Eugène C. Ezin

Eugène C. Ezin
Verified
Eugène verified their affiliation via an institutional email.
Verified
Eugène verified their affiliation via an institutional email.
  • PhD
  • Professor (Full) at University of Abomey-Calavi

I am the Director of the Training and Research Institute in Computer Science and the Head of the Research Lab LRSIA

About

148
Publications
62,166
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
631
Citations
Introduction
Eugène C. Ezin currently is the Director of the Training and Research Institute in Computer Science and a Professor at the Institute of Mathematics and Physics. His research topics include many areas of Artificial Intelligence. He supervised many theses.
Additional affiliations
Training and Reseach Institute in Computer Science at the University of Abomey-Calavi
Position
  • Director
Description
  • I am the Director of the Training and Reseach Institute in Computer Science and the Director of the Research Lab in Computer Science and its applications. I am also a Professor at the Institute of Mathematics and Physics.

Publications

Publications (148)
Preprint
Full-text available
The evolution and acceleration of the effects of climate change on the water cycle demand adaptation and mitigation plans. Consequently, the implementation of public policies (management, governance, and strategy) regarding flood risk management or prevention (such as levee heights and spillway dimensions of dams) is based on the characterization o...
Article
Full-text available
This article describes our point of view regarding the security capabilities of classical learning algorithms (CLAs) and quantum mechanisms (QM) in the industrial Internet of Things (IIoT) ecosystem. The heterogeneity of the IIoT ecosystem and the inevitability of the security paradigm necessitate a systematic review of the contributions of the res...
Preprint
Full-text available
The evolution and acceleration of the effects of climate change on the water cycle demand adaptation and mitigation plans. Consequently, the implementation of public policies (management, governance, and strategy) regarding flood risk management or prevention (such as levee heights and spillway dimensions of dams) is based on the characterization o...
Article
Full-text available
The forecasting of hydrological flows (rainfall depth or rainfall discharge) is becoming increasingly important in the management of hydrological risks such as floods. In this study, the Long Short-Term Memory (LSTM) network, a state-of-the-art algorithm dedicated to time series, is applied to predict the daily water level of Lake Nokoué in Benin....
Conference Paper
Full-text available
The normalized difference indices are useful tools for monitoring water quality, assessing the health of aquatic ecosystems, and detecting changes in physicochemical parameter concentrations over time. They can be applied in various applications such as water resource management, water quality monitoring, and environmental research. The main object...
Article
Full-text available
Wireless Sensor Networks (WSNs) have become a critical technology in the Internet of Things (IoT) era, enabling the seamless integration of sensing, communication, and computational capabilities. WSNs have emerged as a transformative technology with applications ranging from environmental monitoring to industrial automation. As WSNs become more pre...
Presentation
Full-text available
L’intégration de l’intelligence artificielle (IA) dans l’enseignement des mathématiques ouvre la voie à de nombreuses opportunités pédagogiques. Grâce aux technologies d’IA générative, il devient possible de personnaliser les parcours d’apprentissage, de proposer des exercices adaptés, de visualiser des concepts abstraits, et d’automatiser certaine...
Article
Full-text available
With the impacts of climate change, floods have become increasingly frequent in recent years. Estimating flood hazard thresholds and peak floodwater levels based on flood frequency analysis is crucial for anticipating and preparing for potential flooding events. This study aims to estimate flood hazard thresholds, flood occurrence probabilities, an...
Article
Full-text available
In the rapidly evolving domain of quantum computing, Shor's algorithm has emerged as a groundbreaking innovation with far-reaching implications for the field of cryptographic security. However, the efficacy of Shor's algorithm hinges on the critical step of determining the period, a process that poses a substantial computational challenge. This art...
Presentation
Full-text available
Cette présentation à l'adresse des doctorants et plus généralement à l'attention des enseignants-chercheurs, est une extension d'une communication de l'année dernière dont le titre est "Le plagiat en milieu universitaires : origines, impacts et approches de solutions". La particularité est que celle-ci met l'accent sur les outils de l'intelligence...
Preprint
A flood is defined as a relatively high flow rate or water level in a river or body of water, characterized by an elevation above the norm, leading to the inundation of low-lying areas or bodies of water that are not normally submerged. Almost every year, floods of significant magnitude impact the Nokoue lake basin, endangering nearby populations a...
