\relax \providecommand\hyper@newdestlabel[2]{} \citation{LALITHA2020583} \citation{LALITHA2020583} \citation{LALITHA2020583} \@writefile{toc}{\contentsline {chapter}{\numberline {2}Contexte}{7}{chapter.2}\protected@file@percent } \@writefile{lof}{\addvspace {10\p@ }} \@writefile{lot}{\addvspace {10\p@ }} \@writefile{toc}{\contentsline {section}{\numberline {2.1}Les stratégies d'apprentissage humain et les environnements informatiques pour l'apprentissage humain (EIAH)}{7}{section.2.1}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {2.1.1}Les stratégies d'apprentissage}{7}{subsection.2.1.1}\protected@file@percent } \citation{Nkambou} \citation{Nkambou} \@writefile{lof}{\contentsline {figure}{\numberline {2.1}{\ignorespaces Stratégies d'apprentissage (\cite {LALITHA2020583})\relax }}{8}{figure.caption.4}\protected@file@percent } \providecommand*\caption@xref[2]{\@setref\relax\@undefined{#1}} \newlabel{fig:figStra}{{2.1}{8}{Stratégies d'apprentissage (\cite {LALITHA2020583})\relax }{figure.caption.4}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {2.1.2}Les EIAH}{8}{subsection.2.1.2}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {2.2}{\ignorespaces L'architecture générale des EIAH, les composantes et leurs interactions (\cite {Nkambou})\relax }}{9}{figure.caption.5}\protected@file@percent } \newlabel{fig:figEIAH}{{2.2}{9}{L'architecture générale des EIAH, les composantes et leurs interactions (\cite {Nkambou})\relax }{figure.caption.5}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {2.1.3}L'exerciseur initial AI-VT}{10}{subsection.2.1.3}\protected@file@percent } \citation{ROLDANREYES20151} \citation{10.1007/978-3-030-58342-2_20} \citation{min8100434} \citation{min8100434} \citation{min8100434} \citation{Richter2013} \@writefile{toc}{\contentsline {section}{\numberline {2.2}Le contexte technique}{11}{section.2.2}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Le raisonnement à partir de cas (Rà PC)}{11}{subsection.2.2.1}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {2.3}{\ignorespaces Cycle fondamental du raisonnement à partir de cas (\cite {min8100434})\relax }}{12}{figure.caption.6}\protected@file@percent } \newlabel{fig:figCycle}{{2.3}{12}{Cycle fondamental du raisonnement à partir de cas (\cite {min8100434})\relax }{figure.caption.6}{}} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.1}Rechercher}{12}{subsubsection.2.2.1.1}\protected@file@percent } \citation{Richter2013} \citation{Richter2013} \newlabel{eqSim}{{2.1}{13}{Rechercher}{equation.2.2.1}{}} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.2}Adapter (Réutiliser)}{13}{subsubsection.2.2.1.2}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {2.4}{\ignorespaces Principe de réutilisation dans le Rà PC (\cite {Richter2013})\relax }}{13}{figure.caption.7}\protected@file@percent } \newlabel{fig:figReut}{{2.4}{13}{Principe de réutilisation dans le Rà PC (\cite {Richter2013})\relax }{figure.caption.7}{}} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.3}Réviser et Réparer}{13}{subsubsection.2.2.1.3}\protected@file@percent } \citation{RICHTER20093} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.4}Stocker (Retenir)}{14}{subsubsection.2.2.1.4}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.5}Conteneurs de Connaissance}{14}{subsubsection.2.2.1.5}\protected@file@percent } \citation{hajduk2019cognitive} \@writefile{lof}{\contentsline {figure}{\numberline {2.5}{\ignorespaces Cycle du Rà PC, les étapes, les conteneurs et leurs flux de données\relax }}{15}{figure.caption.8}\protected@file@percent } \newlabel{fig:figCycle}{{2.5}{15}{Cycle du Rà PC, les étapes, les conteneurs et leurs flux de données\relax }{figure.caption.8}{}} \citation{Hoang} \@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Les systèmes multi-agents}{16}{subsection.2.2.2}\protected@file@percent } \citation{Hoang} \citation{10.1145/3459665} \@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Différents algorithmes et fonctions implémentés dans AI-VT pour la personnalisation et l'adaptation des séances d'entrainement proposées}{17}{subsection.2.2.3}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.1}Pensée Bayesienne}{17}{subsubsection.2.2.3.1}\protected@file@percent } \newlabel{eqBayes}{{2.2}{17}{Pensée