abc ≠. To show this result, it suffices to prove that:

Research paper thumbnail of Specification of a Model of Honeypot Attack Based On Raised Data

Zenodo (CERN European Organization for Nuclear Research), Nov 29, 2008

The security of their network remains the priorities of almost all companies. Existing security s... more The security of their network remains the priorities of almost all companies. Existing security systems have shown their limit; thus a new type of security systems was born: honeypots. Honeypots are defined as programs or intended servers which have to attract pirates to study theirs behaviours. It is in this context that the leurre.com project of gathering about twenty platforms was born. This article aims to specify a model of honeypots attack. Our model describes, on a given platform, the evolution of attacks according to theirs hours. Afterward, we show the most attacked services by the studies of attacks on the various ports.

Research paper thumbnail of Diophantine Quotients and Remainders with Applications to Fermat and Pythagorean Equations

American Journal of Computational Mathematics, 2023

Research paper thumbnail of Pythagorician Divisors and Applications to Some Diophantine Equations

Advances in Pure Mathematics, 2023

We consider the Pythagoras equation

Research paper thumbnail of On Fermat Last Theorem: The New Efficient Expression of a Hypothetical Solution as a Function of Its Fermat Divisors

American Journal of Computational Mathematics, 2023

Research paper thumbnail of Diophantine Quotients and Remainders with Applications to Fermat and Pythagorean Equations

American Journal of Computational Mathematics, 2023

Diophantine equations have always fascinated mathematicians about existence, finitude, and the ca... more Diophantine equations have always fascinated mathematicians about existence, finitude, and the calculation of possible solutions. Among these equations, one of them will be the object of our research.

Research paper thumbnail of Pythagorician Divisors and Applications to Some Diophantine Equations

Advances in Pure Mathematics

Research paper thumbnail of On Fermat Last Theorem: The New Efficient Expression of a Hypothetical Solution as a Function of Its Fermat Divisors

American Journal of Computational Mathematics

Research paper thumbnail of Hybrid Model for the Classification of Questions Expressed in Natural Language

International Journal of Advanced Research

Question-answering systems rely on an unstructured text corpora or a knowledge base to answer use... more Question-answering systems rely on an unstructured text corpora or a knowledge base to answer user questions. Most of these systems store knowledge in multiple repositories including RDF. To access this type of repository, SPARQL is the most convenient formal language. It is a complex language, it is therefore necessary to transform the questions expressed in natural language by users into a SPARQL query. As this language is complex, several approaches have been proposed to transform the questions expressed in natural language by users into a SPARQL query.However, the identification of the question type is a serious problem. Questions classification plays a potential role at this level. Machine learning algorithms including neural networks are used for this classification. With the increase in the volume of data, neural networks better perform than those obtained by machine learning algorithms, in general. That is, neural networks, machine learning algorithms also remain good classi...

Research paper thumbnail of Specification of a Model of Honeypot Attack Based On Raised Data

Journal of information and communication convergence engineering, 2008

The security of their network remains the priorities of almost all companies. Existing security s... more The security of their network remains the priorities of almost all companies. Existing security systems have shown their limit; thus a new type of security systems was born: honeypots. Honeypots are defined as programs or intended servers which have to attract pirates to study theirs behaviours. It is in this context that the leurre.com project of gathering about twenty platforms was born. This article aims to specify a model of honeypots attack. Our model describes, on a given platform, the evolution of attacks according to theirs hours. Afterward, we show the most attacked services by the studies of attacks on the various ports. It is advisable to note that this article was elaborated within the framework of the research projects on honeyspots within the LABTIC (Laboratory of Information Technologies and Communication). Keywords—Honeypot, networks, attack, leurrecom, computer network

Research paper thumbnail of ALOA2i : OPTIMISATION D'EXTRACTION DES K- ITEMSETS FREQUENTS (POUR K ≤ 2)

Dans cet article, nous proposons une nouvelle approche d'optimisation de l'algorithme de ... more Dans cet article, nous proposons une nouvelle approche d'optimisation de l'algorithme de reference APRIORI (AGR 94).La demarche utilisee est basee sur des ensembles a un et deux items. Nous commencons par calculer les supports des 1-itemsets (ensembles de singletons), ensuite nous elaguons les 1-itemsets non frequents et ne conservons que ceux qui sont frequents (c'est-a-dire ceux qui ont des frequences d'apparition appelees supports dont les valeurs sont superieures ou egales a un seuil minimal fixe).Pendant la deuxieme iteration, nous trions les 1-itemsets frequents par ordre decroissant de leurs supports respectifs puis nous formons les 2-itemsets. De cette facon les regles d'association sont decouvertes plus rapidement.Experimentalement, la comparaison de notre algorithme avec APRIORI, PASCAL, CLOSE et MAX-MINER, montre son efficacite sur des donnees faiblement correlees

Research paper thumbnail of Proposition of a model of data backup in XML format

The data backup implicates the choice of formats that assure accessibility and integrity of infor... more The data backup implicates the choice of formats that assure accessibility and integrity of information. Facing to these numerous data saving formats, XML is one of the simplest and most promising approaches to guarantee the perpetuity and the integrity of data. In this article, we propose a model of data backup in XML format. This model is developed with Java. Our approach consists in defining an application able to convert information of a database in XML format and restore them later. This model will allow the managing of the recurring problems of disparities between different platforms and versions met during the data saving.

Research paper thumbnail of Efficient Reduction of Overgeneration Errors for Automatic Controlled Indexing with an Application to the Biomedical Domain

International Journal of Advanced Computer Science and Applications

Studies on MetaMap and MaxMatcher has shown that both concept extraction systems suffer from over... more Studies on MetaMap and MaxMatcher has shown that both concept extraction systems suffer from overgeneration problems. Over-generation occurs when the extraction systems mistakenly select an irrelevant concept. One of the reasons for these errors is that these systems use the words to weight the terms of the concepts. In this paper, an Integer Linear Programming model is used to select the optimal subset of extracted concept mentions covering the largest number of important words in the document to be indexed. Then each concept mentions that this set is mapped to a unique concept in UMLS using an information retrieval model.

Research paper thumbnail of Specification of a Model of Honeypot Attack based on Raised Data

Page 1. Specification of a Model of Honeypot Attack based on Raised Data Souleymane Oumtanaga, Pr... more Page 1. Specification of a Model of Honeypot Attack based on Raised Data Souleymane Oumtanaga, Prosper Kimou, and Kouadio Gaza Kevin ... This base is then enriched by other information on the geographic localization, the operating system and the domain name. ...

Research paper thumbnail of Proposition of a model of data backup in XML format

Proceedings of the 6th Wseas International Conference on Software Engineering Parallel and Distributed Systems, Feb 16, 2007

Page 1. Proposition of a model of Data backup in XML format. SOULEYMANE OUMTANAGA 1 , KONE TIEMOM... more Page 1. Proposition of a model of Data backup in XML format. SOULEYMANE OUMTANAGA 1 , KONE TIEMOMAN 2 , PROSPER KIMOU 3 , ... A database contains 0 or several tables <TABLE>. A Table has an attribute NAME and contains 0 or several lines <ROWS>. ...