{"id":18982,"date":"2024-04-10T14:28:56","date_gmt":"2024-04-10T12:28:56","guid":{"rendered":"https:\/\/kairntech.com\/blog\/non-categorise\/kairntech-rag-pour-la-criminalistique\/"},"modified":"2026-04-17T00:08:14","modified_gmt":"2026-04-16T22:08:14","slug":"kairntech-rag-pour-la-criminalistique","status":"publish","type":"post","link":"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/","title":{"rendered":"Kairntech RAG pour la criminalistique"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Analyse des donn\u00e9es des courriels d&rsquo;Enron  <\/h2>\n\n<p>Kairntech RAG (Retrieval Augmented Generation) pour la criminalistique est l&rsquo;un des cas d&rsquo;utilisation les plus r\u00e9cents des grands mod\u00e8les de langage. Il permet d&rsquo;analyser des informations internes tout en b\u00e9n\u00e9ficiant de la puissance des LLM. Et tout cela sans avoir \u00e0 partager les donn\u00e9es avec des tiers ou \u00e0 mener des campagnes co\u00fbteuses de recyclage ou de mise au point.  <\/p>\n\n<p>Kairntech a mis en \u0153uvre RAG dans le cadre de sa solution. Ici, nous d\u00e9crivons bri\u00e8vement un cas d&rsquo;utilisation autour de l&rsquo;analyse d&rsquo;un grand nombre de documents \u00e9lectroniques. Nous utilisons le <a href=\"https:\/\/www.cs.cmu.edu\/~enron\/\">corpus Enron Mail<\/a>: une vaste collection de courriels qui ont \u00e9t\u00e9 rendus publics apr\u00e8s l&rsquo;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Enron_scandal\">affaire de fraude<\/a> Enron de 2001.  <\/p>\n\n<h2 class=\"wp-block-heading\">Kairntech RAG pour la criminalistique &#8211; t\u00e9l\u00e9chargement de documents<\/h2>\n\n<p>Les documents peuvent \u00eatre t\u00e9l\u00e9charg\u00e9s dans Kairntech \u00e0 partir d&rsquo;une vari\u00e9t\u00e9 de formats tels que PDF, HTML, DOC et bien d&rsquo;autres. Dans ce cas, nous voulons nous assurer que nous conservons les riches m\u00e9tadonn\u00e9es qui accompagnent les documents envoy\u00e9s par courrier \u00e9lectronique. Qui a envoy\u00e9 quoi \u00e0 qui, quand et avec quel sujet, etc. Pour cela, nous traduisons les documents \u00e9lectroniques au format json de Kairntech :   <\/p>\n\n<pre class=\"wp-block-code\"><code>{\n&nbsp;&nbsp;&nbsp; \"metadata\": {\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \"Source\": \"maildir\/allen-p\/all_documents\/100.\",\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \"Date\": \"Mon, 9 Oct 2000 07:16:00 -0700 (PDT)\",\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \"From\": \"phillip.allen@enron.com\",\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \"To\": &#91;\"keith.holst@enron.com\"],\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \"Subject\": \"Consolidated positions: Issues\"\n&nbsp;&nbsp;&nbsp; },\n&nbsp;&nbsp;&nbsp; \"text\": \" \u2026 Below is the issues &amp; to do list as we go forward with documenting the requirements for consolidated physical\/financial positions and transport trade capture. What we need to focus on is the first bullet in Allan's list \u2026\u201d\n}<\/code><\/pre>\n\n<p>Les documents contiennent, outre un \u00e9l\u00e9ment \u00ab\u00a0texte\u00a0\u00bb, un champ \u00ab\u00a0m\u00e9tadonn\u00e9es\u00a0\u00bb dans lequel nous pouvons stocker les informations pertinentes relatives \u00e0 ce courrier \u00e9lectronique sp\u00e9cifique. Le fait d&rsquo;avoir les m\u00e9tadonn\u00e9es \u00e0 c\u00f4t\u00e9 du texte deviendra important pour l&rsquo;analyse m\u00e9dico-l\u00e9gale. <\/p>\n\n<p>Apr\u00e8s l&rsquo;importation des documents, il est temps de les analyser en posant des questions en langage naturel.<\/p>\n\n<h2 class=\"wp-block-heading\">Parlez aux documents en langage naturel<\/h2>\n\n<p>RAG effectue une analyse s\u00e9mantique de la question et la compare aux r\u00e9sultats de l&rsquo;analyse s\u00e9mantique pr\u00e9alable des documents import\u00e9s. Il s\u00e9lectionne ensuite ceux qui contiennent des informations pertinentes pour r\u00e9pondre \u00e0 la question. Le sous-ensemble de correspondances extraites est ensuite r\u00e9sum\u00e9 par un LLM pour fournir une r\u00e9ponse finale.  <\/p>\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1131\" height=\"595\" src=\"https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/ScreenHunter-2727.png\" alt=\"\" class=\"wp-image-11295\" srcset=\"https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/ScreenHunter-2727.png 1131w, https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/ScreenHunter-2727-300x158.png 300w, https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/ScreenHunter-2727-768x404.png 768w\" sizes=\"auto, (max-width: 1131px) 100vw, 1131px\" \/><\/figure>\n\n<p>Souvent, une r\u00e9ponse RAG renvoie des informations condens\u00e9es qu&rsquo;un expert humain mettrait des heures, voire des jours, \u00e0 obtenir en utilisant uniquement les m\u00e9thodes de recherche textuelle traditionnelles.<\/p>\n\n<h2 class=\"wp-block-heading\">Int\u00e9grer des mod\u00e8les<\/h2>\n\n<p>Les utilisateurs peuvent acc\u00e9der \u00e0 un certain nombre d&rsquo;options pour affiner le processus de recherche et de g\u00e9n\u00e9ration de r\u00e9ponses : Par exemple, diff\u00e9rents LLM peuvent diff\u00e9rer par leur qualit\u00e9, leur comportement en cours d&rsquo;ex\u00e9cution ou leur prix par requ\u00eate. Dans la configuration ci-dessous, un utilisateur peut choisir le LLM \u00e0 utiliser : GTP3.5, le GPT4, plus r\u00e9cent, plus puissant et plus co\u00fbteux, ou le mod\u00e8le Dolphin de Mixtral, moins co\u00fbteux mais comp\u00e9titif. <\/p>\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1045\" height=\"326\" src=\"https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/ScreenHunter-2728.png\" alt=\"\" class=\"wp-image-11294\" srcset=\"https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/ScreenHunter-2728.png 1045w, https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/ScreenHunter-2728-300x94.png 300w, https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/ScreenHunter-2728-768x240.png 768w\" sizes=\"auto, (max-width: 1045px) 100vw, 1045px\" \/><\/figure>\n\n<h2 class=\"wp-block-heading\">Texte et m\u00e9tadonn\u00e9es : une combinaison gagnante<\/h2>\n\n<p>Comme nous avons enregistr\u00e9 les m\u00e9tadonn\u00e9es des courriers \u00e9lectroniques, nous pouvons les utiliser pour restreindre l&rsquo;ensemble des documents pour notre prochaine question \u00e0 l&rsquo;ensemble des documents dont nous avons besoin. Voici la question : Quels \u00e9taient les sujets abord\u00e9s dans les courriers \u00e9lectroniques envoy\u00e9s par Ann Schmidt \u00e0 Karen Denne ? <\/p>\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1140\" height=\"491\" src=\"https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/ScreenHunter-2729-1140x491.png\" alt=\"\" class=\"wp-image-11293\" srcset=\"https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/ScreenHunter-2729-1140x491.png 1140w, https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/ScreenHunter-2729-300x129.png 300w, https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/ScreenHunter-2729-768x331.png 768w, https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/ScreenHunter-2729.png 1169w\" sizes=\"auto, (max-width: 1140px) 100vw, 1140px\" \/><\/figure>\n\n<h2 class=\"wp-block-heading\">Savoir o\u00f9 chercher<\/h2>\n\n<p>Comme nous disposons des m\u00e9tadonn\u00e9es pour chaque document, nous pouvons \u00e9galement les combiner avec le contenu du courrier. Cela permet de poser des questions qui doivent \u00e9tudier \u00e0 la fois le contenu et les m\u00e9tadonn\u00e9es afin que le LLM puisse y r\u00e9pondre correctement. Par exemple, dans la question ci-dessous, le LLM \u00ab\u00a0comprend\u00a0\u00bb que les \u00ab\u00a0courriers envoy\u00e9s par Michelle Cash\u00a0\u00bb n\u00e9cessitent de rechercher des documents contenant Michelle Cash dans le champ \u00ab\u00a0From :\u00a0\u00bb.  <\/p>\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1140\" height=\"548\" src=\"https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/ScreenHunter-2730-1140x548.png\" alt=\"\" class=\"wp-image-11292\" srcset=\"https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/ScreenHunter-2730-1140x548.png 1140w, https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/ScreenHunter-2730-300x144.png 300w, https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/ScreenHunter-2730-768x369.png 768w, https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/ScreenHunter-2730.png 1212w\" sizes=\"auto, (max-width: 1140px) 100vw, 1140px\" \/><\/figure>\n\n<p><a href=\"https:\/\/kairntech.com\/doc\/how-to-customize-a-question-context-generator-with-metadata\/\">Cliquez ici pour<\/a> voir comment faire en sorte que le RAG prenne en compte le texte et les m\u00e9tadonn\u00e9es.<\/p>\n\n<div style=\"height:47px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Analyse des donn\u00e9es des courriels d&rsquo;Enron Kairntech RAG (Retrieval Augmented Generation) pour la criminalistique est l&rsquo;un des cas d&rsquo;utilisation les plus r\u00e9cents des grands mod\u00e8les de langage. Il permet d&rsquo;analyser des informations internes tout en b\u00e9n\u00e9ficiant de la puissance des LLM. Et tout cela sans avoir \u00e0 partager les donn\u00e9es avec des tiers ou \u00e0 [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":18984,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[479],"tags":[],"class_list":["post-18982","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>RAG pour la criminalistique<\/title>\n<meta name=\"description\" content=\"Kairntech RAG pour la criminalistique : exploitez la puissance des LLM sur vos documents internes. Cas d&#039;usage concret : analyse de courriels suspects.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RAG pour la criminalistique\" \/>\n<meta property=\"og:description\" content=\"Kairntech RAG pour la criminalistique : exploitez la puissance des LLM sur vos documents internes. Cas d&#039;usage concret : analyse de courriels suspects.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/\" \/>\n<meta property=\"og:site_name\" content=\"Kairntech\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-10T12:28:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-16T22:08:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/rag-for-forensics.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"690\" \/>\n\t<meta property=\"og:image:height\" content=\"507\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"stefangeissler\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@kairntech\" \/>\n<meta name=\"twitter:site\" content=\"@kairntech\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"stefangeissler\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/\"},\"author\":{\"name\":\"stefangeissler\",\"@id\":\"https:\/\/kairntech.com\/fr\/#\/schema\/person\/32910a5eabbacaf6d1b18541dfb7afa6\"},\"headline\":\"Kairntech RAG pour la criminalistique\",\"datePublished\":\"2024-04-10T12:28:56+00:00\",\"dateModified\":\"2026-04-16T22:08:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/\"},\"wordCount\":634,\"publisher\":{\"@id\":\"https:\/\/kairntech.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/rag-for-forensics.jpg\",\"articleSection\":[\"Articles\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/\",\"url\":\"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/\",\"name\":\"RAG pour la criminalistique\",\"isPartOf\":{\"@id\":\"https:\/\/kairntech.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/rag-for-forensics.jpg\",\"datePublished\":\"2024-04-10T12:28:56+00:00\",\"dateModified\":\"2026-04-16T22:08:14+00:00\",\"description\":\"Kairntech RAG pour la criminalistique : exploitez la puissance des LLM sur vos documents internes. Cas d'usage concret : analyse de courriels suspects.\",\"breadcrumb\":{\"@id\":\"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/#primaryimage\",\"url\":\"https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/rag-for-forensics.jpg\",\"contentUrl\":\"https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/rag-for-forensics.jpg\",\"width\":690,\"height\":507,\"caption\":\"chiffon pour la criminalistique\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kairntech.com\/fr\/solutions-ia-agentique-pour-entreprise\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kairntech RAG pour la criminalistique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kairntech.com\/fr\/#website\",\"url\":\"https:\/\/kairntech.com\/fr\/\",\"name\":\"Kairntech\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/kairntech.