\relax \providecommand\babel@aux[2]{} \@nameuse{bbl@beforestart} \catcode `:\active \catcode `;\active \catcode `!\active \catcode `?\active \providecommand\hyper@newdestlabel[2]{} \providecommand\HyperFirstAtBeginDocument{\AtBeginDocument} \HyperFirstAtBeginDocument{\ifx\hyper@anchor\@undefined \global\let\oldnewlabel\newlabel \gdef\newlabel#1#2{\newlabelxx{#1}#2} \gdef\newlabelxx#1#2#3#4#5#6{\oldnewlabel{#1}{{#2}{#3}}} \AtEndDocument{\ifx\hyper@anchor\@undefined \let\newlabel\oldnewlabel \fi} \fi} \global\let\hyper@last\relax \gdef\HyperFirstAtBeginDocument#1{#1} \providecommand\HyField@AuxAddToFields[1]{} \providecommand\HyField@AuxAddToCoFields[2]{} \providecommand \oddpage@label [2]{} \babel@aux{french}{} \@writefile{toc}{\contentsline {part}{I\hspace {1em}Contexte et Problématiques}{1}{part.1}\protected@file@percent } \citation{Nkambou} \citation{doi:10.1177/1754337116651013} \@writefile{toc}{\contentsline {chapter}{\numberline {1}Introduction}{3}{chapter.1}\protected@file@percent } \@writefile{lof}{\addvspace {10\p@ }} \@writefile{lot}{\addvspace {10\p@ }} \@writefile{toc}{\contentsline {section}{\numberline {1.1}Contributions Principales}{4}{section.1.1}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {1.2}Plan de la thèse}{5}{section.1.2}\protected@file@percent } \@writefile{toc}{\contentsline {chapter}{\numberline {2}Contexte}{7}{chapter.2}\protected@file@percent } \@writefile{lof}{\addvspace {10\p@ }} \@writefile{lot}{\addvspace {10\p@ }} \@writefile{toc}{\contentsline {section}{\numberline {2.1}Notions et Algorithmes}{7}{section.2.1}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {2.1.1}Environnements Informatiques pour l'Apprentissage Humain (EIAH)}{7}{subsection.2.1.1}\protected@file@percent } \citation{Nkambou} \citation{Nkambou} \citation{LALITHA2020583} \citation{LALITHA2020583} \citation{LALITHA2020583} \@writefile{lof}{\contentsline {figure}{\numberline {2.1}{\ignorespaces L'architecture générale des EIAH, les composantes et leurs interactions (\cite {Nkambou})\relax }}{8}{figure.caption.4}\protected@file@percent } \providecommand*\caption@xref[2]{\@setref\relax\@undefined{#1}} \newlabel{fig:figEIAH}{{2.1}{8}{L'architecture générale des EIAH, les composantes et leurs interactions (\cite {Nkambou})\relax }{figure.caption.4}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {2.1.2}Stratégies d'Apprentissage}{8}{subsection.2.1.2}\protected@file@percent } \citation{ROLDANREYES20151} \@writefile{lof}{\contentsline {figure}{\numberline {2.2}{\ignorespaces Stratégies d'apprentissage (\cite {LALITHA2020583})\relax }}{9}{figure.caption.5}\protected@file@percent } \newlabel{fig:figStra}{{2.2}{9}{Stratégies d'apprentissage (\cite {LALITHA2020583})\relax }{figure.caption.5}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {2.1.3}Raisonnement à partir de cas (RàPC)}{9}{subsection.2.1.3}\protected@file@percent } \citation{10.1007/978-3-030-58342-2_20} \citation{min8100434} \citation{min8100434} \citation{min8100434} \citation{Richter2013} \@writefile{lof}{\contentsline {figure}{\numberline {2.3}{\ignorespaces Cycle fondamental du raisonnement à partir de cas (\cite {min8100434})\relax }}{10}{figure.caption.6}\protected@file@percent } \newlabel{fig:figCycle}{{2.3}{10}{Cycle fondamental du raisonnement à partir de cas (\cite {min8100434})\relax }{figure.caption.6}{}} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.3.1}Rechercher}{11}{subsubsection.2.1.3.1}\protected@file@percent } \newlabel{eqSim}{{2.1}{11}{Rechercher}{equation.2.1.1}{}} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.3.2}Adapter (Réutiliser)}{11}{subsubsection.2.1.3.2}\protected@file@percent } \citation{Richter2013} \citation{Richter2013} \@writefile{lof}{\contentsline {figure}{\numberline {2.4}{\ignorespaces Principe de réutilisation dans le RàPC (\cite {Richter2013})\relax }}{12}{figure.caption.7}\protected@file@percent } \newlabel{fig:figReut}{{2.4}{12}{Principe de réutilisation dans le RàPC (\cite {Richter2013})\relax }{figure.caption.7}{}} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.3.3}Réviser et Réparer}{12}{subsubsection.2.1.3.3}\protected@file@percent } \citation{RICHTER20093} \citation{Marie} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.3.4}Stocker (Retenir)}{13}{subsubsection.2.1.3.4}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.3.5}Conteneurs de Connaissance}{13}{subsubsection.2.1.3.5}\protected@file@percent } \citation{hajduk2019cognitive} \@writefile{lof}{\contentsline {figure}{\numberline {2.5}{\ignorespaces Cycle du RàPC, les étapes, les conteneurs et leurs liens\relax }}{14}{figure.caption.8}\protected@file@percent } \newlabel{fig:figCycle}{{2.5}{14}{Cycle du RàPC, les étapes, les conteneurs et leurs liens\relax }{figure.caption.8}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {2.1.4}Systèmes Multi-Agents}{14}{subsection.2.1.4}\protected@file@percent } \citation{Hoang} \citation{Hoang} \@writefile{toc}{\contentsline {subsection}{\numberline {2.1.5}Pensée Bayesienne}{15}{subsection.2.1.5}\protected@file@percent } \newlabel{eqBayes}{{2.2}{15}{Pensée Bayesienne}{equation.2.1.2}{}} \citation{10.1145/3459665} \@writefile{toc}{\contentsline {subsection}{\numberline {2.1.6}Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{16}{subsection.2.1.6}\protected@file@percent } \newlabel{eqDist}{{2.3}{16}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.1.3}{}} \newlabel{eqMet1}{{2.4}{16}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.1.4}{}} \newlabel{eqMet2}{{2.5}{16}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.1.5}{}} \citation{9072123} \newlabel{eqV1}{{2.6}{17}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.1.6}{}} \newlabel{eqV2}{{2.7}{17}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.1.7}{}} \newlabel{eqV3}{{2.8}{17}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.1.8}{}} \newlabel{eqCond}{{2.9}{17}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.1.9}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {2.1.7}K-Moyennes}{17}{subsection.2.1.7}\protected@file@percent } \newlabel{eqKM}{{2.10}{17}{K-Moyennes}{equation.2.1.10}{}} \citation{WANG2021331} \newlabel{eqCentres}{{2.11}{18}{K-Moyennes}{equation.2.1.11}{}} \newlabel{eqApp}{{2.12}{18}{K-Moyennes}{equation.2.1.12}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {2.1.8}Modèle de Mélange Gaussien GMM (\textit {Gaussian Mixture Model})}{18}{subsection.2.1.8}\protected@file@percent } \newlabel{eqGMM}{{2.13}{18}{Modèle de Mélange Gaussien GMM (\textit {Gaussian Mixture Model})}{equation.2.1.13}{}} \newlabel{eqK}{{2.14}{18}{Modèle de Mélange Gaussien GMM (\textit {Gaussian Mixture Model})}{equation.2.1.14}{}} \newlabel{eqdProb}{{2.15}{18}{Modèle de Mélange Gaussien GMM (\textit {Gaussian Mixture Model})}{equation.2.1.15}{}} \citation{9627973} \citation{9434422} \@writefile{toc}{\contentsline {subsection}{\numberline {2.1.9}Fuzzy-C}{19}{subsection.2.1.9}\protected@file@percent } \newlabel{eqFuzzy}{{2.16}{19}{Fuzzy-C}{equation.2.1.16}{}} \newlabel{eqFCond}{{2.17}{19}{Fuzzy-C}{equation.2.1.17}{}} \newlabel{eqFV}{{2.18}{19}{Fuzzy-C}{equation.2.1.18}{}} \newlabel{eqFU}{{2.19}{19}{Fuzzy-C}{equation.2.1.19}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {2.1.10}Bandit Manchot MAB (\textit {Multi-Armed Bandits})}{19}{subsection.2.1.10}\protected@file@percent } \citation{9870279} \@writefile{toc}{\contentsline {subsection}{\numberline {2.1.11}Échantillonnage de Thompson TS (\textit {Thompson Sampling})}{20}{subsection.2.1.11}\protected@file@percent } \newlabel{eqBeta}{{2.20}{20}{Échantillonnage de Thompson TS (\textit {Thompson Sampling})}{equation.2.1.20}{}} \@writefile{lof}{\contentsline {figure}{\numberline {2.6}{\ignorespaces Comportement de la distribution Beta avec différents valeurs dans ses paramètres\relax }}{21}{figure.caption.9}\protected@file@percent } \newlabel{fig:figBeta}{{2.6}{21}{Comportement de la distribution Beta avec différents valeurs dans ses paramètres\relax }{figure.caption.9}{}} \@writefile{toc}{\contentsline {part}{II\hspace {1em}État de l'art}{23}{part.2}\protected@file@percent } \citation{ZHANG2021100025} \citation{CHIU2023100118} \@writefile{toc}{\contentsline {chapter}{\numberline {3}Environnements Informatiques d'Apprentissage Humain}{25}{chapter.3}\protected@file@percent } \@writefile{lof}{\addvspace {10\p@ }} \@writefile{lot}{\addvspace {10\p@ }} \@writefile{toc}{\contentsline {section}{\numberline {3.1}L'Intelligence Artificielle}{25}{section.3.1}\protected@file@percent } \citation{Robertson2014ARO} \citation{MUANGPRATHUB2020e05227} \citation{HUANG2023104684} \@writefile{toc}{\contentsline {section}{\numberline {3.2}Systèmes de Recommandation dans les EIAH}{26}{section.3.2}\protected@file@percent } \citation{HUANG2023104684} \citation{HUANG2023104684} \citation{pmlr-v108-seznec20a} \citation{INGKAVARA2022100086} \@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Architecture du système de recommandation proposé dans \cite {HUANG2023104684}\relax }}{27}{figure.caption.10}\protected@file@percent } \newlabel{figArch}{{3.1}{27}{Architecture du système de recommandation proposé dans \cite {HUANG2023104684}\relax }{figure.caption.10}{}} \citation{LALITHA2020583} \citation{ZHAO2023118535} \citation{SU2022109547} \citation{MUANGPRATHUB2020e05227} \citation{Zhou2021} \citation{EZALDEEN2022100700} \citation{EZALDEEN2022100700} \citation{EZALDEEN2022100700} \citation{ZHANG2021100025} \citation{CHIU2023100118} \citation{Robertson2014ARO} \citation{HUANG2023104684} \citation{pmlr-v108-seznec20a} \citation{INGKAVARA2022100086} \citation{LALITHA2020583} \citation{SU2022109547} \citation{MUANGPRATHUB2020e05227} \citation{Zhou2021} \citation{EZALDEEN2022100700} \bibstyle{apalike} \bibdata{main.bib} \@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces Niveaux du système de recommandation dans \cite {EZALDEEN2022100700}\relax }}{30}{figure.caption.11}\protected@file@percent } \newlabel{fig:figLevels}{{3.2}{30}{Niveaux du système de recommandation dans \cite {EZALDEEN2022100700}\relax }{figure.caption.11}{}} \@writefile{lot}{\contentsline {table}{\numberline {3.1}{\ignorespaces Tableau de synthèse des articles analysés dans l'état de l'art des EIAH\relax }}{30}{table.caption.12}\protected@file@percent } \newlabel{tabArts}{{3.1}{30}{Tableau de synthèse des articles analysés dans l'état de l'art des EIAH\relax }{table.caption.12}{}} \bibcite{CHIU2023100118}{Chiu et~al., 2023} \bibcite{10.1145/3459665}{Cunningham and Delany, 2021} \bibcite{EZALDEEN2022100700}{Ezaldeen et~al., 2022} \bibcite{9434422}{Gupta et~al., 2021} \bibcite{hajduk2019cognitive}{Hajduk et~al., 2019} \bibcite{doi:10.1177/1754337116651013}{Henriet et~al., 2017} \bibcite{Hoang}{Hoang, 2018} \bibcite{HUANG2023104684}{Huang et~al., 2023} \bibcite{INGKAVARA2022100086}{Ingkavara et~al., 2022} \bibcite{LALITHA2020583}{Lalitha and Sreeja, 2020} \bibcite{min8100434}{Leikola et~al., 2018} \bibcite{10.1007/978-3-030-58342-2_20}{Lepage et~al., 2020} \bibcite{9870279}{Lin, 2022} \bibcite{Marie}{Marie, 2019} \bibcite{MUANGPRATHUB2020e05227}{Muangprathub et~al., 2020} \bibcite{Nkambou}{Nkambou et~al., 2010} \bibcite{Richter2013}{Richter and Weber, 2013} \bibcite{RICHTER20093}{Richter, 2009} \bibcite{Robertson2014ARO}{Robertson and Watson, 2014} \bibcite{ROLDANREYES20151}{{Roldan Reyes} et~al., 2015} \bibcite{pmlr-v108-seznec20a}{Seznec et~al., 2020} \bibcite{9072123}{Sinaga and Yang, 2020} \bibcite{SU2022109547}{Su et~al., 2022} \bibcite{WANG2021331}{Wang et~al., 2021} \bibcite{9627973}{Xu et~al., 2021} \bibcite{ZHANG2021100025}{Zhang. and Aslan, 2021} \bibcite{ZHAO2023118535}{Zhao et~al., 2023} \bibcite{Zhou2021}{Zhou and Wang, 2021} \gdef \@abspage@last{42}