cr

De qué se alimenta un escritor

Un escritor se tiene que alimentar. No me refiero a cómo nutrir el cuerpo. Eso es importante porque los escritores también tienen la costumbre de […]

Origen




cr

An OCR Free Method for Word Spotting in Printed Documents: the Evaluation of Different Feature Sets

An OCR free word spotting method is developed and evaluated under a strong experimental protocol. Different feature sets are evaluated under the same experimental conditions. In addition, a tuning process in the document segmentation step is proposed which provides a significant reduction in terms of processing time. For this purpose, a complete OCR-free method for word spotting in printed documents was implemented, and a document database containing document images and their corresponding ground truth text files was created. A strong experimental protocol based on 800 document images allows us to compare the results of the three feature sets used to represent the word image.




cr

The Use of Latent Semantic Indexing to Mitigate OCR Effects of Related Document Images

Due to both the widespread and multipurpose use of document images and the current availability of a high number of document images repositories, robust information retrieval mechanisms and systems have been increasingly demanded. This paper presents an approach to support the automatic generation of relationships among document images by exploiting Latent Semantic Indexing (LSI) and Optical Character Recognition (OCR). We developed the LinkDI (Linking of Document Images) service, which extracts and indexes document images content, computes its latent semantics, and defines relationships among images as hyperlinks. LinkDI was experimented with document images repositories, and its performance was evaluated by comparing the quality of the relationships created among textual documents as well as among their respective document images. Considering those same document images, we ran further experiments in order to compare the performance of LinkDI when it exploits or not the LSI technique. Experimental results showed that LSI can mitigate the effects of usual OCR misrecognition, which reinforces the feasibility of LinkDI relating OCR output with high degradation.




cr

Enterprise Microblogging for Advanced Knowledge Sharing: The References@BT Case Study

Siemens is well known for ambitious efforts in knowledge management, providing a series of innovative tools and applications within the intranet. References@BT is such a web-based application with currently more than 7,300 registered users from more than 70 countries. Its goal is to support the sharing of knowledge, experiences and best-practices globally within the Building Technologies division. Launched in 2005, References@BT features structured knowledge references, discussion forums, and a basic social networking service. In response to use demand, a new microblogging service, tightly integrated into References@BT, was implemented in March 2009. More than 500 authors have created around 2,600 microblog postings since then. Following a brief introduction into the community platform References@BT, we comprehensively describe the motivation, experiences and advantages for an organization in providing internal microblogging services. We provide detailed microblog usage statistics, analyzing the top ten users regarding postings and followers as well as the top ten topics. In doing so, we aim to shed light on microblogging usage and adoption within a globally distributed organization.




cr

Leveraging Web 2.0 in New Product Development: Lessons Learned from a Cross-company Study

The paper explores the application of Web 2.0 technologies to support product development efforts in a global, virtual and cross-functional setting. It analyses the dichotomy between the prevailing hierarchical structure of CAD/PLM/PDM systems and the principles of the Social Web under the light of the emerging product development trends. Further it introduces the concept of Engineering 2.0, intended as a more bottom up and lightweight knowledge sharing approach to support early stage design decisions within virtual and cross-functional product development teams. The lessons learned collected from a cross-company study highlight how to further developblogs, wikis, forums and tags for the benefit of new product development teams, highlighting opportunities, challenges and no-go areas.




cr

Descriptional Complexity of Ambiguity in Symmetric Difference NFAs

We investigate ambiguity for symmetric difference nondeterministic finite automata. We show the existence of unambiguous, finitely ambiguous, polynomially ambiguous and exponentially ambiguous symmetric difference nondeterministic finite automata. We show that, for each of these classes, there is a family of n-state nondeterministic finite automata such that the smallest equivalent deterministic finite automata have O(2n) states.




cr

A Ranking Tool Exploiting Semantic Descriptions for the Comparison of EQF-based Qualifications

