\relax \providecommand\hyper@newdestlabel[2]{} \citation{LALITHA2020583} \citation{LALITHA2020583} \citation{LALITHA2020583} \@writefile{toc}{\contentsline {chapter}{\numberline {2}Contexte}{9}{chapter.2}\protected@file@percent } \@writefile{lof}{\addvspace {10\p@ }} \@writefile{lot}{\addvspace {10\p@ }} \newlabel{chap:contexte}{{2}{9}{Contexte}{chapter.2}{}} \@writefile{toc}{\contentsline {section}{\numberline {2.1}Les stratégies d'apprentissage humain et les environnements informatiques pour l'apprentissage humain (EIAH)}{9}{section.2.1}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {2.1.1}Les stratégies d'apprentissage}{9}{subsection.2.1.1}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {2.1}{\ignorespaces Stratégies d'apprentissage (Traduit de \cite {LALITHA2020583})}}{10}{figure.caption.3}\protected@file@percent } \providecommand*\caption@xref[2]{\@setref\relax\@undefined{#1}} \newlabel{fig:figStra}{{2.1}{10}{Stratégies d'apprentissage (Traduit de \protect \cite {LALITHA2020583})}{figure.caption.3}{}} \citation{Nkambou} \citation{Nkambou} \@writefile{toc}{\contentsline {subsection}{\numberline {2.1.2}Les EIAH}{11}{subsection.2.1.2}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {2.2}{\ignorespaces L'architecture générale des EIAH, les composantes et leurs interactions (Traduit de \cite {Nkambou})}}{11}{figure.caption.4}\protected@file@percent } \newlabel{fig:figEIAH}{{2.2}{11}{L'architecture générale des EIAH, les composantes et leurs interactions (Traduit de \protect \cite {Nkambou})}{figure.caption.4}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {2.1.3}L'exerciseur initial AI-VT}{12}{subsection.2.1.3}\protected@file@percent } \citation{ROLDANREYES20151} \citation{10.1007/978-3-030-58342-2_20} \citation{min8100434} \citation{min8100434} \citation{doi10.3233/AIC-1994-7104} \citation{min8100434} \citation{Richter2013} \@writefile{toc}{\contentsline {section}{\numberline {2.2}Le contexte technique}{13}{section.2.2}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Le raisonnement à partir de cas (RàPC)}{13}{subsection.2.2.1}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {2.3}{\ignorespaces Cycle fondamental du raisonnement à partir de cas (Adapté et traduit de \cite {min8100434})}}{14}{figure.caption.5}\protected@file@percent } \newlabel{fig:figCycle}{{2.3}{14}{Cycle fondamental du raisonnement à partir de cas (Adapté et traduit de \protect \cite {min8100434})}{figure.caption.5}{}} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.1}Retrouver (Rechercher)}{14}{subsubsection.2.2.1.1}\protected@file@percent } \citation{Richter2013} \citation{Richter2013} \newlabel{eqSim}{{2.1}{15}{Retrouver (Rechercher)}{equation.2.2.1}{}} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.2}Réutiliser (Adapter)}{15}{subsubsection.2.2.1.2}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.3}Réviser et Réparer}{15}{subsubsection.2.2.1.3}\protected@file@percent } \citation{RICHTER20093} \@writefile{lof}{\contentsline {figure}{\numberline {2.4}{\ignorespaces Principe de réutilisation dans le RàPC (Traduit de \cite {Richter2013})}}{16}{figure.caption.6}\protected@file@percent } \newlabel{fig:figReut}{{2.4}{16}{Principe de réutilisation dans le RàPC (Traduit de \protect \cite {Richter2013})}{figure.caption.6}{}} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.4}Retenir (Stocker)}{16}{subsubsection.2.2.1.4}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.1.5}Conteneurs de Connaissance}{16}{subsubsection.2.2.1.5}\protected@file@percent } \citation{hajduk2019cognitive} \@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Les systèmes multi-agents}{17}{subsection.2.2.2}\protected@file@percent } \citation{Hoang} \@writefile{lof}{\contentsline {figure}{\numberline {2.5}{\ignorespaces Cycle du RàPC, les étapes, les conteneurs et leurs flux de données}}{18}{figure.caption.7}\protected@file@percent } \newlabel{fig:figCycleCBR}{{2.5}{18}{Cycle du RàPC, les étapes, les conteneurs et leurs flux de données}{figure.caption.7}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Différents algorithmes et fonctions implémentés dans AI-VT pour la personnalisation et l'adaptation des séances d'entraînement proposées}{18}{subsection.2.2.3}\protected@file@percent } \citation{Hoang} \citation{10.1145/3459665} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.1}Pensée Bayesienne}{19}{subsubsection.2.2.3.1}\protected@file@percent } \newlabel{eqBayes}{{2.2}{19}{Pensée