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kairntech.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kairntech.com\/fr\/#organization\",\"name\":\"Kairntech\",\"url\":\"https:\/\/kairntech.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/kairntech.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kairntech.com\/wp-content\/uploads\/2026\/04\/logo-kairntech-2.png\",\"contentUrl\":\"https:\/\/kairntech.com\/wp-content\/uploads\/2026\/04\/logo-kairntech-2.png\",\"width\":512,\"height\":512,\"caption\":\"Kairntech\"},\"image\":{\"@id\":\"https:\/\/kairntech.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/kairntech\",\"https:\/\/fr.linkedin.com\/company\/kairntech\",\"https:\/\/github.com\/kairntech\",\"https:\/\/www.youtube.com\/@kairntech181\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kairntech.com\/fr\/#\/schema\/person\/32910a5eabbacaf6d1b18541dfb7afa6\",\"name\":\"stefangeissler\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/kairntech.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5b8f71cc6ab168d6331b0403e2d16624626c1f33c0c8147099a094efc80dd4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5b8f71cc6ab168d6331b0403e2d16624626c1f33c0c8147099a094efc80dd4e?s=96&d=mm&r=g\",\"caption\":\"stefangeissler\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RAG pour la criminalistique","description":"Kairntech RAG pour la criminalistique : exploitez la puissance des LLM sur vos documents internes. Cas d'usage concret : analyse de courriels suspects.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/","og_locale":"fr_FR","og_type":"article","og_title":"RAG pour la criminalistique","og_description":"Kairntech RAG pour la criminalistique : exploitez la puissance des LLM sur vos documents internes. Cas d'usage concret : analyse de courriels suspects.","og_url":"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/","og_site_name":"Kairntech","article_published_time":"2024-04-10T12:28:56+00:00","article_modified_time":"2026-04-16T22:08:14+00:00","og_image":[{"width":690,"height":507,"url":"https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/rag-for-forensics.jpg","type":"image\/jpeg"}],"author":"stefangeissler","twitter_card":"summary_large_image","twitter_creator":"@kairntech","twitter_site":"@kairntech","twitter_misc":{"\u00c9crit par":"stefangeissler","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/#article","isPartOf":{"@id":"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/"},"author":{"name":"stefangeissler","@id":"https:\/\/kairntech.com\/fr\/#\/schema\/person\/32910a5eabbacaf6d1b18541dfb7afa6"},"headline":"Kairntech RAG pour la criminalistique","datePublished":"2024-04-10T12:28:56+00:00","dateModified":"2026-04-16T22:08:14+00:00","mainEntityOfPage":{"@id":"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/"},"wordCount":634,"publisher":{"@id":"https:\/\/kairntech.com\/fr\/#organization"},"image":{"@id":"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/#primaryimage"},"thumbnailUrl":"https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/rag-for-forensics.jpg","articleSection":["Articles"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/","url":"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/","name":"RAG pour la criminalistique","isPartOf":{"@id":"https:\/\/kairntech.