Nowadays, one of the main issues discussed at the Community level is represented by the mobility of students and workers across Europe. During the last years, in order to deal with the above picture, several initiatives have been carried out: one of them is the definition of the European Qualification Framework (EQF), a common architecture for the description of qualifications. At the same time, several research activities were established with the aim of finding how semantic technologies could be exploited for qualifications comparison in the field of human resources acquisition. In this paper, the EQF specifications are taken into account and they are applied in a practical scenario to develop a ranking algorithm for the comparison of qualifications expressed in terms of knowledge, skill and competence concepts, potentially aimed at supporting European employers during the recruiting phase.




cr

Législatives : le cadeau de Jospin à Emmanuel Macron...

On semble s'acheminer vers une vague En Marche de forte magnitude aux prochaines Législatives. Si Les Républicains espèrent limiter la casse, c'est à dire avec un perte d'une centaine de députés. L'enjeu de LR, c'est l'après avec en ligne de mire, un...




cr

Sur la démission des maires et de la démocratie en général.

Une étude récente dévoile que que près de la moitié des maires ne souhaitent pas se représenter lors des prochaines municipales de 2020. Incontestablement, le mandat de maire est probablement le plus difficile, il revêt tant d’aspects et ce quelque soit...




cr

Démocratie en vrac, vive la démocratie liquide…

J’ai commencé à bloguer en 2006, je ne compte plus le nombre de billets que j’ai pu faire sur la montée inexorable de l’abstention élection après élection. On a pu croire que la montée en puissance des réseaux sociaux aller faire émerger une démocratie...




cr

Les nouvelles formes d'escroquerie sur le Net.

Présent sur le Net depuis deux bonnes décennies, j’ai pu constater l’évolution des arnaques pour le simple quidam webonautes que nous sommes. Au départ, on a connu le fameux pishing via des mails grossièrement rédigés avec des entêtes de tel ou tel fournisseur...




cr

Emmanuel Macron et les Réseaux Sociaux

C’est entendu pour Emmanuel Macron, les violences auraient pour cause les Réseaux Sociaux. Je cite « il y a un changement anthropologique de nos sociétés qui vient des réseaux sociaux ». J’avoue que ce type de raisonnement aussi simplistes me laisse pantois....




cr

Ilham Aliyev critique l'occident à l'ouverture de la COP29

Ilham Aliyev critique l'occident à l'ouverture de la COP29




cr

No Comment : les universités en crise en Argentine 

No Comment : les universités en crise en Argentine 




cr

DeFog: dynamic micro-service placement in hybrid cloud-fog-edge infrastructures

DeFog is an innovative microservice placement and load balancing approach for distributed multi-cluster cloud-fog-edge architectures to minimise application response times. The architecture is modelled as a three-layered hierarchy. Each layer consists of one or more clusters of machines, with resource constraints increasing towards lower layers. Applications are modelled as service oriented architectures (SOA) comprising multiple interconnected microservices. As many applications can be run simultaneously, and as the resources of the edge and the fog are limited, choosing among services to run on the edge or the fog is the problem this work is dealing with. DeFog focuses on dynamic (i.e., adaptive) decentralised service placement within each cluster with zero downtime, eliminating the need for coordination between clusters. To assess the effectiveness of DeFog, two realistic applications based on microservices are deployed, and several placement policies are tested to select the one that reduces application latency. Least frequently used (LFU) is the reference service placement strategy. The experimental results reveal that a replacement policy that uses individual microservice latency as the crucial factor affecting service placement outperformed LFU by at least 10% in application response time.













cr

SCRIPTed is turning 15!

