el

Marc Fesneau : « Que chacun cesse d’avoir en ligne de mire son agenda personnel en vue de 2027 »

INTERVIEW. Pour le patron du groupe MoDem a l'Assemblee, il faut d'urgence sortir du bal des ego qui mine le << socle commun >> de Barnier et << etre utile aux Francais >>.




el

Guillaume Kasbarian félicite Elon Musk tout juste nommé ministre par Trump, la gauche s’insurge

Apres la nomination d'Elon Musk a la tete d'un ministere de l'Efficacite gouvernementale, le ministre de la Fonction publique francais a exprime sa << hate >> de << partager les meilleures pratiques >>.




el

Enciende tu voz: el desafío de escribir tu primer libro

Este artículo es para ti si quieres embarcarte en una travesía única: la aventura de escribir tu primer libro. No estoy hablando de un libro […]

Origen




el

María Moliner: ‘Diccionario de uso del español’

El Diccionario de uso del español de María Moliner es una obra monumental. Son dos volúmenes que la autora iba elaborando pacientemente en el salón […]

Origen




el

El contenido es el rey: cómo escribir un libro

¿Te gustaría escribir un libro? ¿Alguna vez lo has intentado? Sé que escribir un libro puede parecer un reto formidable. Muchas personas se preguntan si […]

Origen




el

The Use of Latent Semantic Indexing to Mitigate OCR Effects of Related Document Images

Due to both the widespread and multipurpose use of document images and the current availability of a high number of document images repositories, robust information retrieval mechanisms and systems have been increasingly demanded. This paper presents an approach to support the automatic generation of relationships among document images by exploiting Latent Semantic Indexing (LSI) and Optical Character Recognition (OCR). We developed the LinkDI (Linking of Document Images) service, which extracts and indexes document images content, computes its latent semantics, and defines relationships among images as hyperlinks. LinkDI was experimented with document images repositories, and its performance was evaluated by comparing the quality of the relationships created among textual documents as well as among their respective document images. Considering those same document images, we ran further experiments in order to compare the performance of LinkDI when it exploits or not the LSI technique. Experimental results showed that LSI can mitigate the effects of usual OCR misrecognition, which reinforces the feasibility of LinkDI relating OCR output with high degradation.




el

Color Image Restoration Using Neural Network Model

Neural network learning approach for color image restoration has been discussed in this paper and one of the possible solutions for restoring images has been presented. Here neural network weights are considered as regularization parameter values instead of explicitly specifying them. The weights are modified during the training through the supply of training set data. The desired response of the network is in the form of estimated value of the current pixel. This estimated value is used to modify the network weights such that the restored value produced by the network for a pixel is as close as to this desired response. One of the advantages of the proposed approach is that, once the neural network is trained, images can be restored without having prior information about the model of noise/blurring with which the image is corrupted.




el

Developing a Mobile Collaborative Tool for Business Continuity Management

We describe the design of a mobile collaborative tool that helps teams managing critical computing infrastructures in organizations, a task that is usually designated Business Continuity Management. The design process started with a requirements definition phase based on interviews with professional teams. The elicited requirements highlight four main concerns: collaboration support, knowledge management, team performance, and situation awareness. Based on these concerns, we developed a data model and tool supporting the collaborative update of Situation Matrixes. The matrixes aim to provide an integrated view of the operational and contextual conditions that frame critical events and inform the operators' responses to events. The paper provides results from our preliminary experiments with Situation Matrixes.




el

Managing Mechanisms for Collaborative New-Product Development in the Ceramic Tile Design Chain

This paper focuses on improving the management of New-Product Development (NPD) processes within the particular context of a cluster of enterprises that cooperate through a network of intra- and inter-firm relations. Ceramic tile design chains have certain singularities that condition the NPD process, such as the lack of a strong hierarchy, fashion pressure or the existence of different origins for NPD projects. We have studied these particular circumstances in order to tailor Product Life-cycle Management (PLM) tools and some other management mechanisms to fit suitable sectoral reference models. Special emphasis will be placed on PLM templates for structuring and standardizing projects, and also on the roles involved in the process.




