-
201
Programming extention technology of open vSwitch
Published 2017-05-01“…As an open source SDN software switch,open vSwitch (OVS) has been widespread concerned.But in complex and changeable network environment,data layer loses control of controller and flow table entry learning aging appears easily and the performance of SDN is seriously hampered.To solve the problems,the programming extension technology architecture of OVS was designed,including link state processing,fault perception,two three-tier self-learning forwarding and other expansion of core functions,so that OVS could recover automatic and rapidly,flow table entries could update in time,throughput of SDN was guaranteed,thereby the influence of control-ler loss control for communication was reduced,SDN stability and reliability was enhanced.…”
Get full text
Article -
202
Gaitmap—An Open Ecosystem for IMU-Based Human Gait Analysis and Algorithm Benchmarking
Published 2024-01-01“…However, the lack of public data and easy-to-use open-source algorithms hinders method comparison and clinical application development. …”
Get full text
Article -
203
The Data Artifacts Glossary: a community-based repository for bias on health datasets
Published 2025-02-01“…Objective This paper introduces the “Data Artifacts Glossary”, a dynamic, open-source framework designed to systematically document and update potential biases in healthcare datasets. …”
Get full text
Article -
204
A Serious Game to Study Reduced Field of View in Keyhole Surgery: Development and Experimental Study
Published 2025-02-01“…MethodsWe implemented an open-source serious game in JavaScript, inspired by the surgical task of selectively cauterizing blood vessels during twin-to-twin transfusion surgery. …”
Get full text
Article -
205
BerryPortraits: Phenotyping Of Ripening Traits in cranberry (Vaccinium macrocarpon Ait.) with YOLOv8
Published 2024-11-01“…Abstract BerryPortraits (Phenotyping of Ripening Traits) is open source Python-based image-analysis software that rapidly detects and segments berries and extracts morphometric data on fruit quality traits such as berry color, size, shape, and uniformity. …”
Get full text
Article -
206
On the implementation of a global optimization method for mixed-variable problems
Published 2021-02-01“…We describe the optimization algorithm implemented in the open-source derivative-free solver RBFOpt. The algorithm is based on the radial basis function method of Gutmann and the metric stochastic response surface method of Regis and Shoemaker. …”
Get full text
Article -
207
Cloud Based Metalearning System for Predictive Modeling of Biomedical Data
Published 2014-01-01“…This problem is addressed by proposing a cloud based system that integrates metalearning framework for ranking and selection of best predictive algorithms for data at hand and open source big data technologies for analysis of biomedical data.…”
Get full text
Article -
208
EMULATION OF SOFTWARE-DEFINED NETWORK USING MININET
Published 2021-02-01“…By using Mininet, an open source network emulator, this study simulates SDN implementations in different environments. …”
Get full text
Article -
209
SURVEY OF MACHINE LEARNING APPLICATIONS IN MEDICAL IMAGING. ALGORITHMS AND TECHNOLOGIES
Published 2023-05-01“…ML algorithms and technologies developed exponentially over the last decades triggered by advances in processing capacity, open-source ML platforms, frameworks and libraries (Anaconda, Scikit, TensorFlow, OpenNN, Torch and so on). …”
Get full text
Article -
210
The SEMAINE API: Towards a Standards-Based Framework for Building Emotion-Oriented Systems
Published 2010-01-01“…This paper presents the SEMAINE API, an open source framework for building emotion-oriented systems. …”
Get full text
Article -
211
Security protocol code analysis method combining model learning and symbolic execution
Published 2021-10-01“…Symbolic execution can comprehensively analyze program execution space in theory, but it is not feasible in practice for large programs like security protocols, due to the explosion of path space and the limitation of difficulty in solving path constraints.According to the characteristics of security protocol program, a method to guide the symbolic execution of security protocol code by using protocol state machine information obtained from model learning was proposed.At the same time, by separating cryptographic logic from protocol interaction logic, the problem that path constraints cannot be solved caused by the complexity of cryptographic logic is avoided.The feasibility of the method is demonstrated by the practice on the SSH open source project Dropbear.Compared with Dropbear's test suite, the proposed method has advantages in code coverage and error point discovery.…”
Get full text
Article -
212
Resource management model based on cloud computing environment
Published 2016-11-01“…To investigate these problems in a cloud computing environment, we designed and deployed the cloud service infrastructure based on open-source software, namely, CloudStack. The proposed model regularly stores the usage data for computing resources based on Hadoop and HBase. …”
Get full text
Article -
213
Design and implementation of OpenStack cloud platform for different storage modes
Published 2016-04-01“…With the development of cloud computing,it is more convenient to implement cloud platform by using open source software,cloud platforms usually use local hard disk or shared storage to store virtual machine file. …”
Get full text
Article -
214
Eulalie, un système documentaire pour préserver la musique électroacoustique basé sur l’ontologie Dorémus
Published 2023-07-01“…Eulalie is an operational, open-source, and free information system dedicated to electroacoustic music for the documentation and preservation of works. …”
Get full text
Article -
215
Campus question-answering system based on intent recognition and retrieval-augmented generation
Published 2024-11-01“…Experimental results indicate that the open-source large language model, after instruction tuning, achieves intent recognition accuracy that is comparable to or even surpasses that of closed-source models.…”
Get full text
Article -
216
Game-based detection method of broken access control vulnerabilities in Web application
Published 2024-06-01“…Experimental results demonstrate that the proposed method successfully detect 31 vulnerabilities, including 8 unreported ones, out of 11 open-source applications, with a detection range exceeding 90%.…”
Get full text
Article -
217
Resources for assigning MeSH IDs to Japanese medical terms
Published 2019-06-01“…Here, we investigate an open-source Japanese-English glossary as an alternative method for assigning MeSH IDs to Japanese terms, to obtain preliminary data for NLP proof-of-concept.…”
Get full text
Article -
218
Au-delà des conflits de mémoire : transitions numériques vers une écriture participative du patrimoine culturel de l’Indiaocéanie
Published 2023-07-01“…However, the open science movement, notably through open source software, open data and citizen science, opens up perspectives for the participatory writing of cultural heritage. …”
Get full text
Article -
219
Constructing a Private Cloud Computing Platform Based on OpenStack
Published 2012-09-01“…This paper introduces the architecture of an open source cloud computing platform OpenStack and the relationship between five functional modules in OpenStack. …”
Get full text
Article -
220
Openstack authentication protocol based on digital certificate
Published 2019-02-01“…As the industry standard for open source cloud platforms,openstack uses the single-factor authentication method based on username and password that provides by keystone components to identity authentication mechanism,while it is not suitable for application scenarios with high security level requirements.A digital certificate-based identity authentication protocol which had cloud user identification protocol and authentication protocol was designed to meet the requirements.With expending the keystone component to achieve a digital certificate-based identity authentication system,a combination of authentication server,UKey technology,encryption technology and well-established key management and so on was used.According to the research,the system can effectively resist multiple cyber-attacks and improve the security of cloud users when they log in to the cloud platform.…”
Get full text
Article