main.toc 3.24 KB
\babel@toc {french}{}\relax 
\contentsline {part}{I\hspace {1em}Contexte et Problématiques}{1}{part.1}%
\contentsline {chapter}{\numberline {1}Introduction}{3}{chapter.1}%
\contentsline {section}{\numberline {1.1}Contributions Principales}{4}{section.1.1}%
\contentsline {section}{\numberline {1.2}Plan de la thèse}{5}{section.1.2}%
\contentsline {chapter}{\numberline {2}Contexte}{7}{chapter.2}%
\contentsline {section}{\numberline {2.1}Les stratégies d'apprentissage humain et les environnements informatiques pour l'apprentissage humain (EIAH)}{7}{section.2.1}%
\contentsline {subsection}{\numberline {2.1.1}Les stratégies d'apprentissage}{7}{subsection.2.1.1}%
\contentsline {subsection}{\numberline {2.1.2}Les EIAH}{8}{subsection.2.1.2}%
\contentsline {subsection}{\numberline {2.1.3}L'exerciseur initial AI-VT}{10}{subsection.2.1.3}%
\contentsline {section}{\numberline {2.2}Le contexte technique}{11}{section.2.2}%
\contentsline {subsection}{\numberline {2.2.1}Le raisonnement à partir de cas (RàPC)}{11}{subsection.2.2.1}%
\contentsline {subsubsection}{\numberline {2.2.1.1}Rechercher}{12}{subsubsection.2.2.1.1}%
\contentsline {subsubsection}{\numberline {2.2.1.2}Adapter (Réutiliser)}{13}{subsubsection.2.2.1.2}%
\contentsline {subsubsection}{\numberline {2.2.1.3}Réviser et Réparer}{13}{subsubsection.2.2.1.3}%
\contentsline {subsubsection}{\numberline {2.2.1.4}Stocker (Retenir)}{14}{subsubsection.2.2.1.4}%
\contentsline {subsubsection}{\numberline {2.2.1.5}Conteneurs de Connaissance}{14}{subsubsection.2.2.1.5}%
\contentsline {subsection}{\numberline {2.2.2}Les systèmes multi-agents}{15}{subsection.2.2.2}%
\contentsline {subsection}{\numberline {2.2.3}Différents algorithmes et fonctions implémentés dans AI-VT pour la personnalisation et l'adaptation des séances d'entrainement proposées}{16}{subsection.2.2.3}%
\contentsline {subsubsection}{\numberline {2.2.3.1}Pensée Bayesienne}{16}{subsubsection.2.2.3.1}%
\contentsline {subsubsection}{\numberline {2.2.3.2}Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{17}{subsubsection.2.2.3.2}%
\contentsline {subsubsection}{\numberline {2.2.3.3}K-Moyennes}{19}{subsubsection.2.2.3.3}%
\contentsline {subsubsection}{\numberline {2.2.3.4}Modèle de Mélange Gaussien GMM (\textit {Gaussian Mixture Model})}{19}{subsubsection.2.2.3.4}%
\contentsline {subsubsection}{\numberline {2.2.3.5}Fuzzy-C}{20}{subsubsection.2.2.3.5}%
\contentsline {subsubsection}{\numberline {2.2.3.6}Bandit Manchot MAB (\textit {Multi-Armed Bandits})}{21}{subsubsection.2.2.3.6}%
\contentsline {subsubsection}{\numberline {2.2.3.7}Échantillonnage de Thompson TS (\textit {Thompson Sampling})}{21}{subsubsection.2.2.3.7}%
\contentsline {part}{II\hspace {1em}État de l'art}{23}{part.2}%
\contentsline {chapter}{\numberline {3}Environnements Informatiques d'Apprentissage Humain}{25}{chapter.3}%
\contentsline {section}{\numberline {3.1}L'Intelligence Artificielle}{25}{section.3.1}%
\contentsline {section}{\numberline {3.2}Systèmes de Recommandation dans les EIAH}{26}{section.3.2}%
\contentsline {chapter}{\numberline {4}\'Etat de l'art (Raissonement à Partir de Cas)}{31}{chapter.4}%
\contentsline {section}{\numberline {4.1}Raisonnement à partir de cas (RàPC)}{31}{section.4.1}%
\contentsline {part}{III\hspace {1em}Contributions}{39}{part.3}%