été His Beatitude Patriarch Ignatius IV - Memory Eternal By www.ancientfaith.com Published On :: 2014-07-26T04:16:11+00:00 John Maddex interviews Fr. Thomas Zain, Vicar General of the Antiochian Orthodox Church of North America, about the falling asleep in the Lord of His Beatitude Ignatius IV of Antioch and All the East. Full Article
été Memory Eternal Metropolitan Philip By www.ancientfaith.com Published On :: 2014-07-27T00:13:09+00:00 We talk with Fr. Thomas Zain, Vicar General of the Antiochian Archdiocese of North America just 2 hours after the falling asleep of our beloved Metropolitan Philip, Archbishop of New York and Metropolitan of All North America. Full Article
été The Retirement of Fr. Peter Gillquist By www.ancientfaith.com Published On :: 2017-01-03T21:20:57+00:00 John Maddex visits the home of Fr. Peter and Kh. Marilyn Gillquist to talk about the recent announcement by His Eminence Metropolitan Philip of Fr. Peter's retirement as Chairman of the Department of Missions and Evangelism for the Antiochian Archdiocese. Joining them is their son, Fr. Peter Jon Gillquist. Full Article
été Patriarch Irenej of Serbia: Memory Eternal! By www.ancientfaith.com Published On :: 2020-11-24T19:55:16+00:00 Fr. Andrew Stephen Damick interviews Serbian Orthodox priest Fr. Milorad Orlic regarding the recent passing of His Holiness, Patriarch Irenej of Serbia. Full Article
été Peter, Paul, and Antioch By www.ancientfaith.com Published On :: 2014-09-10T17:09:25+00:00 Fr. Pat discusses Sts. Peter and Paul and their relationship to the Orthodox Church. Full Article
été Jacob, Peter, and God By www.ancientfaith.com Published On :: 2014-09-10T17:21:13+00:00 Fr. Pat compares Peter attempting to walk on water to what Holy Scripture tells us of the Patriarch Jacob. Full Article
été Live Close to the Cemetery By www.ancientfaith.com Published On :: 2016-11-27T23:20:46+00:00 Using Luke 8:26-27 as a starting point of his reflections, Fr. Pat encourages us to live our lives with an awareness of death as an important part of our mental composition. Full Article
été Checking the Odometer By www.ancientfaith.com Published On :: 2017-06-02T17:16:24+00:00 To follow Christ is first to be understood in a literal and existential way. It is not a diminishing of observance, it’s the augmentation of observance. We profess our allegiance to Christ, and our commitment to His Lordship. Full Article
été Soldier, Athlete, Tiller of Soil By www.ancientfaith.com Published On :: 2020-01-06T21:05:29+00:00 In 2 Timothy 2:1-10, Paul holds out three models for Timothy’s life which are three metaphors for the life in Christ. Timothy is not free to choose which one he wants; he must follow all three. Full Article
été A Reliable Barometer By www.ancientfaith.com Published On :: 2021-10-25T14:03:53+00:00 In this vesperal homily, Fr. Pat preaches from 1 John 2:1-6, about the true blessed assurance of our salvation. Full Article
été Memory Eternal By www.ancientfaith.com Published On :: 2016-08-28T02:05:57+00:00 When people pass away, we pray that their memory will be eternal. We're not simply asking God to think about them: we're asking Him to save them (and us) and bring us all into His Kingdom. It's the Church's answer to the loneliness and emptiness of death. Full Article
été This Is Eternal Life . . . . By www.ancientfaith.com Published On :: 2015-12-26T19:46:15+00:00 To know the One True God. Full Article
été Highlights: Wigan complete clean sweep with Grand Final victory By www.bbc.com Published On :: Sat, 12 Oct 2024 22:30:33 GMT Wigan Warriors become the first side in the Super League era to win all four trophies in a single season, beating Hull KR in a tight Grand Final at Old Trafford. Full Article
été Farnworth shines as England complete series win over Samoa By www.bbc.com Published On :: Sat, 02 Nov 2024 16:58:26 GMT Watch highlights as Herbie Farnworth scores two tries to help England defeat Samoa 34-16 in the second autumn Test at Headingley Stadium. Full Article
été What do athletes think about Glasgow 2026? By www.bbc.com Published On :: Thu, 24 Oct 2024 14:13:38 GMT BBC Sport Scotland speaks to some of the nation's top athletes to get their views on Glasgow hosting the 2026 Commonwealth Games. Full Article
été Businessmen set to complete Hull FC takeover By www.bbc.com Published On :: Wed, 13 Nov 2024 13:02:58 GMT Former Leeds Rhinos president Andrew Thirkill and businessman David Hood enter into an exclusivity period to take over Hull FC. Full Article
été Watch as veteran is wrongly accused of shoplifting By www.bbc.com Published On :: Sat, 09 Nov 2024 07:04:09 GMT Jez Daniels is accused of shoplifting but says staff at the Newport store racially profiled him. Full Article