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/#primaryimage"},"image":{"@id":"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/#primaryimage"},"thumbnailUrl":"https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/rag-for-forensics.jpg","datePublished":"2024-04-10T12:28:56+00:00","dateModified":"2026-04-16T22:08:14+00:00","description":"Kairntech RAG pour la criminalistique : exploitez la puissance des LLM sur vos documents internes. Cas d'usage concret : analyse de courriels suspects.","breadcrumb":{"@id":"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/#primaryimage","url":"https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/rag-for-forensics.jpg","contentUrl":"https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/rag-for-forensics.jpg","width":690,"height":507,"caption":"chiffon pour la criminalistique"},{"@type":"BreadcrumbList","@id":"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/kairntech-rag-pour-la-criminalistique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kairntech.com\/fr\/solutions-ia-agentique-pour-entreprise\/"},{"@type":"ListItem","position":2,"name":"Kairntech RAG pour la criminalistique"}]},{"@type":"WebSite","@id":"https:\/\/kairntech.com\/fr\/#website","url":"https:\/\/kairntech.com\/fr\/","name":"Kairntech","description":"","publisher":{"@id":"https:\/\/kairntech.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kairntech.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/kairntech.com\/fr\/#organization","name":"Kairntech","url":"https:\/\/kairntech.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/kairntech.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/kairntech.com\/wp-content\/uploads\/2026\/04\/logo-kairntech-2.png","contentUrl":"https:\/\/kairntech.com\/wp-content\/uploads\/2026\/04\/logo-kairntech-2.png","width":512,"height":512,"caption":"Kairntech"},"image":{"@id":"https:\/\/kairntech.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/kairntech","https:\/\/fr.linkedin.com\/company\/kairntech","https:\/\/github.com\/kairntech","https:\/\/www.youtube.com\/@kairntech181"]},{"@type":"Person","@id":"https:\/\/kairntech.com\/fr\/#\/schema\/person\/32910a5eabbacaf6d1b18541dfb7afa6","name":"stefangeissler","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/kairntech.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d5b8f71cc6ab168d6331b0403e2d16624626c1f33c0c8147099a094efc80dd4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5b8f71cc6ab168d6331b0403e2d16624626c1f33c0c8147099a094efc80dd4e?s=96&d=mm&r=g","caption":"stefangeissler"}}]}},"jetpack_publicize_connections":[],"taxonomy_info":{"category":[{"value":479,"label":"Articles"}]},"featured_image_src_large":["https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/rag-for-forensics.jpg",690,507,false],"author_info":{"display_name":"stefangeissler","author_link":"https:\/\/kairntech.com\/fr\/blog\/author\/stefangeissler\/"},"comment_info":0,"category_info":[{"term_id":479,"name":"Articles","slug":"articles-fr","term_group":0,"term_taxonomy_id":479,"taxonomy":"category","description":"Articles de blog Kairntech","parent":0,"count":34,"filter":"raw","cat_ID":479,"category_count":34,"category_description":"Articles de blog Kairntech","cat_name":"Articles","category_nicename":"articles-fr","category_parent":0}],"tag_info":false,"jetpack_featured_media_url":"https:\/\/kairntech.com\/wp-content\/uploads\/2024\/04\/rag-for-forensics.jpg","jetpack-related-posts":[{"id":18792,"url":"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/chatbot-rag-une-ia-digne-de-confiance-avec-une-generation-augmentee-par-la-recherche-dinformations\/","url_meta":{"origin":18982,"position":0},"title":"Chatbot RAG : Une IA digne de confiance avec une g\u00e9n\u00e9ration augment\u00e9e par la recherche d&rsquo;informations","author":"clement","date":"13 mars 2025","format":false,"excerpt":"Dans un monde o\u00f9 l'intelligence artificielle (IA) devient de plus en plus essentielle, la confiance et la pr\u00e9cision sont les qualit\u00e9s que les utilisateurs recherchent le plus dans les syst\u00e8mes conversationnels. C'est l\u00e0 que la technologie RAG (Retrieval-Augmented Generation) r\u00e9volutionne le paysage. Un chatbot RAG combine le meilleur de l'IA\u2026","rel":"","context":"Dans &quot;Articles&quot;","block_context":{"text":"Articles","link":"https:\/\/kairntech.com\/fr\/blog\/category\/articles-fr\/"},"img":{"alt_text":"chatbot-rag","src":"https:\/\/i0.wp.com\/kairntech.com\/wp-content\/uploads\/2025\/03\/chatbot-rag.