el

Let Me Tell You a Story - On How to Build Process Models

Process Modeling has been a very active research topic for the last decades. One of its main issues is the externalization of knowledge and its acquisition for further use, as this remains deeply related to the quality of the resulting process models produced by this task. This paper presents a method and a graphical supporting tool for process elicitation and modeling, combining the Group Storytelling technique with the advances of Text Mining and Natural Language Processing. The implemented tool extends its previous versions with several functionalities to facilitate group story telling by the users, as well as to improve the results of the acquired process model from the stories.




el

Rule of Law on the Go: New Developments of Mobile Governance

This paper offers an overview of the emerging domain of mobile governance as an offspring of the broader landscape of e-governance. Mobile governance initiatives have been deployed everywhere in parallel to the development of crowdsourced, open source software applications that facilitate the collection, aggregation, and dissemination of both information and data coming from different sources: citizens, organizations, public bodies, etc. Ultimately, mobile governance can be seen as a tool to promote the rule of law from a decentralized, distributed, and bottom-up perspective.




el

Leveraging Web 2.0 in New Product Development: Lessons Learned from a Cross-company Study

The paper explores the application of Web 2.0 technologies to support product development efforts in a global, virtual and cross-functional setting. It analyses the dichotomy between the prevailing hierarchical structure of CAD/PLM/PDM systems and the principles of the Social Web under the light of the emerging product development trends. Further it introduces the concept of Engineering 2.0, intended as a more bottom up and lightweight knowledge sharing approach to support early stage design decisions within virtual and cross-functional product development teams. The lessons learned collected from a cross-company study highlight how to further developblogs, wikis, forums and tags for the benefit of new product development teams, highlighting opportunities, challenges and no-go areas.




el

Modeling Quality Attributes with Aspect-Oriented Architectural Templates

The quality attributes of a software system are, to a large extent, determined by the decisions taken early in the development process. Best practices in software engineering recommend the identification of important quality attributes during the requirements elicitation process, and the specification of software architectures to satisfy these requirements. Over the years the software engineering community has studied the relationship between quality attributes and the use of particular architectural styles and patterns. In this paper we study the relationship between quality attributes and Aspect-Oriented Software Architectures - which apply the principles of Aspect-Oriented Software Development (AOSD) at the architectural level. AOSD focuses on identifying, modeling and composing crosscutting concerns - i.e. concerns that are tangled and/or scattered with other concerns of the application. In this paper we propose to use AO-ADL, an aspect-oriented architectural description language, to specify quality attributes by means of parameterizable, and thus reusable, architectural patterns. We particularly focus on quality attributes that: (1) have major implications on software functionality, requiring the incorporation of explicit functionality at the architectural level; (2) are complex enough as to be modeled by a set of related concerns and the compositions among them, and (3) crosscut domain specific functionality and are related to more than one component in the architecture. We illustrate our approach for usability, a critical quality attribute that satisfies the previous constraints and that requires special attention at the requirements and the architecture design stages.




el

Automatically Checking Feature Model Refactorings

A feature model (FM) defines the valid combinations of features, whose combinations correspond to a program in a Software Product Line (SPL). FMs may evolve, for instance, during refactoring activities. Developers may use a catalog of refactorings as support. However, the catalog is incomplete in principle. Additionally, it is non-trivial to propose correct refactorings. To our knowledge, no previous analysis technique for FMs is used for checking properties of general FM refactorings (a transformation that can be applied to a number of FMs) containing a representative number of features. We propose an efficient encoding of FMs in the Alloy formal specification language. Based on this encoding, we show how the Alloy Analyzer tool, which performs analysis on Alloy models, can be used to automatically check whether encoded general and specific FM refactorings are correct. Our approach can analyze general transformations automatically to a significant scale in a few seconds. In order to evaluate the analysis performance of our encoding, we evaluated in automatically generated FMs ranging from 500 to 2,000 features. Furthermore, we analyze the soundness of general transformations.




el

Context-Aware Composition and Adaptation based on Model Transformation

Using pre-existing software components (COTS) to develop software systems requires the composition and adaptation of the component interfaces to solve mismatch problems. These mismatches may appear at different interoperability levels (signature, behavioural, quality of service and semantic). In this article, we define an approach which supports composition and adaptation of software components based on model transformation by taking into account the four levels. Signature and behavioural levels are addressed by means of transition systems. Context-awareness and semanticbased techniques are used to tackle quality of service and semantic, respectively, but also both consider the signature level. We have implemented and validated our proposal for the design and application of realistic and complex systems. Here, we illustrate the need to support the variability of the adaptation process in a context-aware pervasive system through a real-world case study, where software components are implemented using Windows Workflow Foundation (WF). We apply our model transformation process to extract transition systems (CA-STS specifications) from WF components. These CA-STSs are used to tackle the composition and adaptation. Then, we generate a CASTS adaptor specification, which is transformed into its corresponding WF adaptor component with the purpose of interacting with all the WF components of the system, thereby avoiding mismatch problems.