été Black veteran wrongly called thief and banned from every Morrisons By www.bbc.com Published On :: Sat, 09 Nov 2024 07:03:23 GMT Jez Daniels was buying wine and chocolates when store staff approached him. Full Article
été Bidders hold talks over fate of Peter Pan house By www.bbc.com Published On :: Mon, 11 Nov 2024 10:30:47 GMT Offers have been made for a site which inspired JM Barrie but a timeline for any sale is uncertain. Full Article
été Accommodation cost 'could be deterring teachers' By www.bbc.com Published On :: Tue, 12 Nov 2024 06:11:44 GMT Teachers are leaving Guernsey after the end of a rental allowance, a scrutiny meeting hears. Full Article
été Traitors star completes 750-mile Scotland to Wales trek By www.bbc.com Published On :: Sun, 10 Nov 2024 16:40:42 GMT Andrew Jenkins says his aim was to give hope to those feeling defeated. Full Article
été Cemetery reopens after campers move on By www.bbc.com Published On :: Tue, 12 Nov 2024 11:02:38 GMT The city council says a group of people camping there have accepted help from a charity. Full Article
été Unlawful cemetery firework display 'disrespectful' By www.bbc.com Published On :: Wed, 13 Nov 2024 10:33:01 GMT It scorched the grass and was "simply not appropriate or acceptable", said a council. Full Article
été Twelve-year-old drag racer to compete for title By www.bbc.com Published On :: Sat, 05 Oct 2024 06:14:11 GMT Candra Redshaw, from Darlington, is in the British Junior Drag Racing finals. Full Article
été Rowe still feels Exeter can make top four By www.bbc.com Published On :: Tue, 12 Nov 2024 10:35:02 GMT Exeter chief executive Tony Rowe feels the club's men's side can still make the Premiership top four despite their poor start to the season. Full Article
été Watered down changes approved for Exeter bus lane By www.bbc.com Published On :: Tue, 12 Nov 2024 16:54:13 GMT Councillors water down and approve plans to expand operating times of a bus lane in the Devon city. Full Article
été Exeter thrash Loughborough to return to PWR summit By www.bbc.com Published On :: Sat, 09 Nov 2024 21:27:47 GMT Exeter Chiefs returned to the top of the Premiership Women's Rugby league after hammering Loughborough Lightning 40-19. Full Article
été Holders Peterborough into last 16 - EFL Trophy round-up By www.bbc.com Published On :: Tue, 05 Nov 2024 22:38:03 GMT Peterborough United, Swindon Town and Cheltenham Town all win in the EFL Trophy to seal their places in the last 16 of the competition. Full Article
été 'Swindon town centre needs complete reinvention' By www.bbc.com Published On :: Wed, 13 Nov 2024 13:47:33 GMT A draft document with "ambitions" for Swindon town centre is being put to the council. Full Article
été Smart meters in north/south divide, Bitcoin breaks through $82,000 barrier By www.techdigest.tv Published On :: Mon, 11 Nov 2024 12:33:56 +0000 The way smart energy meters work in northern England and Scotland is causing issues for customers, BBC Panorama has been told. The body that represents energy companies, Energy UK, has […] The post Smart meters in north/south divide, Bitcoin breaks through $82,000 barrier appeared first on Tech Digest. Related posts: Polestar announces partnerships with Octopus and Ohme Apple ditches electric car project, Bitcoin hits $60,000 – first time since 2021 Bitcoin Uncovered: Currency of the Future Full Article News Asus Rog Phone 9 cryptocurrency Octopus Energy smart meters
été 4 must-have assets that marketers should create to support sales activities By www.articulatemarketing.com Published On :: 2024-07-18T08:15:00Z Peter Drucker, ‘the founder of modern management’ said: Full Article Sales Content
été Pete Davidson and Kate Beckinsale are a Legit Thing By www.hecklerspray.com Published On :: Mon, 04 Mar 2019 23:31:46 +0000 While Ariana Grande is maybe fucking Big Sean again, Pete Davidson continues his ascension to legend status by locking down babe of all babes, Kate Beckinsale. It’s one thing to be seen flirting at a Golden Globes after-party or leaving a club at all hours hand-in-hand, it’s a whole other thing to be spotted laying […] The post Pete Davidson and Kate Beckinsale are a Legit Thing appeared first on HecklerSpray. Full Article Celebrities