“Fifteen Years of Evolution of Law, Technology and Society” To celebrate SCRIPTed’s 15th birthday, we are hosting a conference on Monday 28 January (3pm-7pm) at Evolution House here in Edinburgh. For more details, the programme, and (free) registration, see our




cr

En pleine crise du covid-19, l'Assemblᅵe change les rᅵgles des CDD et prᅵcarise un peu plus les salariᅵs

L'information est ᅵ lire sur le site de Mediapart : le 15 mai, alors que l'Assemblᅵe est en train de voter la poursuite de l'ᅵtat d'urgence sanitaire, les dᅵputᅵs de la Rᅵpublique en...




cr

Titres de sᅵjour : pour ᅵviter les files d'attente, les prᅵfectures ont inventᅵ l'inscription en ligne (qui ne fonctionne quasiment jamais)

Des files d'attente, la nuit, devant les prᅵfectures, pour tenter d'obtenir un rendez-vous afin de demander ou de renouveler un titre de sᅵjour. C'ᅵtait la rᅵalitᅵ au dᅵbut des annᅵes...




cr

Crᅵation de 3000 postes de "gendarmes verts" : la fausse promesse de Darmanin

A chaque jour, une nouvelle annonce. Cet ᅵtᅵ, le ministre de l'Intᅵrieur, Gᅵrald Darmanin, a multipliᅵ les dᅵplacements sur le terrain et les annonces. Pour lutter contre les pyromanes ᅵ...




cr

A method for selecting multiple logistics sites in cross-border e-commerce based on return uncertainty

To reduce the location cost of cross-border e-commerce logistics sites, this article proposes a multi-logistics site location method based on return uncertainty. Firstly, a site selection model is established with the objective function of minimising site construction costs, transportation costs, return costs, and operating costs, and the constraint conditions of return recovery costs and delayed pick-up time; Then, using the Monte Carlo method to simulate the number of returned items, and using an improved chicken swarm algorithm based on simulated annealing, the cross-border e-commerce multi-logistics site location model is solved to complete the location selection. Experimental results show that this method can effectively reduce the related costs of cross-border e-commerce multi-logistics site selection. After applying this method, the total cost of multi-logistics site selection is 19.4 million yuan, while the total cost of the five comparative methods exceeds 20 million yuan.




cr

Risk-based operation of plug-in electric vehicles in a microgrid using downside risk constraints method

To achieve the benefits as much as possible, it is required to identify the available PEV capacity and prepare scheduling plans based on that. The analysis revealed that the risk-based scheduling of the microgrid could reduce the financial risk completely from $9.89 to $0.00 and increases the expected operation cost by 24% from $91.38 to $112.94, in turn. This implies that the risk-averse decision-maker tends to spend more money to reduce the expected risk-in-cost by using the proposed downside risk management technique. At the end, by the help of fuzzy satisfying method, the suitable risk-averse strategy is determined for the studied case.




cr

An intelligent approach to classify and detection of image forgery attack (scaling and cropping) using transfer learning

Image forgery detection techniques refer to the process of detecting manipulated or altered images, which can be used for various purposes, including malicious intent or misinformation. Image forgery detection is a crucial task in digital image forensics, where researchers have developed various techniques to detect image forgery. These techniques can be broadly categorised into active, passive, machine learning-based and hybrid. Active approaches involve embedding digital watermarks or signatures into the image during the creation process, which can later be used to detect any tampering. On the other hand, passive approaches rely on analysing the statistical properties of the image to detect any inconsistencies or irregularities that may indicate forgery. In this paper for the detection of scaling and cropping attack a deep learning method has been proposed using ResNet. The proposed method (Res-Net-Adam-Adam) is able to achieve highest amount of accuracy of 99.14% (0.9914) while detecting fake and real images.




cr

An image encryption using hybrid grey wolf optimisation and chaotic map

Image encryption is a critical and attractive issue in digital image processing that has gained approval and interest of many researchers in the world. A proposed hybrid encryption method was implemented by using the combination of the Nahrain chaotic map with a well-known optimised algorithm namely the grey wolf optimisation (GWO). It was noted from analysing the results of the experiments conducted on the new hybrid algorithm, that it gave strong resistance against expected statistical invasion as well as brute force. Several statistical analyses were carried out and showed that the average entropy of the encrypted images is near to its ideal information entropy.




