-
221
Des TIC au TOC. Contribuer à OpenStreetMap : entre commun numérique et utopie cartographique
Published 2017-04-01“…In particular, these new producers are implementing the alternatives to conventional modes of production of spatial data, from the Open movement (open source, open data, open access, open culture, open hardware, etc.) : the OpenStreetMap (OSM) project has emerged in 2004 in this context, with its community of contributors. …”
Get full text
Article -
222
An automated information extraction model for unstructured discharge letters using large language models and GPT-4
Published 2025-06-01“…On the other hand, open-source LLMs did not provide similar levels of accuracy and could not consistently fill the template. …”
Get full text
Article -
223
Deteksi Objek menggunakan Dashboard Camera untuk Sistem Peringatan Pencegah Kecelakaan pada Mobil
Published 2020-02-01“…This application was developed using Object Detection Method in Tensorflow Open Source Machine Learning Library. The research stage was started from problem analysis, literature study to search comparison from previous research, also software development and finalized with testing to measure system performance. …”
Get full text
Article -
224
Desain Penilaian Risiko Privasi pada Aplikasi Seluler Melalui Model Machine Learning Berbasis Ensemble Learning dan Multiple Application Attributes
Published 2023-08-01“…Abstract Since the Android operating system is open-source, many Android-based applications are developed and freely available in app stores. …”
Get full text
Article -
225
Recent advances in domain decomposition methods for large-scale saddle point problems
Published 2022-10-01“…We report here on recent advances in adaptive coarse spaces and on their open source implementations in domain specific languages such as FreeFem, focusing on a new domain decomposition for saddle point formulations with some numerical tests.…”
Get full text
Article -
226
Research of Carrier's Cloud Management System Based on Open Architecture
Published 2013-10-01“…In recent years,several carriers provided their own IaaS cloud computing services and products.As the unified operational tools for the underlying physical resources,CMS(cloud-computing management system)gradually becomes the bottleneck due to its closed architecture when the carriers desire flexible resource-scheduling and service-provision.In order to better adapt to the future cloud business,the carriers need to build the end-to-end open IaaS CMS combined their own cloud computing business requirements.While promoting and designing the open-minded CMS architecture,the carriers could use some open source CMS like OpenStack for reference,and finally achieve the real open-minded CMS with the extensible ability,compatibility,differentiated service capacity and scale deployment capabilities.Based on the better intelligent pipeline method,the carriers will be committed to detailing the cloud computing service,optimizing the architecture and more scaling the deployment.…”
Get full text
Article -
227
ProcessM: Intelligent Process Mining software
Published 2025-05-01“…Without proper monitoring, these deviations can go unnoticed. ProcessM is an open-source software designed for users with limited technical expertise specializing in business process analysis. …”
Get full text
Article -
228
Keeping It Open: A TEI-based Publication Pipeline for Historical Documents
Published 2024-11-01“…Following the emergence of numerous projects to make use of historical archives, books, or other materials, as well as the exponentially growing needs for digital tools tailored for those tasks, the DAHN project (Dispositif de soutien à l’Archivistique et aux Humanités Numériques) developed a complete open-source pipeline made of tools and methods making it possible to present a digital scholarly edition of scanned handwritten material. …”
Get full text
Article -
229
Shamballa, Heaven can wait. How 3D printing will sustain the future
Published 2020-12-01“…This article is devoted to the activities of the WASP group of which Massimo Moretti is the founder, and emphasizes how it is possible to reconcile technological progress with the creation of a heaven on earth: a society of equals, eco-compatible, scientifically evolved and completely open-source. This is not utopia. It is actually taking place thanks to projects that respond in concrete fashion to the basic needs of Man: food, home, health, energy, work and culture. …”
Get full text
Article -
230
Deepfake swapped face detection based on double attention
Published 2021-04-01“…In view of the existing Deepfake detection algorithms, such problems as low accuracy and poor interpretability are common.A neural network model combining the double attention was proposed, which used channel attention to capture the abnormal features of false faces and combined the location of spatial attention to focus the abnormal features.To fully learn the contextual semantic information of the abnormal part of the false face, so as to improve the effectiveness and accuracy of face changing detection.In addition, the decision-making area of real and fake faces was shown effectively in the form of thermal diagram, which provided a certain degree of explanation for the face exchange detection model.Experiments on FaceForensics ++ open source data set show that the detection accuracy of proposed method is superior to MesoInception, Capsule-Forensics and XceptionNet.…”