el

An Approach for Feature Modeling of Context-Aware Software Product Line

Feature modeling is an approach to represent commonalities and variabilities among products of a product line. Context-aware applications use context information to provide relevant services and information for their users. One of the challenges to build a context-aware product line is to develop mechanisms to incorporate context information and adaptation knowledge in a feature model. This paper presents UbiFEX, an approach to support feature analysis for context-aware software product lines, which incorporates a modeling notation and a mechanism to verify the consistency of product configuration regarding context variations. Moreover, an experimental study was performed as a preliminary evaluation, and a prototype was developed to enable the application of the proposed approach.




el

Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS

Recently, IEEE 802.16 Worldwide Interoperability for Microwave Access (WiMAX for short) has provided us with low-cost, high efficiency and high bandwidth network services. However, as with the WiFi, the radio wave transmission also makes the WiMAX face the wireless transmission security problem. To solve this problem, the IEEE802.16Std during its development stage defines the Privacy Key Management (PKM for short) authentication process which offers a one-way authentication. However, using a one-way authentication, an SS may connect to a fake BS. Mutual authentication, like that developed for PKMv2, can avoid this problem. Therefore, in this paper, we propose an authentication key management approach, called Diffie-Hellman-PKDS-based authentication method (DiHam for short), which employs a secret door asymmetric one-way function, Public Key Distribution System (PKDS for short), to improve current security level of facility authentication between WiMAX's BS and SS. We further integrate the PKMv1 and the DiHam into a system, called PKM-DiHam (P-DiHam for short), in which the PKMv1 acts as the authentication process, and the DiHam is responsible for key management and delivery. By transmitting securely protected and well-defined parameters for SS and BS, the two stations can mutually authenticate each other. Messages including those conveying user data and authentication parameters can be then more securely delivered.




el

Hierarchical Graph-Grammar Model for Secure and Efficient Handwritten Signatures Classification

One important subject associated with personal authentication capabilities is the analysis of handwritten signatures. Among the many known techniques, algorithms based on linguistic formalisms are also possible. However, such techniques require a number of algorithms for intelligent image analysis to be applied, allowing the development of new solutions in the field of personal authentication and building modern security systems based on the advanced recognition of such patterns. The article presents the approach based on the usage of syntactic methods for the static analysis of handwritten signatures. The graph linguistic formalisms applied, such as the IE graph and ETPL(k) grammar, are characterised by considerable descriptive strength and a polynomial membership problem of the syntactic analysis. For the purposes of representing the analysed handwritten signatures, new hierarchical (two-layer) HIE graph structures based on IE graphs have been defined. The two-layer graph description makes it possible to take into consideration both local and global features of the signature. The usage of attributed graphs enables the storage of additional semantic information describing the properties of individual signature strokes. The verification and recognition of a signature consists in analysing the affiliation of its graph description to the language describing the specimen database. Initial assessments display a precision of the method at a average level of under 75%.




el

Cost-Sensitive Spam Detection Using Parameters Optimization and Feature Selection

E-mail spam is no more garbage but risk since it recently includes virus attachments and spyware agents which make the recipients' system ruined, therefore, there is an emerging need for spam detection. Many spam detection techniques based on machine learning techniques have been proposed. As the amount of spam has been increased tremendously using bulk mailing tools, spam detection techniques should counteract with it. To cope with this, parameters optimization and feature selection have been used to reduce processing overheads while guaranteeing high detection rates. However, previous approaches have not taken into account feature variable importance and optimal number of features. Moreover, to the best of our knowledge, there is no approach which uses both parameters optimization and feature selection together for spam detection. In this paper, we propose a spam detection model enabling both parameters optimization and optimal feature selection; we optimize two parameters of detection models using Random Forests (RF) so as to maximize the detection rates. We provide the variable importance of each feature so that it is easy to eliminate the irrelevant features. Furthermore, we decide an optimal number of selected features using two methods; (i) only one parameters optimization during overall feature selection and (ii) parameters optimization in every feature elimination phase. Finally, we evaluate our spam detection model with cost-sensitive measures to avoid misclassification of legitimate messages, since the cost of classifying a legitimate message as a spam far outweighs the cost of classifying a spam as a legitimate message. We perform experiments on Spambase dataset and show the feasibility of our approaches.