cr

A robust feature points-based screen-shooting resilient watermarking scheme

Screen-shooting will lead to information leakage. Anti-screen-shooting watermark, which can track the leaking sources and protect the copyrights of images, plays an important role in image information security. Due to the randomness of shooting distance and angle, more robust watermark algorithms are needed to resist the mixed attack generated by screen-shooting. A robust digital watermarking algorithm that is resistant to screen-shooting is proposed in this paper. We use improved Harris-Laplace algorithm to detect the image feature points and embed the watermark into the feature domain. In this paper, all test images are selected on the dataset USC-SIPI and six related common algorithms are used for performance comparison. The experimental results show that within a certain range of shooting distance and angle, this algorithm presented can not only extract the watermark effectively but also ensure the most basic invisibility of watermark. Therefore, the algorithm has good robustness for anti-screen-shooting.




cr

Enhancing clean technology's dynamic cross technique using value chain

Numerous Indian economic sectors have been impacted by the COVID-19 epidemic, with many being forced to the verge of extinction. As a result, this essay analyses the importance of supply chains for grapes and the manufactured goods made from them, including beverages and currants, in a specific state that happens to be India's top grape-producing region. In order to identify the sites of rupture brought on by the pandemic and to recommend policy changes to create a resilient system, a value chain analysis is performed. Value chain management has emerged as one of the key strategies businesses use today to boost productivity and costs when they are up against greater rivalry in the marketplace, however, with several new challenges, such as concerns over security, environmental protection, compensation, and business accountability. According to the value chain study, the level of value addition for intermediary agents, such as pre-harvest contractors, has increased after COVID-19 at the expense of farmers. Various policy approaches are explained to enhance the grape value chain using the knowledge gained from Porter's value chain results and supply and demand shocks.




cr

Trust in news accuracy on X and its impact on news seeking, democratic perceptions and political participation

Based on a survey of 2548 American adults conducted by Pew Research Center in 2021, this study finds that trust in the accuracy of news circulated on X (former Twitter) is positively correlated with following news sites on X, underscoring the crucial role of trust in news accuracy in shaping news-seeking behaviour. Trust in news accuracy also positively relates to political participation via X. Those who trust in news accuracy are more likely to perceive X as an effective tool for raising public awareness about political and social issues, as well as a positive force for democracy. However, exposure to misinformation weakens the connection between trust in news accuracy and users' perception about X as an effective tool for raising public awareness about political or social issues and as a positive driver for democracy.




cr

Uncovering the keys to well-being: calling, mindfulness, and compassion among healthcare professionals in India amidst the post-COVID crisis

This study investigates the well-being of healthcare professionals in India, with a specific focus on the detrimental effects of the pandemic on their mental and physical health, including stress, burnout, and fatigue. This research examines the roles played by calling, mindfulness, and compassionate love as essential resources in promoting the well-being of healthcare professionals. Utilising structural equation modelling (SEM), the results reveal a significant cause and effect relationship between calling, mindfulness, and compassionate love and their influence on overall well-being. Furthermore, the study identifies a noteworthy parallel mediation effect, demonstrating that mindfulness and compassionate love serve as mediators in the relationship between calling and well-being. This research offers practitioners invaluable insights into the effective utilisation of mindfulness and compassionate love practices to enhance the overall well-being of healthcare professionals.




cr

E-recruitment adoption among job-seekers: role of vividness and perceived internet stress in shaping their intentions

Drawn from technology acceptance model, this study establishes a theoretical framework for the analytical interpretation of factors affecting job-seekers intention to use e-recruitment websites. Using the data obtained from 379 respondents in India, ten hypotheses derived from the experimental model are evaluated using a structural equation modelling technique. Vividness, perceived usefulness (PU), and attitude have been shown to have a significant positive impact on the behavioural intentions (BIs) of job-seekers, although perceived ease of use (PEOU) did not. Furthermore, perceived internet stress (PIS) is observed to be a significant antecedent PEOU; and PEOU is of PU. Such findings broaden our knowledge of e-recruiting in various ways and offer qualitative insights into the potential impact of website functionality on the attractiveness of job-seekers.