Presentation
L’intelligence artificielle (IA) est une avancée technologique majeure avec le potentiel de transformer divers secteurs et de remodeler les économies mondiales. Elle offre des opportunités en améliorant la productivité par l'automatisation et en créant des emplois dans de nouveaux secteurs comme la robotique et les véhicules autonomes. Dans la sant...
Presentation
L’intelligence artificielle et plus récemment l’intelligence artificielle générative révolutionnent le monde avec des impacts sur la plupart des secteurs de développement comme la santé, l’agriculture, le transport, le tourisme, etc. Le domaine de l’éducation n’en est pas épargné. D’ailleurs, « l’éducation est une arme puissante pour changer le mon...
Presentation
L'intelligence artificielle impacte plusieurs domaines et spécifiquement l'enseignement et la recherche scientifique à l'université. Dans cette présentation, une brève historique de l'IA est évoquée. Plusieurs outils d'intelligence artificielle ont été présentés pour les enseignants et les apprenants pour améliorer la pratique pédagogique et la rec...
Article
Liver cancer, a leading cause of cancer mortality, is often diagnosed by analyzing the grayscale variations in liver tissue across different computed tomography (CT) images. However, the intensity similarity can be strong, making it difficult for radiologists to visually identify hepatocellular carcinoma (HCC) and metastases. It is crucial for the...
Technical Report
Full-text available
Le Big Data est devenu une préoccupation majeure vu le rythme effréné de la croissance des données en termes de capacité et les différentes sources qui les génère. Ce document présente une brève historique des données massives et les clarifications conceptuelles pour une meilleure appropriation de ces concepts.
Presentation
Artificial intelligence appears to be a powerful means of achieving the fourth sustainable development goal, which stipulates quality education for all by 2030. In this presentation, we have outlined the various sectors in which artificial intelligence is having an impact, with a particular focus on education. Analyses have been carried out in the...
Presentation
La sécurité sous toutes ses formes est devenue une préoccupation majeure de nos jours. Dans cette présentation, nous avons rappelé les objectifs de la sécurité et la définition de l'intelligence pour mieux présenter la thématique. Nous avons ensuite exposé les opportunités offertes par la sécurité et de l'intelligence artificielles tout en mettant...
Conference Paper
Agroecology promotion is nowadays an important objective recognized almost everywhere because of the perspectives it offers in terms of sustainability. However, despite the initiatives of numerous actors around the world, agroecology's adoption rate remains low. In this study, we combine multidimensional analysis methods with machine learning metho...
Conference Paper
Food insecurity is a pervasive phenomenon in Africa, and the paradox is that it affects farming households more than others. Although early and accurate detection of famine in farm households is a complex challenge, it remains very important to help reduce their vulnerability and inform policy and practice. Existing food security monitoring tools f...
Article
Full-text available
Poor water quality is a serious problem in the world which threatens human health, ecosystems, plant and animal life. Prediction of surface water quality is a main concern in water resource and environmental systems.The lake Nokoue in Benin, the countrys main water body, is experiencing without equivox pollution. Usually, the water quality index is...
Presentation
Full-text available
Le plagiat dans le milieu universitaire devient de plus en plus évoqué avec la facilité qu'offre l'Internet et la disponibilité des données. Et pourtant c'est un vol qui est sanctionné parfois très sévèrement avec le retrait des diplômes même des années après. Cette communication présente les types de plagiats et les suggestions pour limiter les dé...
Presentation
Full-text available
Cet exposé présente les éléments essentiels et les consignes à suivre pour une méthodologie de recherche scientifique qui conduit à la publication de résultats scientifiquement valables.
Preprint
Full-text available
The prediction of hydrological flows (rainfall-depth or rainfall-discharge) is becoming increasingly important in the management of hydrological risks such as floods. In this study, the Long Short-Term Memory (LSTM) network, a state-of-the-art algorithm dedicated to time series, is applied to predict the daily water level of lake Nokoue in Benin. T...
Conference Paper
Full-text available
Deafness is a significant condition that can have a profound impact on the daily lives of those affected. One of the major challenges that deaf individuals face is communicating with hearing people, which can lead to feelings of isolation and even depression. In this paper, we propose a solution to bridge the communication gap between deaf and hear...
Article
Full-text available
Simple Summary Liver malignancies, particularly hepatocellular carcinoma, and metastases stand as prominent contributors to cancer mortality. Within abdominal computed tomography imaging, much of data remains underused by radiologists. Radiomics uses advanced image analysis to extract quantitative features from medical scans for deeper diagnosis, t...
