Abstract:
A method is provided for the extraction of a data table from a database. The data table includes instances in rows and columns, respectively, and includes indicators characterizing the instances in columns and rows, respectively. The method includes the following steps: a) obtaining an initial specification of the study; b) from the initial specification, building a data table extraction dictionary, which enables specifying instants concerned by the study in the database and enables specifying an extraction formula, a recoding and a role for each of the indicators concerned by the study; and c) carrying out an initial extraction of a data table, in applying the extraction dictionary to the database.
Abstract:
A client accesses services provided by a service provider by transmitting and/or receiving information in a point-to-point session with a session concentrator via a telecommunication network. An access control protocol controls access to the services provided by the service provider. A client that does not conform is authorized to access a network for non-conforming clients. A point-to-point session is established between the non-conforming client and the session concentrator. The session concentrator transfers the information transmitted by the non-conforming client to a network for clients that conform to the access control protocol.
Abstract:
A packet transmission network, a plurality of routers have sessions among them based on a routing protocol to exchange routing and/or connectivity data indicating paths for transmitting packets over the network. Each router maintains a first routing table including data sent to another of said routers, and a second routing table including data received from another of said routers. To close at least part of the sessions of a given router, the method consists: in listing the data corresponding to the part of the sessions and contained in at least one of the first and second routing tables; sending an updating message based on the protocol indicating to neighbouring routers that the paths indicated in the data are considered out-of-service; then closing the part of the sessions. The router continues transmitting packets emitted on the paths considered out-of-service until the closing step.
Abstract:
In a data packet transmission network, a stream of packets of data sent by a first terminal passes in transit through at least one network equipment with which there is associated a stream measurement unit, wherein said first terminal and said measurement unit are connected to a collection unit. The measurement method comprises the following steps the first terminal generates a packet stream according to a predetermined rule destined for the second terminal the measurement unit analyzes at least one packet of said stream passing through the network equipment the first terminal dispatches to the collection unit a description of a stream of sent packets, comprising a list including at least sizes of the sent packets the stream measurement unit dispatches to the collection unit a stream description, comprising at least a sum of the sizes of the analyzed packets; and the collection unit identifies each analyzed packet of the stream as a function of the stream description and of said predetermined rule so as to correlate, packet by packet, said stream description and said description of stream of sent packets.
Abstract:
A method of calculating and encoding a score of semantic and spatial similarity between concepts of an ontology stored in hierarchically numbered trellis form, in which the score (NSSij) is calculated and encoded (1) for each concept (Ci) with respect to a central concept (Cj), taken two-by-two, by convergence relative to their common semantic characteristics respectively by separation according to their distance. The method is applicable to the consultation of ontologies representative of knowledge in the technical or non-technical domain.
Abstract translation:一种计算和编码存储在分层编号网格形式的本体的概念之间的语义和空间相似度的分数的方法,其中为每个概念计算和编码分数(1) 相对于中心概念(C> j,,,,,,,,,,,,,,,,their their their their their their their their their 距离。 该方法适用于在技术或非技术领域代表知识的本体的咨询。
Abstract:
A method of suppressing false alarms produced in a monitored information system (1). The alarms are classified automatically by means of a false alarm suppression module (17) into two categories consisting of false alarms and true alarms depending on particular criteria based on progressive training of said module (17) based on the expertise of a human operator (23) responsible for initial manual classification of alarms.
Abstract:
The invention relates to a voice signal recognition method comprising a step of producing an iterative learning procedure of acoustic models representing a standard set of models of voice units pronounced in a given target language and a step of using the acoustic models to recognize the voice signal by comparing said signal with the acoustic models previously obtained. The method consists in further producing an additional set of voice units in the target language adapted to the characteristics of a foreign language during the production of the acoustic models.
Abstract:
Non-adjacent rows (i) in the visibility matrix (Msr) that have a large number of common elements are automatically detected (E7) and any such detected rows are permutated to put the lines detected as having a large number of common elements into sequence to form a modified visibility matrix (M′sr), and digital image coding is applied (E8) to the Boolean elements of the modified visibility matrix (M′sr).
Abstract:
A system and a method for submitting a message (MSG) to a telecommunications terminal (2) of an addressee, which message has been deposited by a caller in an inbox (12) of a messaging server (1) of the addressee. The method comprises the following successive steps: a step of sending a request to search for an illustration (8) from the voice messaging server (1) to a directory device (3), a step of sending said illustration (8) from the directory device (3) to the messaging server (1), a step of sending the deposited message (MSG) and said illustration (8) from the messaging server (1) to a multimedia messaging server centre (MMSC), and a step of sending a multimedia message (MMS) containing at least said deposited message (MSG) and said illustration (8) from the multimedia messaging server centre (MMSC) to the terminal (2).
Abstract:
When two terminals (T1, T2) communicate with each other via a first service via a network, switching from the first telephone service to a second telephone service enables the two terminals (T1, T2) to continue to communicate with each other via the second telephone service. In order to carry out said switching, a telephone service transformer (6) interrupts the communication between the two terminals (T1, T2) using the first telephone service; calls the two terminals (T1, T2) in parallel via the second telephone service; and then interconnects the two terminals (T1, T2) by joining the respective communications established between the transformer (6) and the two terminals (T1, T2) in order to establish a communication between the two terminals (T1, T2) via the second telephone service.