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kairntech.com\/wp-content\/uploads\/2025\/03\/chatbot-rag.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kairntech.com\/wp-content\/uploads\/2025\/03\/chatbot-rag.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":18776,"url":"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/assistants-personnels-dia-caracteristiques-outils-et-cas-dutilisation\/","url_meta":{"origin":18982,"position":1},"title":"Assistants personnels d&rsquo;IA : caract\u00e9ristiques, outils et cas d&rsquo;utilisation","author":"cnibart","date":"4 avril 2025","format":false,"excerpt":"Dans le monde d'aujourd'hui, o\u00f9 tout va tr\u00e8s vite, il est primordial de g\u00e9rer efficacement les t\u00e2ches quotidiennes. Les assistants personnels d'IA se sont impos\u00e9s comme des outils inestimables, am\u00e9liorant la productivit\u00e9 en automatisant les activit\u00e9s de routine. Qu'il s'agisse de planifier des r\u00e9unions ou de fournir des rappels opportuns,\u2026","rel":"","context":"Dans &quot;Articles&quot;","block_context":{"text":"Articles","link":"https:\/\/kairntech.com\/fr\/blog\/category\/articles-fr\/"},"img":{"alt_text":"assistant-personnel-ia","src":"https:\/\/i0.wp.com\/kairntech.com\/wp-content\/uploads\/2025\/04\/assistant-personnel-ia.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kairntech.com\/wp-content\/uploads\/2025\/04\/assistant-personnel-ia.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kairntech.com\/wp-content\/uploads\/2025\/04\/assistant-personnel-ia.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":18915,"url":"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/generation-augmentee-par-recuperation-rag-guide-pour-les-entreprises\/","url_meta":{"origin":18982,"position":2},"title":"Article sur la g\u00e9n\u00e9ration augment\u00e9e par r\u00e9cup\u00e9ration (RAG): Guide pour les entreprises","author":"cnibart","date":"4 avril 2025","format":false,"excerpt":"Dans le paysage actuel des entreprises, les grands mod\u00e8les de langage (LLM) ouvrent de nouvelles perspectives en mati\u00e8re d'automatisation, d'acc\u00e8s aux connaissances et de communication intelligente. Mais lorsque les informations sur lesquelles elles s'appuient sont obsol\u00e8tes, opaques ou g\u00e9n\u00e9riques, la confiance s'\u00e9vanouit rapidement. Les entreprises ont besoin de r\u00e9ponses fond\u00e9es\u2026","rel":"","context":"Dans &quot;Articles&quot;","block_context":{"text":"Articles","link":"https:\/\/kairntech.com\/fr\/blog\/category\/articles-fr\/"},"img":{"alt_text":"rag-guide-entreprises","src":"https:\/\/i0.wp.com\/kairntech.com\/wp-content\/uploads\/2025\/04\/rag-guide-entreprises.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kairntech.com\/wp-content\/uploads\/2025\/04\/rag-guide-entreprises.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kairntech.com\/wp-content\/uploads\/2025\/04\/rag-guide-entreprises.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":18912,"url":"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/generation-augmentee-ou-reglage-fin-choisir-la-bonne-approche\/","url_meta":{"origin":18982,"position":3},"title":"G\u00e9n\u00e9ration augment\u00e9e ou r\u00e9glage fin : Choisir la bonne approche","author":"cnibart","date":"16 mai 2025","format":false,"excerpt":"Dans le paysage actuel de l'IA, qui \u00e9volue rapidement, les entreprises se tournent de plus en plus vers les grands mod\u00e8les de langage (LLM) pour automatiser les t\u00e2ches, g\u00e9n\u00e9rer des informations et personnaliser les exp\u00e9riences. Mais il n'est pas toujours facile de choisir entre la g\u00e9n\u00e9ration augment\u00e9e par r\u00e9cup\u00e9ration (RAG)\u2026","rel":"","context":"Dans &quot;Articles&quot;","block_context":{"text":"Articles","link":"https:\/\/kairntech.com\/fr\/blog\/category\/articles-fr\/"},"img":{"alt_text":"generation-augmentee-reglage-fin","src":"https:\/\/i0.wp.com\/kairntech.com\/wp-content\/uploads\/2025\/05\/generation-augmentee-reglage-fin-2.