cr

Knowing thy neighbour: creating and capturing value from a firm's alliance experiences

Intellectual assets, especially its relational forms, have become increasingly important to explain a firm's innovation. To examine relational forms of intellectual assets (IA), this study theoretically and empirically advances a concept of alliance management capability (AMC) to explain the value creation and capture aspects of a firm's innovation process. The concepts of value-creating alliance experiences (VCAE) and value capturing alliance experiences (VCPAE) were introduced in which a firm's ability to learn from these alliance experiences increases the firm's ability to discover and govern partnerships that bring the firm's innovations to market. Hypotheses were developed and empirically examined in the biotechnology industry. A contribution of this study is that a firm's VCAE and VCPAE introduce a greater 'openness' to a firm's innovation process. This openness enables a firm to better adapt and respond to the opportunities of the market and thus impact a firm's competitive advantage to innovate.




cr

The relationship between 'creative slack' as an intangible asset and the innovative capabilities of the firm

The notion of creative slack purposefully refers to the notion of organisational slack proposed by Penrose (1959), who suggested that managers in organisations always have some stock of unused resources that inevitably accumulate when developing projects and are the primary factors determining the growth and innovation of the firm. In this contribution, we aim at adding a new dimension to the notion of organisational slack. Our view is that in many innovative organisations the slack of unused ideas is essentially a creative one, which is accumulated in diverse communities through multiple projects. This creative slack is a key intangible asset and a source of knowledge creation and innovation. To explain how organisations may benefit from exploiting the creative slack accumulated by communities, we rely on the analysis of two case studies, that of the Hydro-Québec Research Institute (IREQ), and of Ubisoft Montreal.




cr

Why students need to learn biomimicry rather than select a correct answer? A neurological explanation

For a long time, high school students have been forced to practice selecting correct answers on college scholastic ability tests. Recently, it has been suggested that schools introduce biomimicry activities for STEM education to develop students' 21st century competency. However, there have been arguments about which system is more appropriate in terms of enhancing a student's competency development. Therefore, we evaluated neurological evidence of students' competency using fMRI scans taken during the selecting a correct answer for a biology question and during a biomimicry activity. Results showed that the repetitive practice of selecting correct responses limited a student's neurological activities to the brain network of the visual cortex and the front-parietal working memory cortex. However, the biomimicry activity simultaneously involved diverse prefrontal, parietal and temporal cortexes, and the putamen, limbic and cerebellum lobes. Therefore, this study proposes that the biomimicry activities could stimulate their coordinated brain development.




cr

A Realistic Data Warehouse Project: An Integration of Microsoft Access® and Microsoft Excel® Advanced Features and Skills




cr

Making Information Systems less Scrugged: Reflecting on the Processes of Change in Teaching and Learning




cr

Improving Outcome Assessment in Information Technology Program Accreditation




cr

Establishing an Institutional Framework for an E-learning Implementation – Experiences from the University of Rijeka, Croatia




cr

Enhancing Classroom Learning Experience by Providing Structures to Microblogging-based Activities




cr

Student Perceptions of Microblogging: Integrating Twitter with Blogging to Support Learning and Interaction




cr

A Critical Analysis of Active Learning and an Alternative Pedagogical Framework for Introductory Information Systems Courses




cr

A Cross-Case Analysis of the Use of Web-Based ePortfolios in Higher Education




cr

Enhancing Students’ Interest in Science and Technology through Cross-disciplinary Collaboration and Active Learning Techniques




cr

Developing Cross-Cultural Awareness in IT: Reflections of Australian and Chinese Students