Presentation
Full-text available
La cryptographie est l'un des piliers fondamentaux sur lesquels repose la technologie Blockchain. Cette dernière permet un fonctionnement continu du réseau, garantit les mécanismes de consentement entre les utilisateurs et l'intégrité de la blockchain. La cryptographie et la blockchain favorisent la sécurité dans le domaine du numérique. Le princip...
Presentation
Full-text available
This presentation gives an overview on artificial intelligence potentials in Benin by highlighting many sectors like agriculture, health, education, infrastructures, turism, etc. The adoption of national strategy on artificial intelligence in Benin and many training programs show the dynamic in the field with challenges to overcome.
Conference Paper
Crops like tomatoes are an important source of vitamins and other essential nutrients for a healthy diet. How long a tomato will be useful for excellent health can be predicted by early identification of its state. In this paper, we designed an electronic nose for tomato data collection. The proposed electronic device is setup thanks to eight metal...
Presentation
Full-text available
Les technologies de l’information et de la communication par la digitalisation, la dématérialisation ont impacté les secteurs économiques et financiers avec l’apparition des monnaies numériques. La cryptographie, science de chiffrement et de déchiffrement de l’information à l’aide de clés et le réseau informatique pair-à-pair ont permis de poser le...
Article
Full-text available
As a sustainable and holistic approach to agriculture, agroecology has received considerable attention in recent years because of its potential to address the environmental, economic, and social challenges of agricultural systems. In order to identify key trends, influential authors, impactful journals, and emerging research themes surrounding the...
Article
Unmanned aerial vehicles (UAVs) have a significant impact on the aircraft industry and are used for both military and civilian purposes. The partial or full automation of UAVs is an active research domain that is attracting interest from both the industrial and academic sectors. This paper presents a comprehensive review of UAVs, their architecture...
Article
Full-text available
A deeper assessment of the nutritional and organoleptic potential of the items we consume is the first step toward knowing their capacity. Research is becoming more and more interested in developing quick and accurate instruments to assess touch, vision, hearing, and other senses under this impetus. This paper examines a variety of statistical and...
Preprint
Full-text available
In recent years, the CNN architectures designed by evolution algorithms have proven to be competitive with handcrafted architectures designed by experts. However, these algorithms need a lot of computational power, which is beyond the capabilities of most researchers and engineers. To overcome this problem, we propose an evolution architecture unde...
Article
Full-text available
The Oueme basin in Benin, like several other basins in the region, is increasingly affected by floods that have numerous environmental, social, and economic impacts. In this context, it is essential to analyze rainfall occurrence to propose mitigation or adaptation measures for water management. This study analyzes rainfall occurrence over the peri...
Article
Full-text available
This paper presents a modeling approach based on Artificial Neural Networks (ANNs) in the Ouémé river catchment at Savè. To do this, we used precipitation data as input over the period 1965-2010 to simulate river discharge in the study area by using two ANNs models such as the Long Short Term Memory (LSTM) and Recurrent Gate Networks (GRU) models....
Research Proposal
This research aims at building an efficient end-to-end speech translation system capable of handling Fon-French automatic speech to text translation. We will propose a complete study of speech to text translation of Fon, a very low-resourced language of Benin into French. This work will contribute to enable barrier-free communication between Fon an...
Presentation
Full-text available
Cette présentation met en lumière les défis et opportunités de l'intégration de l'intelligence artificielle dans l'enseignement supérieur. Il s'agit d'un appel pour une meilleure prise compte de cette réalité de nos temps et surtout pour saisir les opportunités que cela présente.
Chapter
The automation of unmanned aerial vehicles is an active research area. Among different techniques for Unmanned Aerial Vehicle (UAV) automation, obstacle detection is gaining attention to ensure UAV safety flights. This paper presents an algorithm that can be embedded on an UAV to detect forward obstacles. This algorithm is based on a fast and accur...
Presentation
Full-text available
L’intelligence artificielle est une science pluridisciplinaire difficile à définir de façon formelle. Elle est pourtant très bien connue par ses applications dans de nombreux secteurs d’activités. Dans cette communication, nous avons brièvement rappelé son historique, les définitions tendancielles et les axes de l’Intelligence artificielle notammen...
Article
Full-text available
Information technologies are improving service delivery to citizens and businesses through access to e-information. Securing e-Government Information involves protecting some information quality criteria and effectively managing risks. This research paper aims to design an Extended Layered Information Security Architecture (ELISA) for e-Government...