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kairntech.com\/wp-content\/uploads\/2025\/05\/generation-augmentee-reglage-fin-2.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kairntech.com\/wp-content\/uploads\/2025\/05\/generation-augmentee-reglage-fin-2.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":18976,"url":"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/top-10-des-outils-nlp-2026-un-guide-complet-pour-les-developpeurs-et-les-innovateurs\/","url_meta":{"origin":18982,"position":4},"title":"Top 10 des outils NLP en 2026 : un guide complet pour les d\u00e9veloppeurs et les innovateurs","author":"cnibart","date":"29 avril 2025","format":false,"excerpt":"Le traitement du langage naturel (NLP) est pass\u00e9 d'un domaine universitaire de niche \u00e0 une pierre angulaire de l'intelligence artificielle moderne. Alors que les entreprises s'appuient de plus en plus sur des donn\u00e9es textuelles non structur\u00e9es (courriers \u00e9lectroniques, tickets d'assistance, contrats ou \u00e9valuations de produits), les outils de traitement du\u2026","rel":"","context":"Dans &quot;Articles&quot;","block_context":{"text":"Articles","link":"https:\/\/kairntech.com\/fr\/blog\/category\/articles-fr\/"},"img":{"alt_text":"top-10-outils-nlp-2026","src":"https:\/\/i0.wp.com\/kairntech.com\/wp-content\/uploads\/2025\/04\/top-10-outils-nlp-2026-3.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kairntech.com\/wp-content\/uploads\/2025\/04\/top-10-outils-nlp-2026-3.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kairntech.com\/wp-content\/uploads\/2025\/04\/top-10-outils-nlp-2026-3.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":18811,"url":"https:\/\/kairntech.com\/fr\/blog\/articles-fr\/enterprise-genai-liberer-le-potentiel-de-lia-generative-pour-les-entreprises-modernes\/","url_meta":{"origin":18982,"position":5},"title":"Enterprise GenAI : lib\u00e9rer le potentiel de l&rsquo;IA g\u00e9n\u00e9rative pour les entreprises modernes","author":"cnibart","date":"28 avril 2025","format":false,"excerpt":"Introduction \u00e0 l'Enterprise GenAI Qu'est-ce que la GenAI d'entreprise et pourquoi est-ce important ? L'IA g\u00e9n\u00e9rative d'entreprise (Enterprise GenAI ) transforme rapidement la fa\u00e7on dont les organisations cr\u00e9ent des applications aliment\u00e9es par l'IA et optimisent leurs processus d'affaires. Contrairement aux outils d'IA g\u00e9n\u00e9rative grand public, l'Enterprise GenAI est con\u00e7ue pour\u2026","rel":"","context":"Dans &quot;Articles&quot;","block_context":{"text":"Articles","link":"https:\/\/kairntech.com\/fr\/blog\/category\/articles-fr\/"},"img":{"alt_text":"enterprise-genai","src":"https:\/\/i0.wp.com\/kairntech.com\/wp-content\/uploads\/2025\/04\/enterprise-genai-3.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kairntech.com\/wp-content\/uploads\/2025\/04\/enterprise-genai-3.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kairntech.com\/wp-content\/uploads\/2025\/04\/enterprise-genai-3.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/kairntech.com\/fr\/wp-json\/wp\/v2\/posts\/18982","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kairntech.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kairntech.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kairntech.com\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/kairntech.com\/fr\/wp-json\/wp\/v2\/comments?post=18982"}],"version-history":[{"count":1,"href":"https:\/\/kairntech.com\/fr\/wp-json\/wp\/v2\/posts\/18982\/revisions"}],"predecessor-version":[{"id":18985,"href":"https:\/\/kairntech.com\/fr\/wp-json\/wp\/v2\/posts\/18982\/revisions\/18985"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kairntech.com\/fr\/wp-json\/wp\/v2\/media\/18984"}],"wp:attachment":[{"href":"https:\/\/kairntech.com\/fr\/wp-json\/wp\/v2\/media?parent=18982"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kairntech.com\/fr\/wp-json\/wp\/v2\/categories?post=18982"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kairntech.com\/fr\/wp-json\/wp\/v2\/tags?post=18982"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}