été ...And Now For Something Completely Different By belledejour-uk.blogspot.com Published On :: Mon, 11 Jul 2011 19:45:00 +0000 This is not about sex, and not about The Sex Myth. This is about the old blog, and the growing scandal in News International's paper the rules they played by. And as Prince Humperdinck so eloquently put it, I always think everything could be a trap.Very early on in blogging as Belle de Jour, I had an email address associated with the blog. It was with one of those free email providers and not very secure. Later, I wised up a touch and moved to doing everything through Hushmail. But for some reason I kept the old email up and running, and checked it occasionally.So on the day of the book's release in the UK, I logged on to a public library computer in Clearwater, Florida, and had a look at that old account. There was a new message from someone I didn't recognise. I opened it.The message was from a journo at the Sunday Times. It was short, which struck me as unusual: Come on Belle, not even a little hint? There was an attachment. The attachment started downloading automatically (then if I remember correctly, came up with a "failed to download" message).My heart sank - my suspicion was that there had been a program attached to the message, some sort of trojan, presumably trying to get information from my computer.Now, I understood the papers regarded all of this as a game. There were accusations that the anonymity thing was a ruse to pump sales. It wasn't. I was really afraid of losing my job and my career if found out. But I knew the rules they played by. And as Prince Humperdinck so eloquently put it, I always think everything could be a trap.I did several things:1. Alerted library staff that I thought there had been a virus downloaded on to the computer, so they could deal with it.2. Phoned a friend who knew my secret. I explained what happened. He agreed to log in to that email account from where he lived, halfway around the world, open the email and send a reply, so they would have competing IP address information.3. Alerted the man who owned the .co.uk address pointing to my blog, someone called Ian (who to my knowledge I have never met). He confirmed he had been contacted by the Times and asked if I was indeed in Florida. He told them he didn't know (which was true).Point 3 is the part that makes me think my suspicions were correct. I hadn't replied to the message from the computer in Florida, so why would they have a Florida IP address? They did get a reply from "my" account, but it would have had an IP address from Australia.(It's been suggested on Twitter that this could also have been because of a read receipt or embedded images. However, if my memory serves - and it usually does - the service I used did not send read receipts and I had images/HTML off as a matter of habit. There could of course be other explanations for what happened, but it is certainly true that the Times were trying hard to find me. Thanks for the comments, I hope this answers any concerns.) Full Article
été OPOSICIONES AL CUERPO DE TRADUCTORES E INTÉRPRETES DEL ESTADO 2022 By nartran.com Published On :: Sun, 16 Oct 2022 20:39:45 +0000 Oposiciones al Cuerpo de Traductores e Intérpretes del Estado 2022 Se han hecho de rogar, pero, por fin, el pasado viernes, 14 de octubre, se publicó la resolución de convocatoria... La entrada OPOSICIONES AL CUERPO DE TRADUCTORES E INTÉRPRETES DEL ESTADO 2022 se publicó primero en Nartran Translations. Full Article Información general CTIE Cuerpo de Traductores e Intérpretes del Estado oposiciones intérpretes oposiciones traductores
été PREPARAR OPOSICIONES AL CUERPO DE TRADUCTORES E INTÉRPRETES DEL ESTADO 2022 By nartran.com Published On :: Thu, 20 Oct 2022 06:58:57 +0000 Preparar Oposiciones al Cuerpo de Traductores e Intérpretes del Estado 2022 Si has llegado a este post, probablemente quieras saber cómo preparar las oposiciones al Cuerpo de Traductores e Intérpretes... La entrada PREPARAR OPOSICIONES AL CUERPO DE TRADUCTORES E INTÉRPRETES DEL ESTADO 2022 se publicó primero en Nartran Translations. Full Article Oposiciones CTIE CTIE Cuerpo de Traductores e Intérpretes del Estado oposiciones intérpretes oposiciones traductores
été COMPRAR TEMAS TEÓRICOS OPOSICIÓN AL CUERPO DE TRADUCTORES E INTÉRPRETES DEL ESTADO By nartran.com Published On :: Mon, 27 Mar 2023 14:51:55 +0000 Comprar temas teóricos oposición al Cuerpo de Traductores e Intérpretes del Estado La entrada COMPRAR TEMAS TEÓRICOS OPOSICIÓN AL CUERPO DE TRADUCTORES E INTÉRPRETES DEL ESTADO se publicó primero en Nartran Translations. Full Article Oposiciones CTIE CTIE Cuerpo de Traductores e Intérpretes del Estado oposiciones intérpretes oposiciones traductores temas oposición CTIE
été Renovando el carné de Traductor-Intérprete Jurado (II) By www.elgasconjurado.com Published On :: Wed, 09 Aug 2017 14:05:32 +0000 En la segunda parte de «Renovando el carné de Traductor-Intérprete Jurado» vamos a ver los diferentes pasos que hay que seguir para la renovación del carné de jurado. La renovación es ahora más sencilla que nunca ya que es posible realizar casi toda la gestión online. Claro está, siempre que el sistema quiera y no […] Full Article Juradas Profesionales Recursos de TeI