Bayesienne}{equation.2.2.2}{}} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.2}Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{19}{subsubsection.2.2.3.2}\protected@file@percent } \citation{9072123} \newlabel{eqDist}{{2.3}{20}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.2.3}{}} \newlabel{eqMet1}{{2.4}{20}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.2.4}{}} \newlabel{eqMet2}{{2.5}{20}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.2.5}{}} \newlabel{eqV1}{{2.6}{20}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.2.6}{}} \newlabel{eqV2}{{2.7}{20}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.2.7}{}} \newlabel{eqV3}{{2.8}{20}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.2.8}{}} \newlabel{eqCond}{{2.9}{20}{Méthode des k plus proches voisins (K-Nearest Neighborhood - KNN)}{equation.2.2.9}{}} \citation{WANG2021331} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.3}K-Moyennes}{21}{subsubsection.2.2.3.3}\protected@file@percent } \newlabel{eqKM}{{2.10}{21}{K-Moyennes}{equation.2.2.10}{}} \newlabel{eqCentres}{{2.11}{21}{K-Moyennes}{equation.2.2.11}{}} \newlabel{eqApp}{{2.12}{21}{K-Moyennes}{equation.2.2.12}{}} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.4}Modèle de mélange Gaussien GMM (\textit {Gaussian Mixture Model})}{21}{subsubsection.2.2.3.4}\protected@file@percent } \newlabel{eqGMM}{{2.13}{21}{Modèle de mélange Gaussien GMM (\textit {Gaussian Mixture Model})}{equation.2.2.13}{}} \newlabel{eqdProb}{{2.14}{21}{Modèle de mélange Gaussien GMM (\textit {Gaussian Mixture Model})}{equation.2.2.14}{}} \citation{9627973} \citation{9434422} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.5}Fuzzy-C}{22}{subsubsection.2.2.3.5}\protected@file@percent } \newlabel{eqFuzzy}{{2.15}{22}{Fuzzy-C}{equation.2.2.15}{}} \newlabel{eqFCond}{{2.16}{22}{Fuzzy-C}{equation.2.2.16}{}} \newlabel{eqFV}{{2.17}{22}{Fuzzy-C}{equation.2.2.17}{}} \newlabel{eqFU}{{2.18}{22}{Fuzzy-C}{equation.2.2.18}{}} \citation{9870279} \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.6}Bandit Manchot MAB (\textit {Multi-Armed Bandits})}{23}{subsubsection.2.2.3.6}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{\numberline {2.2.3.7}Échantillonnage de Thompson TS (\textit {Thompson Sampling})}{23}{subsubsection.2.2.3.7}\protected@file@percent } \newlabel{eqBeta}{{2.19}{23}{Échantillonnage de Thompson TS (\textit {Thompson Sampling})}{equation.2.2.19}{}} \@writefile{lof}{\contentsline {figure}{\numberline {2.6}{\ignorespaces Comportement de la distribution Beta avec différentes valeurs de paramètres $alpha$ et $beta$}}{24}{figure.caption.8}\protected@file@percent } \newlabel{fig:figBeta}{{2.6}{24}{Comportement de la distribution Beta avec différentes valeurs de paramètres $alpha$ et $beta$}{figure.caption.8}{}} \@setckpt{./chapters/contexte2}{ \setcounter{page}{25} \setcounter{equation}{19} \setcounter{enumi}{0} \setcounter{enumii}{0} \setcounter{enumiii}{0} \setcounter{enumiv}{0} \setcounter{footnote}{0} \setcounter{mpfootnote}{0} \setcounter{part}{2} \setcounter{chapter}{2} \setcounter{section}{2} \setcounter{subsection}{3} \setcounter{subsubsection}{7} \setcounter{paragraph}{0} \setcounter{subparagraph}{0} \setcounter{figure}{6} \setcounter{table}{0} \setcounter{section@level}{0} \setcounter{Item}{0} \setcounter{Hfootnote}{0} \setcounter{bookmark@seq@number}{27} \setcounter{caption@flags}{2} \setcounter{continuedfloat}{0} \setcounter{subfigure}{0} \setcounter{subtable}{0} \setcounter{LT@tables}{0} \setcounter{LT@chunks}{0} \setcounter{tcbbreakpart}{1} \setcounter{tcblayer}{0} \setcounter{tcolorbox@number}{1} \setcounter{parentequation}{0} \setcounter{thmt@dummyctr}{0} \setcounter{vrcnt}{0} \setcounter{@stackindex}{0} \setcounter{ROWcellindex@}{0} \setcounter{upm@subfigure@count}{0} \setcounter{upm@fmt@mtabular@columnnumber}{0} \setcounter{upm@format@section@sectionlevel}{0} \setcounter{ttlp@side}{0} \setcounter{upm@fmt@savedcounter}{0} \setcounter{@upm@fmt@enumdescription@cnt@}{0} \setcounter{tcb@cnt@upm@definition}{0} \setcounter{DefaultLines}{2} \setcounter{DefaultDepth}{0} \setcounter{L@lines}{4} \setcounter{L@depth}{0} \setcounter{upm@phdthesis@researchquestion@count}{0} \setcounter{upm@phdthesis@objective@count}{0} \setcounter{upm@phdthesis@contribution@count}{0} \setcounter{NAT@ctr}{0} \setcounter{etoc@tocid}{2} \setcounter{float@type}{16} \setcounter{algorithm}{0} \setcounter{ALG@line}{0} \setcounter{ALG@rem}{0} \setcounter{ALG@nested}{0} \setcounter{ALG@Lnr}{2} \setcounter{ALG@blocknr}{10} \setcounter{ALG@storecount}{0} \setcounter{ALG@tmpcounter}{0} }