Bayesienne}{equation.2.2.2}{}} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.2}Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{17}{subsubsection.2.2.3.2}\protected@file@percent } \newlabel{eqDist}{{2.3}{18}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.2.3}{}} \newlabel{eqMet1}{{2.4}{18}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.2.4}{}} \newlabel{eqMet2}{{2.5}{18}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.2.5}{}} \newlabel{eqV1}{{2.6}{18}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.2.6}{}} \newlabel{eqV2}{{2.7}{18}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.2.7}{}} \newlabel{eqV3}{{2.8}{18}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.2.8}{}} \citation{9072123} \citation{WANG2021331} \newlabel{eqCond}{{2.9}{19}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.2.9}{}} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.3}K-Moyennes}{19}{subsubsection.2.2.3.3}\protected@file@percent } \newlabel{eqKM}{{2.10}{19}{K-Moyennes}{equation.2.2.10}{}} \newlabel{eqCentres}{{2.11}{19}{K-Moyennes}{equation.2.2.11}{}} \newlabel{eqApp}{{2.12}{19}{K-Moyennes}{equation.2.2.12}{}} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.4}Modèle de Mélange Gaussien GMM (\textit {Gaussian Mixture Model})}{19}{subsubsection.2.2.3.4}\protected@file@percent } \newlabel{eqGMM}{{2.13}{19}{Modèle de Mélange Gaussien GMM (\textit {Gaussian Mixture Model})}{equation.2.2.13}{}} \citation{9627973} \newlabel{eqK}{{2.14}{20}{Modèle de Mélange Gaussien GMM (\textit {Gaussian Mixture Model})}{equation.2.2.14}{}} \newlabel{eqdProb}{{2.15}{20}{Modèle de Mélange Gaussien GMM (\textit {Gaussian Mixture Model})}{equation.2.2.15}{}} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.5}Fuzzy-C}{20}{subsubsection.2.2.3.5}\protected@file@percent } \newlabel{eqFuzzy}{{2.16}{20}{Fuzzy-C}{equation.2.2.16}{}} \newlabel{eqFCond}{{2.17}{20}{Fuzzy-C}{equation.2.2.17}{}} \citation{9434422} \citation{9870279} \newlabel{eqFV}{{2.18}{21}{Fuzzy-C}{equation.2.2.18}{}} \newlabel{eqFU}{{2.19}{21}{Fuzzy-C}{equation.2.2.19}{}} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.6}Bandit Manchot MAB (\textit {Multi-Armed Bandits})}{21}{subsubsection.2.2.3.6}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.7}Échantillonnage de Thompson TS (\textit {Thompson Sampling})}{21}{subsubsection.2.2.3.7}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {2.6}{\ignorespaces Comportement de la distribution Beta avec différentes valeurs de paramètres $alpha$ et $beta$\relax }}{22}{figure.caption.9}\protected@file@percent } \newlabel{fig:figBeta}{{2.6}{22}{Comportement de la distribution Beta avec différentes valeurs de paramètres $alpha$ et $beta$\relax }{figure.caption.9}{}} \newlabel{eqBeta}{{2.20}{22}{Échantillonnage de Thompson TS (\textit {Thompson Sampling})}{equation.2.2.20}{}} \@setckpt{./chapters/contexte2}{ \setcounter{page}{23} \setcounter{equation}{20} \setcounter{enumi}{0} \setcounter{enumii}{0} \setcounter{enumiii}{0} \setcounter{enumiv}{0} \setcounter{footnote}{0} \setcounter{mpfootnote}{0} \setcounter{part}{1} \setcounter{chapter}{2} \setcounter{section}{2} \setcounter{subsection}{3} \setcounter{subsubsection}{7} \setcounter{paragraph}{0} \setcounter{subparagraph}{0} \setcounter{figure}{6} \setcounter{table}{0} \setcounter{caption@flags}{2} \setcounter{continuedfloat}{0} \setcounter{subfigure}{0} \setcounter{subtable}{0} \setcounter{parentequation}{0} \setcounter{thmt@dummyctr}{0} \setcounter{vrcnt}{0} \setcounter{upm@subfigure@count}{0} \setcounter{upm@fmt@mtabular@columnnumber}{0} \setcounter{upm@format@section@sectionlevel}{3} \setcounter{upm@fmt@savedcounter}{0} \setcounter{@@upm@fmt@inlineenumeration}{0} \setcounter{@upm@fmt@enumdescription@cnt@}{0} \setcounter{upmdefinition}{0} \setcounter{section@level}{3} \setcounter{Item}{0} \setcounter{Hfootnote}{0} \setcounter{bookmark@seq@number}{25} \setcounter{DefaultLines}{2} \setcounter{DefaultDepth}{0} \setcounter{L@lines}{3} \setcounter{L@depth}{0} \setcounter{float@type}{8} \setcounter{algorithm}{0} \setcounter{ALG@line}{0} \setcounter{ALG@rem}{0} \setcounter{ALG@nested}{0} \setcounter{ALG@Lnr}{2} \setcounter{ALG@blocknr}{10} \setcounter{ALG@storecount}{0} \setcounter{ALG@tmpcounter}{0} }