el

Service Oriented Multimedia Delivery System in Pervasive Environments

Service composition is an effective approach for large-scale multimedia delivery. In previous works, user requirement is represented as one fixed functional path which is composed of several functional components in a certain order. Actually, there may be several functional paths (deliver different quality level multimedia data, e.g., image pixel, frame rate) that can meet one request. And due to the diversity of devices and connections in pervasive environment, system should choose a suitable media quality delivery path in accordance with context, instead of one fixed functional path. This paper presents a deep study of multimedia delivery problem and proposes an on-line algorithm LDPath and an off-line centralized algorithm LD/RPath respectively. LDPath aims at delivering multimedia data to end user with lowest delay by choosing services to build delivery paths hop-by-hop, which is adapted to the unstable open environment. And LD/RPath is developed for a relatively stable environment, which generates delivery paths according to the trade-off between delay and reliability metrics, because the service reliability is also an important fact in such scenario. Experimental results show that both algorithms have good performance with low overhead to the system.




el

Ontology-based User Interface Development: User Experience Elements Pattern

The user experience of any software or website consists of elements from the conceptual to the concrete level. These elements of user experience assist in the design and development of user interfaces. On the other hand, ontologies provide a framework for computable representation of user interface elements and underlying data. This paper discusses strategies of introducing ontologies at different user interface layers adapted from user experience elements. These layers range from abstract levels (e.g. User needs/Application Objectives) to concrete levels (e.g. Application User Interface) in terms of data representation. The proposed ontological framework enables device independent, semi-automated GUI construction which we will demonstrate at a personal information management example.




el

Législatives : le cadeau de Jospin à Emmanuel Macron...

On semble s'acheminer vers une vague En Marche de forte magnitude aux prochaines Législatives. Si Les Républicains espèrent limiter la casse, c'est à dire avec un perte d'une centaine de députés. L'enjeu de LR, c'est l'après avec en ligne de mire, un...




el

Intelligence Artificielle : vers le grand déclassement des Classes Moyennes ?

Depuis quelques années, la théorie du grand remplacement, popularisée par Michel Houellbecq dans Soumissions ou par un Eric Zemmour, a fait son chemin dans les arcanes les moins visibles du Net. Pourtant, le danger n’est pas là, loin s’en faut, il est...




el

Houellebecq, Génie ou Faussaire ?

L'évènement est là, l'écrivain maudit et adulé - qu'on mérite - sort son dernier ouvrage, son nouveau chef d'oeuvre. Houellebecq a ça de bien, c'est qu'il permettra une nouvelle hystérisation du débat littéraire. Génie pour les uns, faussaire pour les...




el

Les nouvelles formes d'escroquerie sur le Net.

Présent sur le Net depuis deux bonnes décennies, j’ai pu constater l’évolution des arnaques pour le simple quidam webonautes que nous sommes. Au départ, on a connu le fameux pishing via des mails grossièrement rédigés avec des entêtes de tel ou tel fournisseur...




el

De la Société pulsionnelle à la société de l’algorithme

Le court XXème siècle que le monde aura connu, est qualifié par certains historiens comme l’âge des extrêmes. Avec en point d’orgue, des guerres et des gouvernements qui auront décimés plusieurs dizaines de millions d’individus et dans le même temps,...




el

Emmanuel Macron et les Réseaux Sociaux

C’est entendu pour Emmanuel Macron, les violences auraient pour cause les Réseaux Sociaux. Je cite « il y a un changement anthropologique de nos sociétés qui vient des réseaux sociaux ». J’avoue que ce type de raisonnement aussi simplistes me laisse pantois....




el

Trump et Poutine auraient discuté de la guerre en Ukraine, "une pure fiction", selon le Kremlin