été Pruebas al Cuerpo de Traductores e Intérpretes del MAEC By www.elgasconjurado.com Published On :: Wed, 10 Jan 2018 18:06:33 +0000 El BOE (BOE-A-2018-337) publica hoy las oportunas pruebas (oposición) para cubrir las siguientes plazas: a) Una plaza de Traductor de árabe (traducción directa del árabe al castellano), con inglés como segunda lengua extranjera. b) Una plaza de Traductor/Intérprete de inglés y francés con «retour» a uno de esos dos idiomas. c) Tres plazas de Traductor […] Full Article General
été Exámenes de traductor-intérprete jurado By www.elgasconjurado.com Published On :: Tue, 17 Jul 2018 17:23:45 +0000 El BOE acaba de publicar la Resolución de 12 de julio de 2018, de la Subsecretaría, por la que se convocan exámenes para la obtención del título de Traductor-Intérprete Jurado. La fecha de la primera prueba ha sido fijada para el día 17 de septiembre de 2018 y para los siguientes idiomas: Albanés, árabe, armenio, […] Full Article General
été Real Decreto 2020 para regular Traductor Jurado e Intérprete Jurado By www.traduccion-jurada-oficial.com Published On :: Thu, 06 Aug 2020 12:33:57 +0000 Tras varios meses de actividad bajo mínimos a causa de la pandemia del COVID19, en los que quedó claro que no es fácil ser traductor jurado en tiempos de coronavirus, la Oficina de Interpretación... The post Real Decreto 2020 para regular Traductor Jurado e Intérprete Jurado appeared first on El Blog del Traductor Jurado. Full Article Traductor jurado legislación ministerio de asuntos exteriores normativa de traducción jurada Oficina de Interpretación de Lenguas traductores jurados
été Treat For Legal Interpreters and an Archive for Translators As Well By novicetranslators.blogspot.com Published On :: Tue, 17 Jan 2012 01:13:00 +0000 OpenCourt is an experimental project run by WBUR, Boston’s NPR news station, that uses digital technology to make Quincy District Court more accessible to the public. Full Article court interpreters law legal live été Text Line Detection and Segmentation: Uneven Skew Angles and Hill-and-Dale Writing By www.jucs.org Published On :: 2011-04-07T14:38:26+02:00 In this paper a line detection and segmentation technique is presented. The proposed technique is an improved version of an older one. The experiments have been performed on the training dataset of the ICDAR 2009 handwriting segmentation contest in order to be able to compare, objectively, the performance of the two techniques. The improvement between the older and newer version is more than 24% while the average extra CPU time cost is less than 200 ms per page. Full Article été Nondeterministic Query Algorithms By www.jucs.org Published On :: 2011-07-04T16:04:43+02:00 Query algorithms are used to compute Boolean functions. The definition of the function is known, but input is hidden in a black box. The aim is to compute the function value using as few queries to the black box as possible. As in other computational models, different kinds of query algorithms are possible: deterministic, probabilistic, as well as nondeterministic. In this paper, we present a new alternative definition of nondeterministic query algorithms and study algorithm complexity in this model. We demonstrate the power of our model with an example of computing the Fano plane Boolean function. We show that for this function the difference between deterministic and nondeterministic query complexity is 7N versus O(3N). Full Article été Cost-Sensitive Spam Detection Using Parameters Optimization and Feature Selection By www.jucs.org Published On :: 2011-07-04T16:04:49+02:00 E-mail spam is no more garbage but risk since it recently includes virus attachments and spyware agents which make the recipients' system ruined, therefore, there is an emerging need for spam detection. Many spam detection techniques based on machine learning techniques have been proposed. As the amount of spam has been increased tremendously using bulk mailing tools, spam detection techniques should counteract with it. To cope with this, parameters optimization and feature selection have been used to reduce processing overheads while guaranteeing high detection rates. However, previous approaches have not taken into account feature variable importance and optimal number of features. Moreover, to the best of our knowledge, there is no approach which uses both parameters optimization and feature selection together for spam detection. In this paper, we propose a spam detection model enabling both parameters optimization and optimal feature selection; we optimize two parameters of detection models using Random Forests (RF) so as to maximize the detection rates. We provide the variable importance of each feature so that it is easy to eliminate the irrelevant features. Furthermore, we decide an optimal number of selected features using two methods; (i) only