Papers by Moustapha Bikienga
Study of the Rewiring Factor in an Unstructured P2P
Extension du contexte de mise en œuvre des ordonnancements PFAIR
Indexing And Searching Visual Content in a Data Lake Context
Medical Image Watermarking Scheme Based on the Hyper-Catadioptric Model

Pfair scheduling has usually been applied in the context of synchronous periodic task systems wit... more Pfair scheduling has usually been applied in the context of synchronous periodic task systems with implicit deadlines. This paper addresses the problem of scheduling asynchronous hard real-time tasks with constrained deadlines using a Pfair strategy on multiprocessor systems. First, we extend the notion of Pfairness to the context of asynchronous tasks with constrained deadline. Then we investigate feasibility conditions, we propose a rather efficient one and we illustrate the relevance of our criteria through some simulations. RÉSUMÉ. Les ordonnancements P-équitables ont jusque là été étudiés pour des systèmes de tâches à départs simultanés et à échéances sur requêtes. Notre objectif dans ce papier est d’étendre la définition de la P-équité aux systèmes de tâches à départs différés et à échéances contraintes puis de dégager une condition suffisante d’ordonnançabilité. Enfin, des simulations que nous avons effectuées ont permis d’illustrer la pertinence de nos résultats et de mesure...
An Architecture of a Data Lake for the Sharing, Agricultural Knowledge in Burkina Faso
Design of a machine learning based model for academic performance prediction
Proceedings of the 5th edition of the Computer Science Research Days, JRI 2022, 24-26 November 2022, Ouagadougou, Burkina Faso

Implementation of periodic task sets for off-line scheduling
Nous nous intéressons à la mise en oeuvre effective d'applications temps réel dans une approc... more Nous nous intéressons à la mise en oeuvre effective d'applications temps réel dans une approche d'ordonnancementhors-ligne de systèmes de tâches périodiques. L'ordonnancement hors-ligne consiste à rechercher avantl'exécution de l'application une séquence pire cas, c'est-à-dire une suite de blocs indiquant une date de débutet de fin d'exécution d'une instance de tâche. Mettre en oeuvre une séquence suppose de spécifier ce qui doit sepasser quand les durées d'exécution réelles sont inférieures aux durées pire cas prévues par la séquence. Notrepremière contribution consiste en la proposition de deux politiques de mise en oeuvre : une politique inflexiblequi respecte strictement les dates de début des blocs ; et une politique flexible qui permet de les avancer. Nousprouvons que ces politiques préservent la validité des séquences. Nous proposons ensuite un modèle de coûtspour l'évaluation et la comparaison de techniques respectant les politiques pr...

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2016
Slowly, but consistently, the digital gap between developing and developed countries is being clo... more Slowly, but consistently, the digital gap between developing and developed countries is being closed. Everyday, there are initiatives towards relying on ICT to simplify the interaction between citizens and their governments in developing countries. E-government is thus becoming a reality: in Burkina Faso, all government bodies are taking part in this movement with web portals dedicated to serving the public. Unfortunately, in this rush to promote government actions within this trend of digitization, little regards is given to the security of such web sites. In many cases, government highly critical web sites are simply produced in a product line fashion using Content Management Systems which the webmasters do not quite master. We discuss in this study our findings on empirically assessing the security of government websites in Burkina Faso. By systematically scanning these websites for simple and well-known vulnerabilities, we were able to discover issues that deserved urgent attention. As an example, we were able to crawl from temporary backup files in a government web site all information (hostname, login and password in clear) to read and write directly in the database and for impersonating the administrator of the website. We also found that around 50% of the government websites are built on top of platforms suffering from 14 publicly known vulnerabilities, and thus can be readily attacked by any hacker.
Resources’s Optimisation in Pedagogical Activities Scheduling
Proceedings of the 4th edition of the Computer Science Research Days, JRI 2021, 11-13 November 2021, Bobo-Dioulasso, Burkina Faso
Real-time scheduling validation usually stands on emulators: the scheduling policy is validated, ... more Real-time scheduling validation usually stands on emulators: the scheduling policy is validated, not the effective scheduler. We propose a strategy to calibrate scheduling observers, that aim to validate effective implementations of schedules.

Nous nous interessons a la mise en oeuvre effective d'applications temps reel dans une approc... more Nous nous interessons a la mise en oeuvre effective d'applications temps reel dans une approche d'ordonnancementhors-ligne de systemes de tâches periodiques. L'ordonnancement hors-ligne consiste a rechercher avantl'execution de l'application une sequence pire cas, c'est-a-dire une suite de blocs indiquant une date de debutet de fin d'execution d'une instance de tâche. Mettre en oeuvre une sequence suppose de specifier ce qui doit sepasser quand les durees d'execution reelles sont inferieures aux durees pire cas prevues par la sequence. Notrepremiere contribution consiste en la proposition de deux politiques de mise en oeuvre : une politique inflexiblequi respecte strictement les dates de debut des blocs ; et une politique flexible qui permet de les avancer. Nousprouvons que ces politiques preservent la validite des sequences. Nous proposons ensuite un modele de coutspour l'evaluation et la comparaison de techniques respectant les politiques pr...

We address the implementation of periodic task sets for o -line scheduling. O -line scheduling ap... more We address the implementation of periodic task sets for o -line scheduling. O -line scheduling approach consists in computing a worst-case schedule before runtime. Implementing a schedule requires to specify what must happen when the actual execution times of tasks are lower than the planned execution times. The rst contribution consist of the formalization of implementation policies. These policies consider the date by which a task may start execution, which may or not occur before the planned start time. The in exible policy does not allow a task to run before its planned start time, the exible policy does. Since many implementations can comply with these two policies, we also propose a cost model which enables to perform some comparisons between these implementations. The second contribution is the proposition and the presentation of a set of algorithms which implement the pre-computed schedules. We rst deal with independent task sets in a non preemptive context. These algorithms...
Validation of the actual behaviour of a real-time application
International Journal of Critical Computer-Based Systems

Slowly, but consistently, the digital gap between developing and developed countries is being clo... more Slowly, but consistently, the digital gap between developing and developed countries is being closed. Everyday, there are initiatives towards relying on ICT to simplify the interaction between citizens and their governments in developing countries. E-government is thus becoming a reality: in Burkina Faso, all government bodies are taking part in this movement with web portals dedicated to serving the public. Unfortunately, in this rush to promote government actions within this trend of digitization, little regards is given to the security of such web sites. In many cases, government highly critical web sites are simply produced in a product line fashion using Content Management Systems which the webmasters do not quite master. We discuss in this study our findings on empirically assessing the security of government websites in Burkina Faso. By systematically scanning these websites for simple and well-known vulnerabilities, we were able to discover issues that deserved urgent attent...
Observation tools for effective schedules in a RTOS
ABSTRACT Real-time scheduling validation usually stands on emulators: the scheduling policy is va... more ABSTRACT Real-time scheduling validation usually stands on emulators: the scheduling policy is validated, not the effective scheduler. We propose a strategy to calibrate scheduling observers, that aim to validate effective implementations of schedules.
Uploads
Papers by Moustapha Bikienga