Get full text
Article -
231
How to Measure Leaf Disease Damage Using Image Analysis in ImageJ
Published 2020-09-01“… This new 13-page article introduces simple image processing and analysis techniques to quantify leaf disease damage using ImageJ, an open-source image processing program. These techniques are not meant to replace crop scouting or disease diagnosis by a plant diagnostic laboratory, but rather to provide a supplemental tool for making quantitative measurements of leaf disease damage. …”
Get full text
Article -
232
Management technologies of cyberspace endogenous safety and security test site
Published 2021-03-01“…The cyber range has been widely recognized as an effective way to study the technologies of network attack/defense and the vulnerability of network architecture.The endogenous safety and security test site that receives high attention recently is a type of cyber range for cyber space endogenous safety and security technologies.Based on the new situation of cyberspace with 5G development, a test site management technology for virtual-real network settings was proposed, and a test site management architecture based on the endogenously secured software defined network controller was designed.A design of the endogenously secured network control system was also proposed, which used a middle layer forwarding agent to achieve data isolation and supported multiple heterogeneous open-source controllers.Finally, a test site scenario reconfiguration and resource orchestration method was proposed based on a test site networking scheme.…”
Get full text
Article -
233
Chimen an nou, une carte contributive pour se rapprocher du territoire
Published 2024-07-01“…We first look at how digital technology accompanied the project throughout the process and enabled it to evolve, we then look at how the use of open source technologies helped residents appropriate the project, and finally we study the link between sharing fragments of landscape experience on a digital map and disseminating practices in the field.…”
Get full text
Article -
234
Medialne reprezentacje kultury literackiej, czyli wiedza o książce dla dzieci – (nie) tylko w Sieci
Published 2017-05-01“…To a lesser degree, open source licenses are digitally released as original scientific studies, such as books, journals and research reports. …”
Get full text
Article -
235
Une innovation institutionnelle, la constitution des communs du logiciel libre
Published 2014-02-01“…It discusses the constitutional basis of the common, the free software (or open source software) licenses and their rules, founding of a particular economy. …”
Get full text
Article -
236
How to Measure Leaf Disease Damage Using Image Analysis in ImageJ
Published 2020-09-01“… This new 13-page article introduces simple image processing and analysis techniques to quantify leaf disease damage using ImageJ, an open-source image processing program. These techniques are not meant to replace crop scouting or disease diagnosis by a plant diagnostic laboratory, but rather to provide a supplemental tool for making quantitative measurements of leaf disease damage. …”
Get full text
Article -
237
Evaluasi Manajemen Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) pada Jaringan (Studi Kasus: UIN Sunan Kalijaga Yogyakarta)
Published 2021-11-01“…Hal ini yang mendasari perlunya implementasi Open Source SIEM (OSSIM) ke dalam indeks KAMI. Penelitian ini dilakukan untuk mengoptimalkan proses keamanan informasi agar dapat bekerja sesuai dengan standar indeks KAMI. …”
Get full text
Article -
238
Spatial Analysis on Networks: Towards identifying similarity of routes
Published 2021-12-01“…The paper presents an algorithm for finding optimal paths in spatial networks, through the utilization of open source GIS and mathematical analysis of Networks using Graph Theory as well as using geographical proximity attributes of network nodes. …”
Get full text
Article -
239
Data Analysis Method of Intelligent Analysis Platform for Big Data of Film and Television
Published 2021-01-01“…The method selects Hadoop open source cloud platform as the basis, combines the MapReduce distributed programming model and HDFS distributed file storage system and other key cloud computing technologies. …”
Get full text
Article -
240
Formation and Evolution of Cellular Structures in Wedge-Induced Oblique Detonations
Published 2023-01-01“…The compressible reactive Euler equations are solved using the seventh-order WENO scheme on an adaptive mesh based on the open source program Adaptive Mesh Refinement in Object-oriented C++ (AMROC). …”
Get full text
Article