one parameters optimization during overall feature selection and (ii) parameters optimization in every feature elimination phase. Finally, we evaluate our spam detection model with cost-sensitive measures to avoid misclassification of legitimate messages, since the cost of classifying a legitimate message as a spam far outweighs the cost of classifying a spam as a legitimate message. We perform experiments on Spambase dataset and show the feasibility of our approaches. Full Article été Ontology-based Competency Management: the Case Study of the Mihajlo Pupin Institute By www.jucs.org Published On :: 2011-07-20T10:20:38+02:00 Semantic-based technologies have been steadily increasing their relevance in recent years in both the research world and business world. Considering this, the present article discusses the process of design and implementation of a competency management system in information and communication technologies domain utilizing the latest Semantic Web tools and technologies including D2RQ server, TopBraid Composer, OWL 2, SPARQL, SPARQL Rules and common human resources related public vocabularies. In particular, the paper discusses the process of building individual and enterprise competence models in a form of ontology database, as well as different ways of meaningful search and retrieval of expertise data on the Semantic Web. The ontological knowledge base aims at storing the extracted and integrated competences from structured, as well as unstructured sources. By using the illustrative case study of deployment of such a system in the Human Resources sector at the Mihajlo Pupin Institute, this paper shows an example of new approaches to data integration and information management. The proposed approach extends the functionalities of existing enterprise information systems and offers possibilities for development of future Internet services. This allows organizations to express their core competences and talents in a standardized, machine processable and understandable format, and hence, facilitates their integration in the European Research Area and beyond. Full Article été Netanyahu s’est entretenu 3 fois avec Trump depuis sa réélection à propos de la "menace iranienne" By fr.euronews.com Published On :: Sun, 10 Nov 2024 22:24:01 +0100 Netanyahu s’est entretenu 3 fois avec Trump depuis sa réélection à propos de la "menace iranienne" Full Article été An intelligent approach to classify and detection of image forgery attack (scaling and cropping) using transfer learning By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 Image forgery detection techniques refer to the process of detecting manipulated or altered images, which can be used for various purposes, including malicious intent or misinformation. Image forgery detection is a crucial task in digital image forensics, where researchers have developed various techniques to detect image forgery. These techniques can be broadly categorised into active, passive, machine learning-based and hybrid. Active approaches involve embedding digital watermarks or signatures into the image during the creation process, which can later be used to detect any tampering. On the other hand, passive approaches rely on analysing the statistical properties of the image to detect any inconsistencies or irregularities that may indicate forgery. In this paper for the detection of scaling and cropping attack a deep learning method has been proposed using ResNet. The proposed method (Res-Net-Adam-Adam) is able to achieve highest amount of accuracy of 99.14% (0.9914) while detecting fake and real images. Full Article été Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 The confluence of the internet of things (IoT) with smart grids has ushered in a paradigm shift in energy management, promising unparalleled efficiency, economic robustness and unwavering reliability. However, this integrative evolution has concurrently amplified the grid's susceptibility to cyber intrusions, casting shadows on its foundational security and structural integrity. Machine learning (ML) and deep learning (DL) emerge as beacons in this landscape, offering robust methodologies to navigate the intricate cybersecurity labyrinth of IoT-infused smart grids. While ML excels at sifting through voluminous data to identify and classify looming threats, DL delves deeper, crafting sophisticated models equipped to counteract avant-garde cyber offensives. Both of these techniques are united in their objective of leveraging intricate data patterns to provide real-time, actionable security intelligence. Yet, despite the revolutionary potential of ML and DL, the battle against the ceaselessly morphing cyber threat landscape is relentless. The pursuit of an impervious smart