Conference Paper
Full-text available
Dans cet article, nous présentons deux techniques d'analyse des précipitations dans le sous-bassin de l'Ouémé à Savè au Bénin : l'approche markovienne et les Réseaux de Neurones Artificiels (RNA). Pour ce faire, nous avons utilisé une série de données enregistrées durant la période de 1921 à 2020 par la Météo-Bénin. Ces dernières ont été utilisées...
Article
Full-text available
A thorough literature review was conducted in order to discover the previous studies that have been done in relation to the problems of flooding and water pollution of Nokoue lake (Benin, West Africa), to identify the limitations of these previous studies, to draw lessons in order to propose how to overcome them. This bibliographic synthesis has sh...
Presentation
Full-text available
This presentation is given at a joint collaborative work between Mastercard Foundation and the University of Abomey-Calavi in September 2022.
Article
Full-text available
Secure data is a foremost topic in wireless sensor networks since data are transmitted through wireless channels where attackers may get access to critical information. Addressing critical resource-constrained devices of WSN, existing solutions do not consider the specific constraints of WSN in terms of limited resources. We propose a robust encryp...
Article
Full-text available
Wireless sensor networks (WSNs) have several important applications, both in research and domestic use. Generally, their main role is to collect and transmit data from an ROI (region of interest) to a base station for processing and analysis. Therefore, it is vital to ensure maximum coverage of the chosen area and communication between the nodes fo...
Chapter
Land management in Benin is a great challenge for its administration. Due to the nonexistence of appropriated tools, land transfer cases end up in litigation. Several court judgements refer to them when the people concerned do not deliver justice.The goal of this paper is to design a secure system for land management using Ethereum blockchain techn...
Article
The security of data transmitted through wireless sensor networks remains a challenge. These networks are vulnerable to attacks and subject to strong constraints, such as the energy autonomy, the computing capacity and data storage. We study three fearsome attacks easy to execute. These are tampering, replay and sybil attacks which compromise the i...
Chapter
Maternal mortality is one of the leading causes of death among child-bearing women in Africa. One of the major challenges facing women in rural areas in Africa is delivering their babies safely, thereby curtailing excessive bleeding during birth. This paper focuses on optimizing costs related to delivery of blood using drone technology by determini...
Chapter
Full-text available
Wireless sensor networks (WSN) are a collection of autonomous nodes with a limited battery life. They are used in various fields such as health, industry, home automation. Due to their limited resources and constraints, WSNs face several problems. One of these problems is the optimal coverage of a observed area. Indeed, whatever the domain, ensurin...
Conference Paper
Full-text available
Wireless sensor networks (WSN) are a collection of autonomous nodes with a limited battery life. They are used in various fields such as health, industry, home automation. Due to their limited resources and constraints, WSNs face several problems. One of these problems is the optimal coverage of a observed area. Indeed, whatever the domain, ensurin...
Conference Paper
Full-text available
Learning anywhere at any time is the goal of Mobile learning (m-learning). With the proliferation of smartphones, some universities adopt m-learning to facilitate accessibility of documents and online courses for students. Teachers can plan for online assessment and students can join session, answer and see their score directly. During an exam, the...
Chapter
This paper presents a system, called AmonAI, that predicts the academic performances of students in the LMD system. The approach used allows to establish, for each of the teaching units of a given semester, some estimates of the students results. To achieve this, various machine learning techniques were used. In order to choose the best model for e...
Poster
The goal of monitoring patients' vital parameters is to provide better quality health care services, as well as to autonomously and automatically collect and process biological signals and environmental data from patients and unify the actions of medical specialists for these intensive care units, which are very limited in the underdeveloped countr...
Preprint
Medical surveillance is based on continuous monitoringof the patients vital parameters. The control of vital signs isessential in different cases. Actually, in the case of criticals healthsissues (road or traffic accident; Pregnancy and pregnancy-relatedcomplication like blood pressure, foetal heart rate, etc...) vitalsparameters need to be continu...
Conference Paper
Medical surveillance is based on continuous monitoring of the patients vital parameters. The control of vital signs is essential in different cases. Actually, in the case of criticals healths issues (road or traffic accident; Pregnancy and pregnancy-related complication like blood pressure, foetal heart rate, etc...) vitals parameters need to be co...