Trump et Poutine auraient discuté de la guerre en Ukraine, "une pure fiction", selon le Kremlin




el

No Comment : des couronnes de coquelicots pour le Dimanche du Souvenir 

No Comment : des couronnes de coquelicots pour le Dimanche du Souvenir 




el

Climat : la justice néerlandaise donne raison à Shell face aux ONG

Climat : la justice néerlandaise donne raison à Shell face aux ONG




el

Donald Trump confie à Elon Musk et Vivek Ramaswamy "l'efficacité gouvernementale"

Donald Trump confie à Elon Musk et Vivek Ramaswamy "l'efficacité gouvernementale"




el

Le chef de l'Église anglicane démissionne en raison de sa gestion d'un scandale d'abus sexuels

Le chef de l'Église anglicane démissionne en raison de sa gestion d'un scandale d'abus sexuels




el

A feature-based model selection approach using web traffic for tourism data

The increased volume of accessible internet data creates an opportunity for researchers and practitioners to improve time series forecasting for many indicators. In our study, we assess the value of web traffic data in forecasting the number of short-term visitors travelling to Australia. We propose a feature-based model selection framework which combines random forest with feature ranking process to select the best performing model using limited and informative number of features extracted from web traffic data. The data was obtained for several tourist attraction and tourism information websites that could be visited by potential tourists to find out more about their destinations. The results of random forest models were evaluated over 3- and 12-month forecasting horizon. Features from web traffic data appears in the final model for short term forecasting. Further, the model with additional data performs better on unseen data post the COVID19 pandemic. Our study shows that web traffic data adds value to tourism forecasting and can assist tourist destination site managers and decision makers in forming timely decisions to prepare for changes in tourism demand.




el

An architectural view of VANETs cloud: its models, services, applications and challenges

This research explores vehicular ad hoc networks (VANETs) and their extensive applications, such as enhancing traffic efficiency, infotainment, and passenger safety. Despite significant study, widespread deployment of VANETs has been hindered by security and privacy concerns. Challenges in implementation, including scalability, flexibility, poor connection, and insufficient intelligence, have further complicated VANETs. This study proposes leveraging cloud computing to address these challenges, marking a paradigm shift. Cloud computing, recognised for its cost-efficiency and virtualisation, is integrated with VANETs. The paper details the nomenclature, architecture, models, services, applications, and challenges of VANET-based cloud computing. Three architectures for VANET clouds - vehicular clouds (VCs), vehicles utilising clouds (VuCs), and hybrid vehicular clouds (HVCs) - are discussed in detail. The research provides an overview, delves into related work, and explores VANET cloud computing's architectural frameworks, models, and cloud services. It concludes with insights into future work and a comprehensive conclusion.




el

Attention, votre airfryer pourrait produire une substance cancérigène dans vos aliments selon une étude - Yahoo Actualités

  1. Attention, votre airfryer pourrait produire une substance cancérigène dans vos aliments selon une étude  Yahoo Actualités
  2. 3 bonnes raisons de choisir un Airfryer en 2024  La Provence
  3. Nos 30 recettes rapides et faciles au Airfryer, du plat de résistance au dessert  Le Figaro
  4. Les air fryers sont-ils dangereux pour la santé ? Une étude lance l'alerte  Allo Docteurs
  5. Airfryer : attention aux acrylamides potentiellement cancérigènes  Pourquoi Docteur ?
















el

British writer Samantha Harvey wins Booker Prize for space novel Orbital - Al Jazeera English

  1. British writer Samantha Harvey wins Booker Prize for space novel Orbital  Al Jazeera English
  2. Samantha Harvey’s ‘beautiful and ambitious’ Orbital wins Booker prize  The Guardian
  3. Samantha Harvey wins the Booker prize for “Orbital”  The Economist
  4. British writer Samantha Harvey’s space-station novel ‘Orbital’ wins 2024 Booker Prize  CNN
  5. Booker Prize Is Awarded to Samantha Harvey’s ‘Orbital’  The New York Times




el

Lego Horizon Adventures is a delightful, kid-friendly twist on Horizon Zero Dawn - Polygon

  1. Lego Horizon Adventures is a delightful, kid-friendly twist on Horizon Zero Dawn  Polygon
  2. Lego Horizon Adventures Review  IGN
  3. How LEGO Horizon Adventures was built with real LEGO bricks, out Nov 14  PlayStation
  4. Lego Horizon Adventures: The Kotaku Review  Yahoo Entertainment
  5. Lego Horizon Adventures Sylens voice actor revealed following Lance Reddick’s passing  Video Games Chronicle