grid continues to be a collective odyssey. In this review, we embark on a scholarly exploration of ML and DL's indispensable contributions to enhancing cybersecurity in IoT-centric smart grids. We meticulously dissect predominant cyber threats, critically assess extant security paradigms, and spotlight research frontiers yearning for deeper inquiry and innovation. Full Article «113 14 15..27..52..77..102..127..152..177..202..227246» Recent Trending Cost-Effective, Energy Efficient Concrete Sandwich Panels Veterans’ care charity to merge into larger counterpart Incomplete information can fuel misjudgment: study Wagner Meters rolls out Rapid RH 4.0 Latricrete Glass Tile Adhesive Even a heroic detective like 'Cross' can't save this Prime Video adaptation Millions of phones create most complete map ever of the ionosphere Sweeter tomatoes are coming soon thanks to CRISPR gene editing Un avance hacia rayos X mas seguros gracias a la nueva tecnologia de detectores New Study Links Air Pollution with Increased Risk of Spontaneous Preterm Births Chewing Xylitol Gum Linked to Decrease in Preterm Birth When There's No One Else to Blame: The Impact of Coworkers' Perceived Competence and Warmth on the Relations between Ostracism, Shame, and Ingratiation New Study Links Air Pollution with Increased Risk of Spontaneous Preterm Births Chewing Xylitol Gum Linked to Decrease in Preterm Birth Court Begins Review of Pretrial Detention Warrants for Key Figures in Election-Meddling Scandal Subscribe To Our Newsletter
été Text Line Detection and Segmentation: Uneven Skew Angles and Hill-and-Dale Writing By www.jucs.org Published On :: 2011-04-07T14:38:26+02:00 In this paper a line detection and segmentation technique is presented. The proposed technique is an improved version of an older one. The experiments have been performed on the training dataset of the ICDAR 2009 handwriting segmentation contest in order to be able to compare, objectively, the performance of the two techniques. The improvement between the older and newer version is more than 24% while the average extra CPU time cost is less than 200 ms per page. Full Article
été Nondeterministic Query Algorithms By www.jucs.org Published On :: 2011-07-04T16:04:43+02:00 Query algorithms are used to compute Boolean functions. The definition of the function is known, but input is hidden in a black box. The aim is to compute the function value using as few queries to the black box as possible. As in other computational models, different kinds of query algorithms are possible: deterministic, probabilistic, as well as nondeterministic. In this paper, we present a new alternative definition of nondeterministic query algorithms and study algorithm complexity in this model. We demonstrate the power of our model with an example of computing the Fano plane Boolean function. We show that for this function the difference between deterministic and nondeterministic query complexity is 7N versus O(3N). Full Article
été Cost-Sensitive Spam Detection Using Parameters Optimization and Feature Selection By www.jucs.org Published On :: 2011-07-04T16:04:49+02:00 E-mail spam is no more garbage but risk since it recently includes virus attachments and spyware agents which make the recipients' system ruined, therefore, there is an emerging need for spam detection. Many spam detection techniques based on machine learning techniques have been proposed. As the amount of spam has been increased tremendously using bulk mailing tools, spam detection techniques should counteract with it. To cope with this, parameters optimization and feature selection have been used to reduce processing overheads while guaranteeing high detection rates. However, previous approaches have not taken into account feature variable importance and optimal number of features. Moreover, to the best of our knowledge, there is no approach which uses both parameters optimization and feature selection together for spam detection. In this paper, we propose a spam detection model enabling both parameters optimization and optimal feature selection; we optimize two parameters of detection models using Random Forests (RF) so as to maximize the detection rates. We provide the variable importance of each feature so that it is easy to eliminate the irrelevant features. Furthermore, we decide an optimal number of selected features using two methods; (i) only one parameters optimization during overall feature selection and (ii) parameters optimization in every feature elimination phase. Finally, we evaluate our spam detection model with cost-sensitive measures to avoid misclassification of legitimate messages, since the cost of classifying a legitimate message as a spam far outweighs the cost of classifying a spam as a legitimate message. We perform experiments on Spambase dataset and show the feasibility of our approaches. Full Article