Preprint
Full-text available
The explosion of the web has revealed the limitations of traditional information retrieval systems and consequently has favored the emergence of the personalized information retrieval. In this paper, we propose a custom search system based on a dynamic and hybrid modeling of user's profile. We use a hybrid filtering to re-rank the user search resul...
Chapter
Awale game is one of the famous board games from Africa with many variants and is now played worldwide in various forms. In this paper, we propose an open-source Application Programming Interface (API) for developers to allow an easy implementation of the various variants of Awale as well as artificial intelligence based players. The API is availab...
Chapter
The optimization of the energy consumed by data centers is a major concern. Several techniques have tried in vain to overcome this issue for many years. In this panoply, predictive approaches start to emerge. They consist in predicting in advance the resource requirement of the Datacenter’s servers in order to reserve their right quantities at the...
Conference Paper
Adversarial games are very studied in artificial intelligence. Among these games, there are the mnk-games. An mnk-game is a board game in which two players take turns in placing a piece of their color on an m × n board. The winner is the player who first gets k pieces of his own color in a row; horizontally, vertically, or diagonally. For the resol...
Chapter
In this paper, we have demonstrated the efficacy of an automatic continuous speech recognition system by mixing fuzzy and neuronal approaches and an acoustic analysis of the sounds of an under-resourced language. The system we propose integrates the modules such as extraction module, segmentation and phoneme recognition modules and whose the core i...
Article
Full-text available
Falls are the major causes of fatal injury for the elderly population. To remedy this, several elderly people monitoring systems with fall detection functionality have been proposed. In this work, we investigate a video-based method of detecting fall incidents from multiple cameras. Our goal is to propose a novel method to detect falls on the floor...
Article
Full-text available
This paper presents an algorithm for syllable segmentation of speech signals based on the calculation of the singularity exponents in each point of the signal combined with Rényi entropy calculation. Rényi entropy, generalization of Shannon entropy, quantifies the degree of signal organization. We then hypothesize that this degree of organization d...
Article
Full-text available
In this article, we propose a mainly-software hardening technique to totally protect unmodified running operating systems on COTS hardware against transient errors in heavily radiation - flooded environment like high altitude space. The technique is currently being implemented in a hypervisor and allows to control the upper layers of the software s...
Article
Full-text available
In this paper, we study the boundary detection in syllable segmentation field. We describe an algorithm proposed for text-independent syllable segmentation. This algorithm provides a performance comparison between the entropies of Shannon, Tsallis and Renyi in an effective detection of beginning-ending points of syllable in a speech signal. The Sha...
Article
Full-text available
Text-independent speech segmentation is a challenging topic in computer-based speech recognition systems. This paper proposes a novel time-domain algorithm based on fuzzy knowledge for continuous speech segmentation task via a nonlinear speech analysis. Short-term energy, zero-crossing rate and the singularity exponents are the time-domain features...
Article
Full-text available
Real-time estimates of a crowd size is a central task in civilian surveillance. In this paper we present a novel system counting people in a crowd scene with overlapping cameras. This system fuses all single view foreground information to localize each person present on the scene. The purpose of our fusion strategy is to use the foreground pixels o...
Article
Full-text available
During this last decade, many works have been done in order to modelize user interests during his interaction with an information retrieval system and particularly on the web. Despite all these efforts, it remains a real challenge to propose a model able not only to learn user's interests implicitly but also by allowing any user to participate at a...
Article
Full-text available
The volume of data on the web grew in recent years. Then it becomes increasingly difficult for a user to access the right information in a short time. However, several works have been carried out with the aim of proposing algorithms to re-rank the user’s search results on the web by taking into account their profile. In this paper, we propose speci...
Article
Full-text available
The detection of moving objects in a video sequence is the first step in an automatic video surveillance system. This work proposes an enhancement of a codebook-based algorithm for moving objects extraction. The proposed algorithm used a perceptual-based approach to optimize foreground information extraction complexity by using a modified codebook...
Conference Paper
Full-text available
A great challenge of practical significance in a recent research topic is to develop computer vision system which can automatically recognize a variety of facial expressions. Such an automated system enables to detect faces, analyzes and interprets facial expressions in a scene although the accomplishment of this task is rather strenuous. There are...
Conference Paper
Full-text available
In this paper, we propose a fast polygons fusion algorithm to address the problem of moving object detection from overlapping cameras. Once the foreground pixels are detected in each view, we approximate their contours with polygons and project them into the reference plane. After this, we propose an efficient fusion approach to fuse polygons in or...

Network

Cited By