été Ontology-based Competency Management: the Case Study of the Mihajlo Pupin Institute By www.jucs.org Published On :: 2011-07-20T10:20:38+02:00 Semantic-based technologies have been steadily increasing their relevance in recent years in both the research world and business world. Considering this, the present article discusses the process of design and implementation of a competency management system in information and communication technologies domain utilizing the latest Semantic Web tools and technologies including D2RQ server, TopBraid Composer, OWL 2, SPARQL, SPARQL Rules and common human resources related public vocabularies. In particular, the paper discusses the process of building individual and enterprise competence models in a form of ontology database, as well as different ways of meaningful search and retrieval of expertise data on the Semantic Web. The ontological knowledge base aims at storing the extracted and integrated competences from structured, as well as unstructured sources. By using the illustrative case study of deployment of such a system in the Human Resources sector at the Mihajlo Pupin Institute, this paper shows an example of new approaches to data integration and information management. The proposed approach extends the functionalities of existing enterprise information systems and offers possibilities for development of future Internet services. This allows organizations to express their core competences and talents in a standardized, machine processable and understandable format, and hence, facilitates their integration in the European Research Area and beyond. Full Article
été Netanyahu s’est entretenu 3 fois avec Trump depuis sa réélection à propos de la "menace iranienne" By fr.euronews.com Published On :: Sun, 10 Nov 2024 22:24:01 +0100 Netanyahu s’est entretenu 3 fois avec Trump depuis sa réélection à propos de la "menace iranienne" Full Article
été An intelligent approach to classify and detection of image forgery attack (scaling and cropping) using transfer learning By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 Image forgery detection techniques refer to the process of detecting manipulated or altered images, which can be used for various purposes, including malicious intent or misinformation. Image forgery detection is a crucial task in digital image forensics, where researchers have developed various techniques to detect image forgery. These techniques can be broadly categorised into active, passive, machine learning-based and hybrid. Active approaches involve embedding digital watermarks or signatures into the image during the creation process, which can later be used to detect any tampering. On the other hand, passive approaches rely on analysing the statistical properties of the image to detect any inconsistencies or irregularities that may indicate forgery. In this paper for the detection of scaling and cropping attack a deep learning method has been proposed using ResNet. The proposed method (Res-Net-Adam-Adam) is able to achieve highest amount of accuracy of 99.14% (0.9914) while detecting fake and real images. Full Article
été Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 The confluence of the internet of things (IoT) with smart grids has ushered in a paradigm shift in energy management, promising unparalleled efficiency, economic robustness and unwavering reliability. However, this integrative evolution has concurrently amplified the grid's susceptibility to cyber intrusions, casting shadows on its foundational security and structural integrity. Machine learning (ML) and deep learning (DL) emerge as beacons in this landscape, offering robust methodologies to navigate the intricate cybersecurity labyrinth of IoT-infused smart grids. While ML excels at sifting through voluminous data to identify and classify looming threats, DL delves deeper, crafting sophisticated models equipped to counteract avant-garde cyber offensives. Both of these techniques are united in their objective of leveraging intricate data patterns to provide real-time, actionable security intelligence. Yet, despite the revolutionary potential of ML and DL, the battle against the ceaselessly morphing cyber threat landscape is relentless. The pursuit of an impervious smart grid continues to be a collective odyssey. In this review, we embark on a scholarly exploration of ML and DL's indispensable contributions to enhancing cybersecurity in IoT-centric smart grids. We meticulously dissect predominant cyber threats, critically assess extant security paradigms, and spotlight research frontiers yearning for deeper inquiry and innovation. Full Article